Abstract
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illustrated by way of a collaborative spam detection application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2, 52–61 (2003)
Dimmock, N.: How much is ‘enough’? Risk in trust-based access control. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises — Enterprise Security, pp. 281–282 (2003)
Knight, F.H.: Risk, Uncertainty, and Profit. Library of economics and liberty, Hart, Schaffner & Marx edn., September 8. Houghton Mifflin Company, Boston (1921)
Hirshleifer, J., Riley, J.G.: The analytics of uncertainty and information. In: Cambridge surveys of economic literature. Cambridge University Press, Cambridge (1992)
von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior, 2nd edn. Princeton University Press, Princeton (1947)
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of Symposium on Access Control Models and Technologies. ACM, New York (2004)
Machina, M.J.: Choice under uncertainty: Problems solved and unsolved. The Journal of Economic Perspectives 1, 121–154 (1987)
Simon, H.A.: Models of bounded rationality, vol. 1. MIT Press, Cambridge (1982)
Savage, L.J.: The foundations of statistics, 2nd edn. Dover, New York (1972)
Carbone, M., Dimmock, N., Krukow, K., Nielsen, M.: Revised computational trust model. EU IST-FET Project Deliverable (2004)
Dimmock, N., Maddison, I.: Peer-to-peer collaborative spam detection. ACM Crossroads 11 (2004)
cmeclax: Nilsimsa codes (2004), http://ixazon.dynip.com/~cmeclax/nilsimsa.html (accessed November 22, 2004 17:30 UTC)
Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9 (2001)
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii International Conference on System Sciences 33, pp. 1769–1777 (2000)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Jøsang, A., Presti, S.L.: Analysing the relationship between trust and risk. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dimmock, N., Bacon, J., Ingram, D., Moody, K. (2005). Risk Models for Trust-Based Access Control(TBAC). In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_25
Download citation
DOI: https://doi.org/10.1007/11429760_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26042-4
Online ISBN: 978-3-540-32040-1
eBook Packages: Computer ScienceComputer Science (R0)