Theories of Trust for Communication Protocols

被引:0
|
作者
Ma, Ji [1 ,2 ]
Orgun, Mehmet A. [1 ]
Sattar, Abdul [2 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[2] Univ Queensland, Sch Informat & Commu Technl Griffith, Brisbane, Qld 4072, Australia
基金
澳大利亚研究理事会;
关键词
AUTHENTICATION PROTOCOLS; MULTIAGENT SYSTEMS; BELIEF LOGIC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trust is a critical issue for communication protocols in open systems that operate in dynamic and highly uncertain environments. It influences not only the specification of security policies but also the techniques needed to manage and implement security policies. A formal system for the specification of trust for such systems requires the ability to reason about agent beliefs as well as the evolution of the system through time. In this paper, we use a fibred logic called FL which is obtained by combining a belief logic with a temporal logic for specifying agent beliefs and establishing trust theories for communication protocols. A theory of trust for a given system is captured by a set of rules in FL that describes the trust of agents in the system. This enables automated reasoning about theories of trust using the decision procedures of FL such as axiom systems and tableaux. Theories of trust are generally established based on the initial trust of agents in the security mechanisms of the system in which they are deployed. Such theories provide a foundation for reasoning about agent beliefs as well as security properties that systems may satisfy.
引用
收藏
页码:236 / +
页数:3
相关论文
共 50 条
  • [1] Formalising theories of trust for authentication protocols
    Ma, Ji
    Orgun, Mehmet A.
    INFORMATION SYSTEMS FRONTIERS, 2008, 10 (01) : 19 - 32
  • [2] Formalising theories of trust for authentication protocols
    Ji Ma
    Mehmet A. Orgun
    Information Systems Frontiers, 2008, 10 : 19 - 32
  • [3] DESIGNING SECURE COMMUNICATION PROTOCOLS FROM TRUST SPECIFICATIONS
    PAPADIMITRIOU, CH
    RANGAN, V
    SIDERI, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 560 : 360 - 368
  • [4] DESIGNING SECURE COMMUNICATION PROTOCOLS FROM TRUST SPECIFICATIONS
    PAPADIMITRIOU, CH
    RANGAN, V
    SIDERI, M
    ALGORITHMICA, 1994, 11 (05) : 485 - 499
  • [5] Trust into Collective Privacy? The Role of Subjective Theories for Self-Disclosure in Online Communication
    Moll, Ricarda
    Pieschl, Stephanie
    Bromme, Rainer
    SOCIETIES, 2014, 4 (04): : 770 - 784
  • [6] COMMUNICATION PROTOCOLS
    AYACHE, JM
    COURTIAT, JP
    DIAZ, M
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1982, 6 (05): : 368 - 369
  • [7] Secure protocols with asymmetric trust
    Damgard, Ivan
    Desmedt, Yvo
    Fitzi, Matthias
    Nielsen, Jesper Buus
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 357 - +
  • [8] Sybilproof Transitive Trust Protocols
    Resnick, Paul
    Sami, Rahul
    10TH ACM CONFERENCE ON ELECTRONIC COMMERCE - EC 2009, 2009, : 345 - 354
  • [9] Delegation Protocols founded on trust
    Chandran, Rachil
    Hexmoor, Henry
    2007 INTERNATIONAL CONFERENCE ON INTEGRATION OF KNOWLEDGE INTENSIVE MULTI-AGENT SYSTEMS, 2007, : 328 - +
  • [10] Selecting theories and recursive protocols
    Truderung, T
    CONCUR 2005 - CONCURRENCY THEORY, PROCEEDINGS, 2005, 3653 : 217 - 232