Designing for Trust

  title={Designing for Trust},
  author={L. Jean Camp},
  booktitle={Trust, Reputation, and Security},
  • L. J. Camp
  • Published in
    Trust, Reputation, and…
    15 July 2002
  • Computer Science
Designing for trust requires identification of the sometimes subtle trust assumptions embedded into systems. Defining trust as the intersection of privacy, security and reliability can simplify the identification of trust as embedded in a technical design. Yet while this definition simplifies, it also illuminates a sometimes overlooked problem. Because privacy is an element of trust, purely operational definitions of trust are inadequate for developing systems to enable humans to extend trust… 
Bridging the Trust Gap: Integrating Models of Behavior and Perception
A process-oriented trust framework is proposed that integrates an integrity-based trust model with the requirements and perceptions of those who manage and administer computing infrastructure and enables a feedback loop between the system administrator and established models of trust.
Categorizing, Analyzing, and Managing Third Party Trust
A model for describing third party trust and the likelihood of trust violations is presented and a number of proposed techniques, both technological and policy-based, are presented to minimize the degree of trust users must place in third parties as well as to decrease the possibility of violation of this trust.
Design for the value of trust
This chapter explores some of the philosophical issues surrounding trust “by design” and explains how to apply Design for Values to trust.
Can Security be Decentralised? The Case of the PGP Web of Trust
It is illustrated how the Web of Trust, although designed to evade government control, paradoxically relies upon assurances provided by government-issued documents to validate identity, even while also relying upon interpersonal trust for this purpose.
Traces of digital trust : an interactive design perspective
This thesis explores ways that the complex concept of trust functions between users in digital environments who are strangers. Although it can and has been argued that ‘trust’ is central to the
Understanding Perceived Trust to Reduce Regret
A domain‐independent general trust perception model is presented that helps to understand how users make online trust decisions and how they can help them in making the right decisions, which minimize future regret.
A Design Space for Trust-enabling Interaction Design
The purpose of this article is to introduce and assess the expressiveness of a design space for trust-enabling interaction design; or in other words aims to assess the extent to which the design
Trust: An Element of Information Security
The concept of trust and predictability as an element of information security and of restoring stakeholder confidence are discussed and it is argued that assurances build trust and that controls safeguard trust.
Trust Models for Community Aware Identity Management
This article presents methods for constructing community-aware identity management systems and for computing trust levels between users of a social network, using a novel trust model that takes advantage of both the capabilities of the Semantic Web and of a distributed topology.
A model for Human-computer trust: A key contribution for leveraging trustful interactions
This article addresses trust in computer systems as a social phenomenon, which depends on the type of relationship that is established through the computer, or with other individuals, and describes the proposed model, which builds on what one perceives to be trustworthy and is influenced by a number of factors such as the history of participation and user's perceptions.


Design for Trust
Designing trust metrics for the next generation Internet, and indeed implementing designs that embed trust, requires an understanding of not only the technical nuances of security but also the human subtleties of trust perception.
Trust: A Collision of Paradigms
It is recommended that any security system be built on the basis of understanding of human trust provided by the social sciences, and that research which empowers users to be their own security manager may be based on a fundamentally flawed view of human- computer interaction.
Trust and Risk in Internet Commerce
The author's goal is to provide information on trust and risk to businesses that are developing electronic commerce systems; and second, to help consumers understand the risks in using the Internet for purchases and show them how to protect themselves.
Privacy-Enhancing Technologies for Internet Commerce
It is argued that the creation of new trusted third party is not an effective strategy and autonomy-based products have been more successful than seclusion- based products, despite the wider array of services offered by seclusion services.
Valuation of Trust in Open Networks
A method for the valuation of trustworthiness which can be used to accept or reject an entity as being suitable for sensitive tasks is presented, an extension of the work of Yahalom, Klein and Beth.
The Role of Trust Management in Distributed Systems Security
The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms.
Privacy as an Aspect of Human Dignity : An Answer to Dean Prosser
Introduction Three-quarters of a century have passed since Warren and Brandeis published their germinal article, “The Right of Privacy.” In this period many hundreds of cases, ostensibly founded upon
Places and Spaces: The Historical Interaction of Technology, Home, and Privacy
How different technologies, including structural elements, have affected and reflected over time the boundary represented by the home and how that boundary has helped shape the construction of privacy in the West is explored.
Pretty good privacy
This document describes only the format and methods needed to read, check, generate and write conforming packets crossing any network, and does not deal with storing and implementation questions albeit it is necessary to avoid security flaws.
The Right to Privacy
hat the individual shall have full protection in person and in property is a principle as old as the common law; but it has been found necessary from time to time to define anew the exact nature and