Trust Management Tools

Trust Management Tools

Tyrone Grandison (IBM Almaden Research Center, USA)
Copyright: © 2007 |Pages: 19
DOI: 10.4018/978-1-59904-207-7.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

After entering the realm of computing over a decade ago, the term trust management has evolved to encompass many concepts and mechanisms that bring it closer to its intuitive interpretation. This chapter will outline the evolution and present the catalyst(s) for each phase in its metamorphosis. In each stage, trust management tools were constructed to showcase the current understanding in the field. These tools will be discussed and their strengths, domains of application, and scope for improvement presented. The foundation of trust management technology can be found in security notions, for example credentials, in mathematical computation and in formal (and informal) reputation models. Each of these categories and their hybrids will be highlighted. This chapter should leave the reader with (1) a holistic view of the trust management problem, (2) a clear differentiation of trust management from other fields (and terms) in the computer security arena, and (3) knowledge of the appropriate domain of usage for each system.

Complete Chapter List

Search this Book:
Reset