Trust management for e-transactions

被引:9
作者
Patil, V [1 ]
Shyamasundar, RK [1 ]
机构
[1] Tata Inst Fundamental Res, Sch Technol & Comp Sci, Bombay 400005, Maharashtra, India
来源
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES | 2005年 / 30卷 / 2-3期
关键词
e-Commerce; security; trust management; access control; PKI;
D O I
10.1007/BF02706242
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
There has been enormous increase in transactions and cooperative-computing services on the internet. This is both a technical and a social phenomenon. Transactions and services over the internet have global reach and users, known or unknown to the service provider, might be interested in availing access or participating in the cooperative transaction in a distributed manner. Thus, it is very important for service providers to identify and establish trustworthiness of potential collaborators, which they do by writing contracts (e.g. access control, security policies; the words contract and policy are used interchangeably) without violating the privacy and confidentiality laws that prevail across geographical boundaries. But as the system becomes complex and dynamic, contractual incompleteness arises since it becomes cumbersome to mention potentially large set of outcomes of the user's choice of action. Trust plays a crucial role in the design of optimal contracts; not all the relevant, valuable information on the user's choice of action is incorporated in the equilibrium contract. It may also be noted in that traditional transactions, the notion of seeing is believing plays a vital role. However, in e-transactions, this is not the case. The challenge is to see how in such a scenario trust can indeed be generated. Note that the presence of trust facilitates cooperative behaviour and allows for exchange to occur in situations where its absence would preclude trade. In this paper, we shall present a comparative analysis of various approaches of trust management in practice that integrates technology with other factors. We shall also bring out the relative deficiencies and how these issues are tackled in our ongoing work that facilitates execution of optimal contracts.
引用
收藏
页码:141 / 158
页数:18
相关论文
共 26 条
[1]  
ALNAJJAR NI, 2001, 0206 HBS SSRN
[2]  
[Anonymous], 1999, KEYNOTE TRUST MANAGE
[3]  
BLAZE M, 1998, LECT NOTES COMPUTER, V1465, P254
[4]  
CHEN R, 2003, POBLANO DISTRIBUTED
[5]  
CHRISTIANSON B, 1997, P INT WORKSH SEC PRO, P171
[6]  
CHU YH, 1997, WORLD WIDE WEB J, V2, P127
[7]  
Clarke D., 2001, Journal of Computer Security, V9, P285
[8]  
FERRAIOLO DF, 2000, PROPOSED STANDARD RO
[9]  
FORD W, 2002, SECURE ELECT COMMERC
[10]   Foundations of incomplete contracts [J].
Hart, O ;
Moore, J .
REVIEW OF ECONOMIC STUDIES, 1999, 66 (01) :115-138