An Algebra for Assessing Trust in Certification Chains

نویسنده

  • Audun Jøsang
چکیده

Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes authenticity difficult to verify. We show that authentication can not be based on public key certificates alone, but also needs to include the binding between the key used for certification and it’s owner, as well as the trust relationships between users. We develop a simple algebra around these elements and describe how it can be used to compute measures of authenticity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and reliable certificate chains recovery protocol for mobile ad hoc networks

The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in the trustworthy area to securing mobile ad hoc networks. Among the most used approaches are based on public-key certificates and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certific...

متن کامل

Users' Trust in Trusted Digital Repository Content

Scholars who study trust in digital archives have largely focused their attention on the power of certification by third-party audit as a way to communicate trustworthiness to end-users. In doing so, they assume that the establishment of a network of trusted digital archives will create a climate of trust. But certification at the repository level also assumes the trustworthiness of digital obj...

متن کامل

Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks

Amobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our w...

متن کامل

Does Pain Result in Gain? Assessing Cloud Service Certifications' Effectiveness

Cloud service certifications (CSCs) gain increasing attention in practice as a measure against the prevailing uncertainties of cloud computing, but demand efforts for passing audit requirements. However, research findings on certifications’ effectiveness are inconclusive. This research-in-progress paper develops a research model to evaluate CSCs’ effects on two certification outcomes suggested ...

متن کامل

Introducing a mathematical model in supply chain with adding trust flow

These day, supply chains (SCs) have become more and more complicated and have extensively expanded and due to these complexities, the supply chain management (SCM) has encountered several uncertainties, and, as a result, trust and assurance between members in SCs has become essential for a successful SCM. Although trust is an inevitable component in nearly all fields in SCs, like cooperation, c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999