The Rating Mechanism for the Trusted Relationship Establishment for the Security of the Distributed Computer Systems

Full Text (PDF, 184KB), PP.41-47

Views: 0 Downloads: 0


Vadym Mukhin 1,*

1. National Technical University of Ukraine “Kiev Polytechnic Institute”, Computer Systems Department

* Corresponding author.


Received: 25 Jun. 2013 / Revised: 11 Oct. 2013 / Accepted: 19 Jan. 2014 / Published: 8 May 2014

Index Terms

Distributed Computer Systems, Security, Nodes, Trust Level


There is suggested a method for the trust level establishment to the nodes of distributed computer systems (DCS) taken into account the dynamics of the information value changing and with the in-time records of the security incidents from the nodes. The proposed method of the DCS nodes rating establishment allows adaptively and during the DCS functioning to determine a safety configuration of resources (nodes) for the information processing in the DCS. Also, there is described the specifics of the implementation of the mechanisms for the nodes trust level establishment.

Cite This Paper

Vadym Mukhin, "The Rating Mechanism for the Trusted Relationship Establishment for the Security of the Distributed Computer Systems", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.6, pp.41-47, 2014. DOI:10.5815/ijcnis.2014.06.06


[1]Nagaratnam N., Janson P., Dayka J., Nadalin A., Siebenlist F., Welch V., Foster I., Tuecke S.: The Security Architecture for Open Grid Services. Publisher: Global Grid Forum, - 31 p.
[2]Mukhin V.Ye., Volokyta A.N. Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems. // International Journal of Computer Network and Information Security (IJCNIS), Volume 5, No. 2, February 2013. – pp. 21 – 28.
[3]Josang A., Ismail R., Boyd C.: A Survey of Trust and Reputation Systems for Online Service Provision // Decision Support Systems, 43(2), 2007. – p. 618-644.
[4]Grandison T., Sloman M. A survey of trust in Internet applications.// IEEE Communications Surveys, 3(4). – pp. 4-7, Oct.-Dec. 2000.
[5]Imamura T., Dillaway B., Simon E. XML encryption syntax and processing. W3C Recommendation, 2002.
[6]Gasser M., McDemott E. An architecture for practical delegation in a distributed system. // Proc. of IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, 1990.- pp. 20-30.
[7]Howell J., Kotz D. End-to-end authorization.// Proc. of 2000 Symposium on Operating Systems Design and Implementation. USENIX Association, 2000.
[8]Azzedin F., Maheswaran M. Integrating Trust into Grid Resource Mana-gement Systems // Proc. of First IEEE International Workshop on Security and Grid Computing, 2002.
[9]Luke T.W.T., Jennings N.R., Rogers, Luck M.: A Hierarchical Bayesian Trust Model based on Reputation and Group Behaviour // 6th European Workshop on Multi-Agent Systems, 18th-19th December, 2008, Bath, UK.
[10]Arenas A.E., Aziz B., Silaghi G.C.: Reputation Management in Grid-Based Virtual Organisations // Proc. International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, 26-29 Jul 2008, INSTICC.
[11]Kerschbaum F., et al: A trust-based reputation service for virtual organization formation. In Proceedings of the 4th International Conference on Trust Management, vol. 39(86) of Lecture Notes in Computer Science, pp. 193–205. Springer, 2006.
[12]Chakrabarti A.: Grid Computing Security. // International Workshop “Advanced Com-puting and Communications (ADCOM)”, Ahmedabad, INDIA, December 2004. - 12 p.
[13]Adams C., Lloyd S. Understanding PKI. Concepts, Standards and Deploy-ment Consideration. Second Edition. Addison-Wesley, 2003.
[14]Abdul-Rahman A., Hailes S. Supporting trust in virtual communities// Proc. of the IEEE 33rd Hawaii Int. Conf. on System Sciences (HICSS '00), vol.6, 2000. - p. 607.
[15]Arenas A., Aziz B., Silaghi G.C. Reputation management in Grid-based virtual organizations. // Proc. of Intern. Conf. on Security and Cryptography (SECRYPT 2008), Porto, Portugal, 2008. - pp. 538-545.
[16]Kamvar S. D., Schlosser M. T., Garcia-Molina H. The eigentrust algo-rithm for reputation management in P2P networks //Proc. of the 12th international conference on World Wide Web, New York. NY: CM Press, 2003.
[17]Teo Y.M., Wang X.B.: ALiCE: A Scalable Runtime Infrastructure for High Performan-ce Grid Computing. // Proceedings of IFIP International Conference on Network and Parallel Computing, Springer Verlag, Wuhan, China, October 18-20, 2004. - pp. 101-109.
[18]McKnight D.H., Chervany N.L. The Meaning of Trust. Technical Report MISRC Working Paper Series 96-04. University of Minnesota. Management Information Systems Research Center, 1996.
[19]Luke T.W.T., Jennings N.R., Rogers A., Luck M. A Hierarchical Bayesian Trusl Model based on Repulalion and Group Behaviour // Proc. of 6th European Workshop on Multi-Agenl Systems, Bath. UK, 2008.