Abstract
In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in general. But a simple explanation does not always suggest a simple solution. It turns out that it is impossible to alter the fragile distribution of trust without sacrificing some of its fundamental functions. A solution for the vulnerability of trust must thus be sought elsewhere, without tampering with its distribution. This observation was the starting point of the present paper. It explores different methods for securing trust: not by redistributing, but by qualifying it. The methods used to break privacy can be used to secure trust.
Original language | English |
---|---|
Title of host publication | Formal Aspects of Security and Trus |
Subtitle of host publication | 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers |
Editors | Pierpaolo Degano, Sandro Etalle, Joshua Guttman |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 1-17 |
Number of pages | 17 |
ISBN (Electronic) | 978-3-642-19751-2 |
ISBN (Print) | 978-3-642-19751-2 |
DOIs | |
Publication status | Published - Sept 2010 |
Event | 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010 - Pisa, Italy Duration: 16 Sept 2010 → 17 Sept 2010 Conference number: 7 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 6561 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Workshop
Workshop | 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010 |
---|---|
Abbreviated title | FAST |
Country/Territory | Italy |
City | Pisa |
Period | 16/09/10 → 17/09/10 |
Keywords
- SCS-Cybersecurity