CFP last date
20 December 2024
Reseach Article

Extending Trust Transitivity in Databases

by Shatabdi Mondal, S.K.Setua
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 11
Year of Publication: 2011
Authors: Shatabdi Mondal, S.K.Setua
10.5120/1725-2327

Shatabdi Mondal, S.K.Setua . Extending Trust Transitivity in Databases. International Journal of Computer Applications. 12, 11 ( January 2011), 31-35. DOI=10.5120/1725-2327

@article{ 10.5120/1725-2327,
author = { Shatabdi Mondal, S.K.Setua },
title = { Extending Trust Transitivity in Databases },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 12 },
number = { 11 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number11/1725-2327/ },
doi = { 10.5120/1725-2327 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:25.364880+05:30
%A Shatabdi Mondal
%A S.K.Setua
%T Extending Trust Transitivity in Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 11
%P 31-35
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Trust management now-a-days provides a promising approach for supporting access control in open environments. Trust transfer is a common technique employed in trust management systems to establish relationships between the two parties involved in a transaction who are strangers. Trust negotiation occurs when the two parties establish trust over the web. The paper proposes a model showing how trust can be transferred from a previous trust context to a new trust context.

References
  1. Paul Alan Porter, “Trust Negotiation for Open Database Access Control” A thesis submitted to the faculty of Brigham Young University in partial fulfillment of the requirements for the degree of Master of Science Department of Computer Science Brigham Young University August 2006
  2. Bertino Elisa, Sandhu Ravi “Database security - Concepts, Approaches and challenges”, IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19,2005
  3. Donovan Artz and Yolanda Gil,Information Sciences Institute University of Southern California 4676 Admiralty Way, Marina del Rey CA 90292 +1 310-448- 9197, +1 310-822-1511 {dono,gil } @isi.edu February 8, 2006, “A Survey of Trust in Computer Science and the Semantic Web”, Web Semantics: Science, Services and Agents on the World Wide Web, Vol. 5, and No. 2. (June 2007), pp.58- 71.
  4. A. Kini and J. Choobineh, “Trust in Electronic Commerce: Definition and Theoretical Considerations,” 31st Annual Hawaii Int’l. Conf. System Sciences, 1998, Hawaii, http://ieeexplore.ieee.org/iel4/5217/14270/00655251.pdf
  5. S. Jones, “TRUST-EC: Requirements for Trust and Confidence in E-Commerce,” 1999, European Commission, Joint Research Centre.
  6. Bruce Christianson and William S. Harbison, “Why Isn't Trust Transitive?” In Proceedings of the International Workshop on Security Protocols (1997), pp. 171-176.
  7. Audun Jøsang, Information Security Research Centre Queensland University of Technology Brisbane, Australia, Roslan Ismail, College of Information Technology Universiti Tenaga Nasional (UNITEN) Malaysia, Colin Boyd, Information Security Research Centre Queensland University of Technology Brisbane, Australia, “A Survey of Trust and Reputation Systems for Online Service Provision.” Preprint of article published in Decision Support Sy
  8. Ninghui Li, John C. Mitchell, William H. Winsborough, “Design of a Role-based Trust-management Framework.” IEEE Symposium on Security and Privacy, 2002. Proceedings, pp-114 – 130.
  9. T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman and W.R. Shockley, “The SeaView security model.” IEEE Transactzons on Softtoare Enganeerzng, vol. 16, pp. 593- 607, 1991.
  10. Tyrone Grandison and Morris Sloman, Imperial College, “A Survey of Trust In Internet Apllications”, IEEE Communications Surveys, http://www.comsoc.org/pubs/surveys Fourth Quarter 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Trust Reputation Trust Transitivity Trust Transitivity Context