• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Temporal Logic-Based Specification and Verification of Trust Models (2006)

by P Herrmann
Venue:LNCS: Trust Management
Add To MetaCart

Tools

Sorted by:
Results 1 - 3 of 3

Design of Trusted Systems with Reusable Collaboration Models

by Peter Herrmann, Frank Alex, Er Kraemer - Proceedings of the Joint IFIP iTrust and PST Conferences on Privacy, Trust Management and Security , 2007
"... Abstract. We describe the application of our collaboration-oriented software engineering approach to the design of trust-aware systems. In this model-based technique, a specification does not describe a physical system component but the collaboration between various components which achieve system f ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
Abstract. We describe the application of our collaboration-oriented software engineering approach to the design of trust-aware systems. In this model-based technique, a specification does not describe a physical system component but the collaboration between various components which achieve system functions by cooperation. A system model is com-posed from these collaboration specifications. By a set of transforma-tions, executable code can be automatically generated. As a modeling language, we use UML 2.0 collaborations and activities, for which we defined a semantics based on temporal logic. Thus, formal refinement and property proofs can be provided by applying model checkers as well. We consider our approach to be well-suited for the development of trust-based systems since the trust relations between different parties can be nicely modeled by the collaborations. This ability facilitates also a tight cooperation between trust management and software engineering experts which are both needed to create scalable trust-aware applications. The engineering approach is introduced by means of an electronic auction sys-tem executing different policies which are guided by the mutual trust of its principals. While the approach can be used for various trust models, we apply Jøsang’s Subjective Logic in the example. 1
(Show Context)

Citation Context

...ered. By a cTLA proof, one can verify that the cTLA formula specifying the activity Trusted Sale always fulfills the invariant. In the context of trusted systems, this kind of proof was introduced in =-=[42]-=-. We currently develop a tool transforming activities directly into the input syntax TLA+ [33] of the model checker TLC [34] carrying out the proofs automatically. Of course, model checkers are subjec...

Confidentiality: Project Internal Dissemination Level: RE

by Sims Cyril Carrez
"... Language and Method Guidelines, 1 st version (Status: External release approved) Classification: (Confidential or open) ..."
Abstract - Add to MetaCart
Language and Method Guidelines, 1 st version (Status: External release approved) Classification: (Confidential or open)

Matrix Model of Trust Management in P2P Networks

by Miroslav Novotný, Filip Zavoral
"... Abstract — The trust management in P2P networks allows to establish the trust relationships among the peers and decide whether the considered transaction will be realized. It tries to ensure safety in the extremely unsafe environments of P2P networks. In this paper we focus on the formal descriptio ..."
Abstract - Add to MetaCart
Abstract — The trust management in P2P networks allows to establish the trust relationships among the peers and decide whether the considered transaction will be realized. It tries to ensure safety in the extremely unsafe environments of P2P networks. In this paper we focus on the formal description of requirements of trusted P2P networks and we propose the model which is able to measure them. Our model should be adaptable to the previously published methods and allows to compare them. The fundamentals of our model are trust matrices which record the trust relationships between peers. We define similarity between trust matrices for purpose of comparison of different management systems. On the basis of this similarity we propose the criterion which is able to measure successfulness of trust management. Trust management; P2P Networks; Reputation; Access control; I.
(Show Context)

Citation Context

...based on a trustsmanagement. It uses the same machinery applied for the formalsverification of a security protocol. Another formalism to modelsthe trust gaining process is based on the temporal logic =-=[22]-=- orsthe subjective logic [23]. III. MODEL DESCRIPTION A. Basic Definition For purpose of the reputation management we will considersthesP2Psnetworksassascommunitysofsnodesswhichsprovidesservicessforse...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University