Theories of Trust for Communication Protocols

被引:0
|
作者
Ma, Ji [1 ,2 ]
Orgun, Mehmet A. [1 ]
Sattar, Abdul [2 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[2] Univ Queensland, Sch Informat & Commu Technl Griffith, Brisbane, Qld 4072, Australia
基金
澳大利亚研究理事会;
关键词
AUTHENTICATION PROTOCOLS; MULTIAGENT SYSTEMS; BELIEF LOGIC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trust is a critical issue for communication protocols in open systems that operate in dynamic and highly uncertain environments. It influences not only the specification of security policies but also the techniques needed to manage and implement security policies. A formal system for the specification of trust for such systems requires the ability to reason about agent beliefs as well as the evolution of the system through time. In this paper, we use a fibred logic called FL which is obtained by combining a belief logic with a temporal logic for specifying agent beliefs and establishing trust theories for communication protocols. A theory of trust for a given system is captured by a set of rules in FL that describes the trust of agents in the system. This enables automated reasoning about theories of trust using the decision procedures of FL such as axiom systems and tableaux. Theories of trust are generally established based on the initial trust of agents in the security mechanisms of the system in which they are deployed. Such theories provide a foundation for reasoning about agent beliefs as well as security properties that systems may satisfy.
引用
收藏
页码:236 / +
页数:3
相关论文
共 50 条
  • [21] Gaining Trust by Tracing Security Protocols
    Fredlund, Lars-Ake
    Benac Earle, Clara
    Arts, Thomas
    Svensson, Hans
    ERLANG '19: PROCEEDINGS OF THE 18TH ACM SIGPLAN INTERNATIONAL WORKSHOP ON ERLANG, 2019, : 56 - 67
  • [22] Gaining trust by tracing security protocols
    Fredlund, Lars-Ake
    Earle, Clara Benac
    Arts, Thomas
    Svensson, Hans
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2023, 130
  • [23] Communication, causation, and the logos Theories of communication
    Sutherland, Thomas
    CONTINUUM-JOURNAL OF MEDIA & CULTURAL STUDIES, 2013, 27 (05):
  • [24] TRUST IN INTERPERSONAL COMMUNICATION
    PEARCE, WB
    SPEECH MONOGRAPHS, 1974, 41 (03): : 236 - 244
  • [25] Communication, risk, trust
    Kovacs, Barna
    EMPEDOCLES-EUROPEAN JOURNAL FOR THE PHILOSOPHY OF COMMUNICATION, 2021, 12 (01) : 91 - 101
  • [26] Communication and trust in the age of suspicion: Trust and the media
    Shaw, Monica
    HEALTH RISK & SOCIETY, 2008, 10 (03) : 317 - 318
  • [27] Trust and Communication: Findings and Implications of Trust Research
    Na, Liu
    NEW MEDIA & SOCIETY, 2022, 24 (07) : 1719 - 1722
  • [28] Resource theories of communication
    Kristjansson, Hler
    Chiribella, Giulio
    Salek, Sina
    Ebler, Daniel
    Wilson, Matthew
    NEW JOURNAL OF PHYSICS, 2020, 22 (07):
  • [29] Conspiracy theories, credibility and trust in information
    Gualda, Estrella
    Ruas, Jose
    COMMUNICATION & SOCIETY-SPAIN, 2019, 32 (01): : 179 - 194
  • [30] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214