Negative trust for conflict resolution in software management

作者: Giuseppe Primiero , Jaap Boender

DOI: 10.3233/WEB-180393

关键词: SoftwareComputer scienceProof assistantProtocol (object-oriented programming)CorrectnessIdentification (information)Management systemRisk analysis (engineering)Conflict resolutionTask (project management)

摘要: Software management systems need to preserve integrity by the handling, approval, tracking and execution of changes on packages current installation profile. This is a problematic task, which needs be accounted for both in terms new removal conflicting ones. While existing approaches are able identify dependency satisfaction conflicts, broader efficient approach can formalised trust. Positive instances trust required identification safely installable packages. Negative trust, much less explored concept, useful analyse complementary issue packages’ case conflicts security issues. In this paper we develop logic negative with two aims: identifying that undesirable view profile; currently installed become inconsistent intended installation. The provides distinct procedures either case. We illustrate properties calculus, provide simple working example offer translation protocol Coq proof assistant verification its formal correctness.

参考文章(50)
Henry Hexmoor, Shahram Rahimi, Rachil Chandran, Delegations guided by trust and autonomy Web Intelligence and Agent Systems: An International Journal. ,vol. 6, pp. 137- 155 ,(2008) , 10.3233/WIA-2008-0134
Per Martin-Löf, Intuitionistic type theory Bibliopolis. ,(1984)
Andreas Zeller, Can We Trust Software Repositories international conference on software engineering. pp. 209- 215 ,(2013) , 10.1007/978-3-642-37395-4_14
Tianli Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang, Implementation of a Trust-Behavior Based Reputation System for Mobile Applications broadband and wireless computing, communication and applications. pp. 221- 228 ,(2014) , 10.1109/BWCCA.2014.52
Peter Herrmann, Trust-Based Protection of Software Component Users and Designers Lecture Notes in Computer Science. pp. 75- 90 ,(2003) , 10.1007/3-540-44875-6_6
Jaap Boender, Giuseppe Primiero, Franco Raimondi, Minimizing transitive trust threats in software management systems conference on privacy security and trust. pp. 191- 198 ,(2015) , 10.1109/PST.2015.7232973
Stephen Clarke, Bruce Christianson, Hannan Xiao, Trust*: Using Local Guarantees to Extend the Reach of Trust international workshop on security. pp. 171- 178 ,(2009) , 10.1007/978-3-642-36213-2_21
Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee, AS-TRUST: a trust quantification scheme for autonomous systems in BGP trust and trustworthy computing. ,vol. 6740, pp. 262- 276 ,(2011) , 10.1007/978-3-642-21599-5_20