The right type of trust for distributed systems

217Citations
Citations of this article
74Readers
Mendeley users who have this article in their library.

Abstract

Research in information security has traditionally focused on where to place or how to propagate trust. In that sense, a cryptographic algorithm or protocol is simply a mechanism to transfer trust from where it exists to where it is needed. This paper puts the focus on trust itself and shows that it is a very complex concept with many interesting and important implications. We do not attempt to define a formal trust model, but rather examine the types of trust and trust relationships which are relevant for information security. It is shown that the existence of trust as a phenomenon depends on the existence of malicious behaviour. This observation leads to the distinction between passionate entities with human-like capabilities, and rational entities which basically are systems. Trust can then be defined as the belief that a rational entity will resist malicious manipulation or that a passionate entity will behave without malicious intent. It is also shown that trust relationships exhibit a great diversity, that they are based on knowledge and that they contain aspects in common with strategy games.

Cite

CITATION STYLE

APA

Jøsang, A. (1996). The right type of trust for distributed systems. In Proceedings New Security Paradigms Workshop (Vol. Part F129440, pp. 119–131). Association for Computing Machinery. https://doi.org/10.1145/304851.304877

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free