Trust and its ramifications for the DoD Public Key Infrastructure (PKI).
dc.contributor.advisor | Michael, James Bret | |
dc.contributor.advisor | Buddenberg, Rex. | |
dc.contributor.author | Gaines, Leonard T. | |
dc.date | 2000 | |
dc.date.accessioned | 2012-08-09T19:29:10Z | |
dc.date.available | 2012-08-09T19:29:10Z | |
dc.date.issued | 2010-09 | |
dc.identifier.uri | https://hdl.handle.net/10945/9400 | |
dc.identifier.uri | http://handle.dtic.mil/100.2/ADA382046 | |
dc.description.abstract | In order to incorporate trust into e-commerce, public key cryptography, and basic communication, one must understand and effectively manage trust. Various Internet security protocols have attempted to address this lack of trust. However, these protocols do not incorporate the user's trust into these protocols. Computational models of trust have been developed in an attempt to automate the logic, variables, and thought processes that a human performs when making a trust-decision. Due to the fact that trust is based on a subjective belief, the models require the assignment of metrics to belief variables or attributes that will have value when evaluating trust. These models address the notion of trust in many different ways and both their definitions and metrics vary significantly. This thesis evaluates the various trust models. It is necessary to understand how trust is defined in each model in order to evaluate how well the operation of a system based on the model satisfies the requirements of the users. Trust models are evaluated based on their characteristics, environmental references, metrics, variables used, and outputs. This thesis concludes with the assessment of a practical application of a trust model to the DoD's PKI system. | en_US |
dc.description.uri | http://archive.org/details/trustnditsramifi109459400 | |
dc.format.extent | xvi, 143 p.;28 cm. | en_US |
dc.language.iso | en_US | |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.title | Trust and its ramifications for the DoD Public Key Infrastructure (PKI). | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Information Technology Management | |
dc.contributor.department | Computer Science (CS) | |
etd.thesisdegree.name | M.S. in information Technology Management | en_US |
etd.thesisdegree.name | M.S. in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Information Technology Management;Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.