List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
TUX-TMS: Thapar University Extensible-Trust Management System
Full text
International Journal of Security (IJS)
Table of Contents
Download Complete Issue    PDF(818.66KB)
Volume:  4    Issue:  1
Pages:  1-27
Publication Date:   March 2010
ISSN (Online): 1985-2320
1 - 16
Shashi Bhanwar - India
Seema Bawa - India
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   Trust Management System, Grid Computing , Trust, Reputation, Feedback 
This Manuscript is indexed in the following databases/websites:-
1. Docstoc
2. Scribd
4. Directory of Open Access Journals (DOAJ)
5. Google Scholar
6. refSeek
7. Academic Index
8. Socol@r
9. iSEEK
In a Grid Computing scenario, where the market players are dynamic; traditional assumptions for establishing and evaluating trust, do not hold good anymore. There are two different methods for handling access controls to the resources either by using policy based approach where logical rules and verifiable properties are encoded in signed credentials or using reputation based approach where trust values are collected, aggregated and evaluated to disseminate reputation among the market players. There is need for a dynamic and flexible general-purpose trust management system. In this paper TUX-TMS: an extensible reputation based Trust Management System is presented for establishing and evaluating trust in grid systems. TUX is an efficient Reputation based trust management system for establishing secure Grids.  
1 P. Resnick, R. Zeckhauser, K. Kuwabara, E Friedman,,”Reputation systems”, Communications of the ACM, 43(12): 45-48, December 2000.
2 Li Xiong, Ling Liu, “PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities”, IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7: 843-857, 2004.
3 B., Dragovic, E. Kotsovinos, “XenoTrust: Event-based distributed trust management”, Second International Workshop on Trust and Privacy in Digital Business, Prague (Czech Republic), 2003.
4 B. Dragovic, S. Hand, T. Harris, E. Kotsovinos, ”Managing trust and reputation in the XenoServer Open Platform”, Proceedings of the 1st International Conference on Trust Management, Crete Greece, 2003.
5 S. Lee, R. Sherwood, B. Bhattacharjee, “Cooperative peer groups in NICE”, Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 50, Issue 4 : 523 – 544, March 2006.
6 S. Song, K. Hwang, M. Macwan, “Fuzzy Trust Integration for Security Enforcement in Grid Computing”, NPC 2004, LNCS 3222: 9-21, 2004.
7 S. Song, K. Hwang., Y.K Kwok, “Trusted Grid Computing with Security Binding and Trust Integration”, Journal of Grid Computing, vol. 3, no. 1: 24-34, 2005.
8 A Abdul Rahman and S. Hailes, “Supporting trust in virtual communities”, Proc. of Hawaii Intl Conference on System Sciences, pp:6007, 2000.
9 Farag Azzedin and Muthucumaru Maheswaran, “Evolving and Managing Trust in Grid Computing Systems”, Proceedings of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering, 2002.
10 N. Damianou, N. Dulay, E. Lupu and M. Sloman, “The Ponder Policy Specification Language”, POLICY 2001, LNCS 1995:18-38, 2001.
11 Farag Azzedin and Muthucumaru Maheswaran), “Trust Modeling for Peer-to- Peer based Computing Systems”, Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS’03), pp:99a., 2003.
12 Ching Lin, Vijay Varadharajan and Yan Wang and Vineet Pruthi “Enhancing Grid Security with Trust Management”, Proceedings of the 2004 IEEE International Conference on Services Computing (SCC’04), pp: 303-310, 2004).
13 Glenn Shafer, “Perspectives on the theory and practice of belief functions”, International Journal of Approximate Reasoning 6(3): 445-480, 1992.
14 Zhengqiang Liang and Wesiong Shi, “PET: A Personalised Trust Model with Reputation and Risk Evaluation for P2P Resource sharing”, Proceedings of the 38th Hawaii International Conference on System Sciences, pp.201 .2, 2005.
15 Shashi, Seema Bawa, “Securing a Grid”, International Conference CGCS-2008 (Cluster and Grid Computing Systems), Proceedings of World Academy of Science, Engineering And Technology, Volume 32 ISSN: 2070-3740, pp 7-12, 2008.
16 Shashi, Seema Bawa, “Evaluating Trust in a Grid Environment”, Student Research Symposium, HiPc 2008 (International Conference on High Performance Computing) Bangalore, India, 2008.
17 Shashi, Seema Bawa, “Evaluating Trust in a Grid Environment”, Student Research Symposium, HiPc 2008 (International Conference on High Performance Computing) Bangalore, India, 2008.
18 Sepandar D Kamvar, Mario T Schlosser, Hector Garcia Molina, “The EigenTrust Algorithm for Reputation Management in P2P Networks”, Proceedings of the 12th International conference on World Wide Web, Budapest, Hungary, pp: 640 – 651, 2003.
19 I. Foster, and C. Kesselman, “The Grid: Blueprint for a New Computing Infrastructure”, San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., 1999.
20 Grid Interoperability Now Community Group (GIN-CG)(2006).
21 Sarbjeet Singh ans Seema Bawa), “A Privacy, Trust and Policy based Authorization Framework for Services in Distributed Environments”, International Journal of Computer Science, vol. 2 no. 2: 85-92, 2007.
Shashi Bhanwar : Colleagues
Seema Bawa : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.