Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.

Slides:



Advertisements
Similar presentations
Desperately Seeking Default Internet Policy Update A Perspective from the Pacific June 1994 – INET94 Presentation Geoff Huston Australian Academic and.
Advertisements

Bruce Shindler, Emeritus Professor Dept. of Forest Ecosystems & Society What does the public think about the Forest Service? How can understanding public.
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
ICT Work Programme NCP Infoday 23 June Maria Geronymaki DG INFSO.H.2 ICT for Government & Public Services Objective.
End-to-End Efficiency (E 3 ) Integrated Project of the EC 7 th Framework Programme E 3 WP5 Objectives E 3 WP5 Structure and Research Challenges
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Risk Aware Decision Framework for Trusted Mobile Interactions September 2005 Daniele Quercia and Stephen Hailes CS department University College London.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Putting Research Evidence to Work Research Seminar 14 th January 2009.
SIC’05, 14/04/05 Giovanna Di Marzo Serugendo 1 A Social Semantic Infrastructure for Decentralised Systems Based on Specification-Carrying Code and Trust.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
Choosing an Optimal Digital Preservation Strategy Andreas Rauber Department of Software Technology and.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Trust and Grid Computing Systems Presented By: Woodas Lai.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
A Multi-Agent System for Visualization Simulated User Behaviour B. de Vries, J. Dijkstra.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Pervasive Computing and Communication Security (PerSec 2006) March 13th, 2006 Florina Almenárez, Andrés Marín, Daniel Díaz, Juan Sánchez
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Frequently asked questions about software engineering
Lecture 1.
The Utilization of a Partnership to Provide Quality Education to a Historically Disadvantaged Primary School in the Western Cape.
Big Challenges: Wireless Networks and Services Sam Samuel April 2009.
Towards Ad-hoc Situation Determination Graham Thomson, Paddy Nixon and Sotirios Terzis.
Year Seven Netbook Project. Aims of the Project To evaluate the impact on learning and teaching of using portable technologies both within and outside.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Margaret J. Cox King’s College London
1 Commissioned by PAMSA and German Technical Co-Operation National Certificate in Paper & Pulp Manufacturing NQF Level 3 Operate a computer.
Technology in the Support of Personal Development Jeff Ross and Colin Deal – Dublin October 2006 Technology in the Support of Personal Development Jeff.
FET – Proactive Future and Emerging Technologies F1: FET – Proactive ICT Forever Yours - ICT “ designing for longevity,
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
Abstraction, Big Data and Context Dependency, THEfoDA, Son Bernardino, Mallorca, May 2013 Abstraction, Big Data and Context- Dependency.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Christina M. Lirot, Diane Cessna, and Kay H. Connelly Computer Science Department, Indiana University Bloomington, Indiana Stage One The first stage.
Seventh framework programme CAPACITIES specific programme Activities of international cooperation Coordination Support Action - Grant agreement no.:
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
University of Westminster – Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Leonardo Flores Añover Ramón.
NAVEEN AGENT BASED SOFTWARE DEVELOPMENT. WHAT IS AN AGENT? A computer system capable of flexible, autonomous (problem-solving) action, situated in dynamic,
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Artificial Intelligence By Michelle Witcofsky And Evan Flanagan.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
1 What is OO Design? OO Design is a process of invention, where developers create the abstractions necessary to meet the system’s requirements OO Design.
Coordination between National Regulators for the Safety and Security of International Shipments of Radioactive Materials between Member States Stephen.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
The Second Level Support Service is funded by the Department of Education and Science under the National Development Plan Self Evaluation – focus on classroom.
1 Real-Time Parking Information on Parking-Related Travel Cost TRIP Internship Presentation 2014 Kory Harb July 24, 2014 Advisor: Dr. Yafeng Yin Coordinator:
Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities Dr Ioanna Dionysiou Department of Computer Science School of Sciences.
Towards a Reference Quality Model for Digital Libraries Maristella Agosti Nicola Ferro Edward A. Fox Marcos André Gonçalves Bárbara Lagoeiro Moreira.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Slide no 1 Cognitive Systems in FP6 scope and focus Colette Maloney DG Information Society.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
Standards and Competences for Social work Education for working with children and youth Prof dr Nevenka Zegarac Ass MA Anita Burgund.
Rationality and Power: the “gap in the middle” in ICT
Chapter 1- Introduction
Big Data Quality the next semantic challenge
Frequently asked questions about software engineering
يك مدل اعتماد توزيع‍شده براي محيطهاي محاسبات فراگير
What does the public think about the Forest Service?
INFORMATION SEMINAR Interreg V-A Latvia-Lithuania programme
Presentation transcript:

Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer and Information Sciences University of Strathclyde

Vision of Ubiquitous Computing Massively networked world with a diverse population of mobile entities Benefit from cooperation and interaction No specific security infrastructure New security challenges not addressed in existing security models Inherent risk of interaction where only partial information is available

Trust-Based Security Humans use trust everyday as a means of reasoning about and accepting risk Lacking a precise definition Certain aspects are widely acknowledged Trust is a subjective notion based on the evidence available Trust is also situation specific Trust is dynamic, evolving as new information becomes available

Trust Management Systems Current trend is to view trust implicitly through the delegation of privileges The lack of explicit trust evaluation precludes many of the aspects deemed necessary to reason about trust Problems for decentralised ubiquitous systems Reliance on complete information Reliance on a specific security infrastructure Dynamic aspects of trust are largely neglected

Position & Objectives The ability to form and evolve explicit values for trust in other principals in an interaction allows autonomous computational entities to make better decisions in situations where only partial information is available The aim is to help create a user-intuitive Information Society Objectives: Define a trust model to allow entities to reason about and compare the trustworthiness of other entities for security decisions Capture the dynamic aspects of trust with fine granularity Capture human intuitions about trust to ensure understanding

Characteristics of the Trust Model Range of explicit values representing trust provides a finer granularity of representation More information for security decisions Values stored in memory Three main sources of trust Personal Observations Recommendations Reputation

Dynamic Aspects of the Model Trust Formation evidence relevant to the current context carrying the most weight Trust Evolution Evaluation of the experience Certificate revocation insufficient Trust Exploitation Behaviour based on trust, risk and utility Risk is the probability of an outcome and the associated costs/benefits

Status Formal trust model Lattice of trust values Risk model Capture the interaction between trust and risk Entity recognition mechanisms Jean-Marc Seigneur Simulation trust based file sharing system trust based dynamic routing in ad-hoc networks

Open Issues The nature of context Recording of evidence Combining the three forms of evidence Issues of Byzantine behaviour Non-cooperative scenarios

Acknowledgements The work is this paper is supported by the EU project SECURE (IST ) funded by the FET Programme under the GCI.