Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks

Dusko Pavlovic

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)


    In a previous FAST paper, I presented a quantitative model of the process of trust building, and showed that trust is accumulated like wealth: the rich get richer. This explained the pervasive phenomenon of adverse selection of trust certificates, as well as the fragility of trust networks in general. But a simple explanation does not always suggest a simple solution. It turns out that it is impossible to alter the fragile distribution of trust without sacrificing some of its fundamental functions. A solution for the vulnerability of trust must thus be sought elsewhere, without tampering with its distribution. This observation was the starting point of the present paper. It explores different methods for securing trust: not by redistributing, but by qualifying it. The methods used to break privacy can be used to secure trust.
    Original languageEnglish
    Title of host publicationFormal Aspects of Security and Trus
    Subtitle of host publication7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers
    EditorsPierpaolo Degano, Sandro Etalle, Joshua Guttman
    Place of PublicationBerlin
    Number of pages17
    ISBN (Electronic)978-3-642-19751-2
    ISBN (Print)978-3-642-19751-2
    Publication statusPublished - Sept 2010
    Event7th International Workshop on Formal Aspects of Security and Trust, FAST 2010 - Pisa, Italy
    Duration: 16 Sept 201017 Sept 2010
    Conference number: 7

    Publication series

    NameLecture Notes in Computer Science
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349


    Workshop7th International Workshop on Formal Aspects of Security and Trust, FAST 2010
    Abbreviated titleFAST


    • SCS-Cybersecurity


    Dive into the research topics of 'Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks'. Together they form a unique fingerprint.

    Cite this