Our approach consists of:
- A certificate based transitive representation of
trust relationships amongst users, processes, resources, and
transaction requests suitable for determining access-control policy.
- A monotonic representation of trust where the omission of information
can only reduce access rights and is therefore suitable
for distributed environments.
- Access controllers that determine necessary levels of
reliability from agents requesting services.
- A set of rules for reducing a quantitative trust management
access request to a stochastic
process that models the reliability of the requesting agent.
- An analysis of the computational cost of the computation of
expected reliability in a QTM system.
- Determination of algorithms appropriate for the computation of
the expected value of a
stochastic process modeling an agent's reliability.