We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Study based on the Trust Management

by Lakshmi, Pushpendra Kumar Pateriya, Saurabh Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 18
Year of Publication: 2013
Authors: Lakshmi, Pushpendra Kumar Pateriya, Saurabh Sharma
10.5120/10566-5544

Lakshmi, Pushpendra Kumar Pateriya, Saurabh Sharma . A Study based on the Trust Management. International Journal of Computer Applications. 63, 18 ( February 2013), 20-23. DOI=10.5120/10566-5544

@article{ 10.5120/10566-5544,
author = { Lakshmi, Pushpendra Kumar Pateriya, Saurabh Sharma },
title = { A Study based on the Trust Management },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 18 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number18/10566-5544/ },
doi = { 10.5120/10566-5544 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:40.671544+05:30
%A Lakshmi
%A Pushpendra Kumar Pateriya
%A Saurabh Sharma
%T A Study based on the Trust Management
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 18
%P 20-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Trust plays a vital role in human life. It is the key to the door of other people's minds. It cannot be judge easily. The user may trust on an insecure channel for communication of sensitive information which may get leaked. In multimedia the authentication and authorization is related with Trust management. Applications where a more dynamic trust management is advantageous may have a quickly varying user base. It is important for user to deal with the uncertainty regarding the future and their interaction partners. The trust management system can be used for signature verification, semantic web, and for social networks. This paper discussed about different methods of trust management system.

References
  1. Saurabh Sharma, Pushpendra Kumar Pateriya, "A Study on different approaches of Selective Encryption Technique", International Journal of Computer Science & Communication Networks, Vol 2(6), 658-662
  2. G. Necula, "Proof-Carrying Code", to appear in Proceedings of the 1997 ACM Symposium on Principles of Programming Languages.
  3. G. Necula and P. Lee, "Safe Kernel Extensions without Run-time Checking", in Proceedings of the 1996 Usenix Symposium on Operating System Design and Implementation, pp. 229-243.
  4. Jim Rankin, "Building trust - the essential ingredient in partnering to improve business results".
  5. Marsh, S, "Formalising Trust as a Computational Concept", PhD thesis, University of Stirling, Department of Computer Science and Mathematics (1994)
  6. Baldwin, A. , Shiu, S, "Hardware security appliances for trust", In: Trust Management:First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28–30, 2003. Proceedings. Volume LNCS 2692/2003. (2003) 46–58
  7. Djordjevic, I. , Dimitrakos, T. : Towards dynamic security perimeters for virtual collaborative networks. In: Trust Management: Second International Conference, iTrust 2004, Oxford, UK, March 29–April 1, 2004. Proceedings. Volume LNCS 2995/2004. (2004) 191–205
  8. Mui, L. , Mohtashemi, M. , Halberstadt, A. : A computational model of trust and reputation. In: 35th Annual Hawaii International Conference on System Sciences (HICSS'02). Volume 7. , IEEE Computer Society (2002)
  9. Mayer, R. C. , Davis, J. H. : An integrative model of organizational trust. The Academy of Management Review 20 (1995) 709–734
  10. English, C. , Terzis, S. , Wagealla, W. : Engineering trust based collaborations in a global computing environment. In: Trust Management: Second International Conference, iTrust 2004, Oxford, UK, March 29–April 1, 2004. Proceedings. Volume LNCS 2995/2004. (2004) 120–134
  11. Winsborough, W. H. , Seamons, K. E. , Jones, V. E. : Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings. Volume 1. , IEEE (2000) 88–102
  12. Chu, Y. H. , Feigenbaum, J. , LaMacchia, B. , Resnick, P. , Strauss, M. : REFEREE:Trust management for Web applications. Computer Networks and ISDN Systems 29 (1997) 953–964
  13. Blaze, M. , Feigenbaum, J. , Lacy, J. : Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, IEEE (1996), 164- 173
  14. Blaze, M. , Feigenbaum, J. , Keromytis, A. D. : KeyNote: Trust management for public-key infrastructures (position paper). In: Security Protocols: 6th International Workshop, Cambridge, UK, April 1998. Proceedings. Volume LNCS 1550/1998. , Springer-Verlag (1998) 59–63
  15. Grandison, T. , Sloman, M. : Specifying and analysing trust for Internet applications. In: Proceedings of 2nd IFIP Conference on e-Commerce, e-Business, e-Government I3e2002, Lisbon, Portugal. (2002)
  16. Grandison, T. , Sloman, M. "A survey of trust in Internet applications", IEEE Communications Surveys and Tutorials 3 (2000) 2–16
  17. Barber, K. S. , Fullam, K. , Kim, J. In: Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. Volume 2631/2003 of Lecture Notes in Artificial Intelligence. Springer-Verlag (2003) 8–14
  18. Essin, D. J. : Patterns of trust and policy. In: Proceedings of 1997 New Security Paradigms Workshop, ACM Press (1997)
  19. Gambetta, D. : Can we trust trust? Trust: Making and Breaking Cooperative Relations (2000) 213–237 Electronic edition.
  20. Jøsang, A. : The right type of trust for computer networks. In: Proceedings of the ACM New Security Paradigms Workshop, ACM (1996)
  21. Egger, F. N. : From Interactions to Transactions: Designing the Trust Experience for Business-to-Consumer Electronic Commerce. PhD thesis, Eindhoven University of Technology (2003)
  22. Egger, F. N. : "Trust me, I'm an online vendor": Towards a model of trust for e-Commerce system design. In: Conference on Human Factors in Computing Systems, CHI'00 extended abstracts on Human factors in computing systems, ACM Press (2000)
  23. Ping Zhang, Arjan Durresi, "Trust Management Framework for Social Networks", IEEE ICC 2012 - Communication and Information Systems Security Symposium
  24. Matthew Richardson, Rakesh Agrawal, Pedro Domingos, "Trust Management For The Semantic Web", In Proceedings Of The Second International Semantic Web Conference
Index Terms

Computer Science
Information Sciences

Keywords

Trust management emotional trust logical trust uncertainty