Shinren: Non-monotonic trust management for distributed systems

Changyu Dong, Naranker Dulay

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

8 Citations (Scopus)
39 Downloads (Pure)

Abstract

The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One
solution may be trust management which utilises the notion of trust in order to
specify and interpret security policies and make decisions on security-related actions. Most trust management systems assume monotonicity where additional information can only result in the increasing of trust. The monotonic assumption
oversimplifies the real world by not considering negative information, thus it cannot handle many real world scenarios. In this paper we present Shinren, a novel non-monotonic trust management system based on bilattice theory and the anyworld assumption. Shinren takes into account negative information and supports reasoning with incomplete information, uncertainty and inconsistency. Information from multiple sources such as credentials, recommendations, reputation and local knowledge can be used and combined in order to establish trust. Shinren also supports prioritisation which is important in decision making and resolving modality conflicts that are caused by non-monotonicity.
Original languageEnglish
Title of host publicationTrust Management IV
Subtitle of host publication4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings
EditorsMasakatsu Nishigaki, Audun Jøsang , Yuko Murayama, Stephen Marsh
Place of PublicationCham, Switzerland
PublisherSpringer
Pages125-140
Number of pages16
ISBN (Electronic)9783642134463
ISBN (Print)9783642134456
DOIs
Publication statusPublished - 18 Jun 2010
Event4th IFIP WG International Conference - Morioka, Japan
Duration: 16 Jun 201018 Jun 2010

Other

Other4th IFIP WG International Conference
Abbreviated titleIFIPTM 2010
Country/TerritoryJapan
CityMorioka
Period16/06/1018/06/10

Keywords

  • trust management
  • distributed systems
  • data encryption

Cite this