Trust management tools

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

After entering the realm of computing over a decade ago, the term trust management has evolved to encompass many concepts and mechanisms that bring it closer to its intuitive interpretation. This chapter will outline the evolution and present the catalyst(s) for each phase in its metamorphosis. In each stage, trust management tools were constructed to showcase the current understanding in the field. These tools will be discussed and their strengths, domains of application, and scope for improvement presented. The foundation of trust management technology can be found in security notions, for example credentials, in mathematical computation and in formal (and informal) reputation models. Each of these categories and their hybrids will be highlighted. This chapter should leave the reader with (1) a holistic view of the trust management problem, (2) a clear differentiation of trust management from other fields (and terms) in the computer security arena, and (3) knowledge of the appropriate domain of usage for each system. © 2007, Idea Group Inc.

Cite

CITATION STYLE

APA

Grandison, T. (2007). Trust management tools. In Trust in E-Services: Technologies, Practices and Challenges (pp. 198–216). IGI Global. https://doi.org/10.4018/978-1-59904-207-7.ch008

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free