spContent=Trust plays a crucial role in our social life. It is a key component to facilitate coordination and cooperation for mutual benefits. Trust management has been proposed as a useful solution to break through new challenges of security and privacy caused by the special characteristics of digital systems, especially in a mobile environment.
Through this course, you can understand the general perspectives of trust, typical trust models, grasp the basic ideas of trust management and its application in different scenarios.
Trust plays a crucial role in our social life. It is a key component to facilitate coordination and cooperation for mutual benefits. Trust management has been proposed as a useful solution to break through new challenges of security and privacy caused by the special characteristics of digital systems, especially in a mobile environment.
Through this course, you can understand the general perspectives of trust, typical trust models, grasp the basic ideas of trust management and its application in different scenarios.
—— 课程团队
课程概述
Trust management involves collecting useful information, evaluating trust relationships, making decisions about trust, monitoring and re-evaluating trust relationships, and automating the above process. Currently, trust management has become an important approach to improve system security and make system entities collaborate effectively and reliably. Trust management is an important part of cyberspace security, and it is a useful supplement and improvement to the cryptography-led security technology. It is a cutting-edge science across multiple disciplines and requires wide engineering background.
Through the study of this course, you can fully understand trust, be familiar with typical trust models and trust evaluation algorithms, master the basic knowledge of trust management and trusted computing, and understand the application of trust management in emerging fields. This course lays a good theoretical and practical foundation for students to learn professional knowledge of cyberspace security and engage in related engineering and technical work. The students can get the necessary basic skills training and improve their comprehensive ability and overall quality.
This course is based on online course teaching, combined with homework, self-study, discussion, course practice, and other teaching methods and forms to complete the course teaching tasks. The course teaching aims to let students understand and master the main trust evaluation and management techniques, learn the professional knowledge of cyberspace security, engage in some technical tasks, and enable them to receive the necessary basic skills training. This course plays an important role in cultivating the ability of dialectical thinking, establishing a view of integrating theory with practice, and improving the ability to analyze problems, solve problems, and design systems.
授课目标
The course aims to let students understand and master the main trust evaluation and management techniques, learn the professional knowledge of cyberspace security, engage in some technical tasks, and enable them to receive the necessary basic skills training. This course plays an important role in cultivating the ability of dialectical thinking, establishing a view of integrating theory with practice, and improving the ability to analyze problems, solve problems, and design systems.
课程大纲
Perspective of Trust
课时目标:Trust plays a crucial role in our social life to facilitate coordination and cooperation for mutual benefits. For understanding it in a comprehensive way, this chapter introduces various perspectives of trust in different disciplines, investigates the factors that influence trust, and summarizes its basic characteristics.
1.0 Course Introduction
1.1 Trust Concept
1.2 Trust, Security and Privacy
1.3 Factors Influencing Trust
1.4 Characteristics of Trust
Trust Modeling and Computational Trust
课时目标:Trust model is the method to specify, evaluate, setup, and ensure trust relationships. It is the way to assist the process of trust in a digital system. This chapter introduces the technologies of trust modeling. We classify existing trust models based on different criteria and introduce a number of theories or technologies applied in trust evaluation. Furthermore, discussions on the current problems and challenges in the literature are presented.
2.1 Concept and Taxonomy of Trust
2.2 Trust Evaluation Methods - Weighted Voting, Bayesian Inference
2.3 Trust Evaluation Methods - Dempster-Shafer Theory
2.4 Trust Evaluation Methods - Subjective Logic, Semiring
2.5 Trust Evaluation Methods - Fuzzy Logic
2.6 Trust Evaluation Methods - Fuzzy Cognitive Maps, Game Theory
2.7 Summary and Open Issues
Trust Management
课时目标:Trust management is the technology to collect information to make a trust decision; evaluate the criteria related to trust; monitor and reevaluate existing trust relationships; thus ensure the dynamically changed trust relationships and automate the above processes. This chapter introduces trust management technologies. We classify them and discuss the advantages and disadvantages of each. Furthermore, we discuss the current issues, problems, and future research trends in the area of trust management.
3.1 Concept and Taxonomy
3.2 Prestigious TM Solutions - Trusted Computing Platform
3.3 Prestigious TM Solutions - Reputation Systems
3.4 Prestigious TM Solutions - A Hybrid Solution
3.5 Open Issues and Challenges
Trust Management in Mobile Cloud Computing
课时目标:Mobile cloud computing concerns the usage of cloud computing in combination with mobile devices and mobile networks, in which trust management plays an important role to establish trust relationships in order to offer trustworthy services. This chapter briefly introduces trust management technologies in cloud computing. We analyze the basic requirements of trust management in mobile cloud computing by introducing its architecture and distinct characteristics. We further propose a number of schemes in order to realize autonomic data access control based on trust evaluation in a mobile cloud computing environment. Furthermore, we discuss unsolved issues and future research challenges in the field of trust management in mobile cloud computing.
4.1 Concept, Taxonomy and Basic Structure
4.2 Solutions of Trustworthy Cloud Computing
4.3 Mobile Cloud Computing
4.4 Personal Data Access Control Based on Mobile Social Networking
4.5 Data Access Control Based on Reputation Systems
4.6 Flexible Data Access Control, Current Issues and Summary
4.7 ClouRec (optional)
Trust Management for Unwanted Traffic Control (UTC)
课时目标:The Internet has become the backbone of remote communications, networking, and computing. It offers an incentive platform for many killer services and applications. People’s lives have been dramatically changed by the fast growth of the Internet. However, it also provides an easy channel for distributing content that is unwanted by users. Unwanted traffic includes malware, virus, spam, intrusions, unsolicited commercial advertisements, or unexpected content. This chapter discusses applying trust management technology to automatically conduct unwanted traffic control in the Internet, especially the mobile Internet.
5.1 Background and Introduction
5.2 UTC Based on Trust Management (GTM)
5.3 Privacy Preservation in UTC
5.4 Analysis on Adoption (optional)
5.5 Summary
Usable Trust Management for Mobile Apps
课时目标:Mobile device, which is an open platform for executing various applications, is widely used in our daily life. The security threats caused by malicious and buggy apps emphasized the importance of trust management of mobile apps. This chapter discusses how to design a usable trust management system for mobile apps.
6.1 Introduction and Background
6.2 A Usable Trust Model, Trust/Reputation Indicator's Effects on Mobile App Usage
6.3 Trust Model Formalization, Trust Evaluation, Reputation Generation
6.4 Recommendation Generation and Performance Evaluation
6.5 Implementation and User Tests
6.6 Privacy Preservation
6.7 Summary and Future Trends
Digitalizating Trust for Securing Pervasive Social Networking with Privacy Preservation
课时目标:Self-organized networks based on mobile devices, e.g., mobile ad hoc networks (MANET) are becoming a practical platform for pervasive social networking. How to help mobile users to build up trust in pervasive social networking (PSN) is becoming an important and interesting issue. This chapter explores how to evaluate trust in PSN and proposes trust-based data access control as well as trust-based anonymous authentication.
7.1 Introduction and Background
7.2 Trust Evaluation in PSN
7.3 Data Access Control Based on Trust
7.4 Anonymous Authentication on Trust, Summary and Future Directions
展开全部
参考资料
Z. Yan, Trust Management in Mobile Environments – Usable and Autonomic Models, IGI Global, Hershey, Pennsylvania, USA, 2013. Doi: 10.4018/978-1-4666-4765-7, ISBN13: 9781466647657, ISBN10: 1466647655, EISBN13: 9781466647664.