Initial Investigation into Cross-Context Trust and Risk Assessment

Elizabeth Gray, Yong Chen, Christian D. Jensen

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    Ubiquitous computing suggests the possibility of a vast, networked infrastructure of diverse entities partaking in collaborative applications. This may require interaction between users who may be marginally or completely unknown to each other, or interaction in situations where complete information is unavailable. Humans use the concept of trust in these types of situations. The notion of human trust as a new security paradigm has been recognized by the pervasive computing community. Many issues in this domain, however, remain unresolved: for example, how trust is formed, if it may be transferred across different contexts, guaranteeing precise recommendations in cross-context situations, and the inclusion of risk assessment in any trust-based decision-making architecture. In this paper, we address the above issues within the scope of the SECURE trust architecture. A multi-dimensional trustworthiness structure with a default value concept is presented, incorporating trust attributes that make feasible correct recommendation transfer. We argue that risk evaluation is necessary when making trust-based security decisions, especially when the trustworthiness of some entity is unknown and no recommendation information is available. A cluster-based risk estimating mechanism is applied to integrate trust and risk to make a complete trust-based decision.
    Original languageEnglish
    Title of host publicationProceedings of the IASTED International Conference on Communication, Network, and Information Security
    Publication date2003
    Pages56-61
    ISBN (Print)0889864020
    Publication statusPublished - 2003
    EventInternational Conference on Communication, Network, and Information Security -
    Duration: 10 Dec 200312 Dec 2003

    Conference

    ConferenceInternational Conference on Communication, Network, and Information Security
    Period10/12/200312/12/2003

    Fingerprint

    Dive into the research topics of 'Initial Investigation into Cross-Context Trust and Risk Assessment'. Together they form a unique fingerprint.

    Cite this