{"title":"An axiomatic basis of trust in distributed systems","authors":"P. Rangan","doi":"10.1109/SECPRI.1988.8112","DOIUrl":null,"url":null,"abstract":"He introduces basic notions about developing a logic or a theory, and shows that modal logics of belief, with their Kripe-style possible-worlds semantics, are appropriate for basing a theory of trust on. He reviews a modal logic of belief, and constructs a model of the distributed system so that the logic is sound and complete with respect to the model. Any sentences in the logic may then be added to the logic as axioms, and these axiomatic sentences are considered as trust specifications. He presents methods to map a formal trust specification on to mechanisms for its implementation in the distributed system. Trust and security are closely related in distributed systems. It is shown how security specification and verification methods can be integrated into the presented theory of trust. The author analyzes the trusts required in public-key-based secure communication.<<ETX>>","PeriodicalId":131674,"journal":{"name":"Proceedings. 1988 IEEE Symposium on Security and Privacy","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"75","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1988 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECPRI.1988.8112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 75
Abstract
He introduces basic notions about developing a logic or a theory, and shows that modal logics of belief, with their Kripe-style possible-worlds semantics, are appropriate for basing a theory of trust on. He reviews a modal logic of belief, and constructs a model of the distributed system so that the logic is sound and complete with respect to the model. Any sentences in the logic may then be added to the logic as axioms, and these axiomatic sentences are considered as trust specifications. He presents methods to map a formal trust specification on to mechanisms for its implementation in the distributed system. Trust and security are closely related in distributed systems. It is shown how security specification and verification methods can be integrated into the presented theory of trust. The author analyzes the trusts required in public-key-based secure communication.<>