Affiliation:
1. TU/e Eindhoven University of Technology, The Netherlands
2. TU/e Eindhoven University of Technology, The Netherlands & Philips Research Europe, The Netherlands
Abstract
Trust is essential in the e-business world: to allow the cooperation needed in this setting, independent service providers have to trust each other and, also, end-users have to trust service providers. Trust Management, i.e. the process of establishing trust amongst the parties involved in a transaction, can be carried out using different approaches, methods and technologies. The end-user is an important party involved in this process. Trust Perception models attempt to understand the end-user’s point of view and the pattern he adopts to trust a service over the Internet. In this chapter the authors provide a state of the art for Trust Management in e-business. They review the most important Trust Management technologies and concepts including credentials and PKI, reputation, authorization and access control, trust policies, and trust languages. A conceptual map is presented clarifying the meaning and the links between different elements of a Trust Management system. Moreover, the authors discuss the end-user’s Trust Perception. The chapter presents a literature study on Trust Perception models and introduces the new model, able to list the trust signals the end-user considers to make trust decision. Examples of such signals can be the reputation of a website, the use of security protocols, the privacy policies adopted, and the look and feel of its user interface. Finally, the directions of future work are presented, and conclusions are drawn.
Reference61 articles.
1. Atoyan, H., & Duquet, J. (2006). Trust in new decision aid systems. Proceedings of the 18th Francophone Conference on Human Computer Interaction (pp. 115-122). New York, NY: ACM Press. doi: 10.1145/1132736.1132751
2. P3P Adoption on E-Commerce Web sites: A Survey and Analysis
3. Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A. (1999). The role of trust management in distributed systems security. Secure Internet Programming, LNCS 1603, (pp. 185–210). Springer. Retrieved January 6, 2011, from http://www.springerlink.com/index/r818jj3v60513715.pdf
4. Blaze, M., Feigenbaum, J., & Keromytis, A. (1999). KeyNote: Trust management for public-key infrastructures. Security Protocols. Springer. Retrieved January 13, 2011, from http://www.springerlink.com/index/6KU13FR5JT3MGDXK.pdf
5. Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. Proceedings 1996 IEEE Symposium on Security and Privacy, (pp. 164-173). IEEE Computer Society Press. doi: 10.1109/SECPRI.1996.502679