Show simple item record

dc.contributor.authorChristianson, B.
dc.date.accessioned2013-11-21T12:22:13Z
dc.date.available2013-11-21T12:22:13Z
dc.date.issued2013
dc.identifier.citationChristianson , B 2013 , ' Living in an Impossible World : Real-izing the Consequences of Intransitive Trust ' , Philosophy and Technology , vol. 26 , no. 4 , pp. 411-429 . https://doi.org/10.1007/s13347-013-0128-5
dc.identifier.issn2210-5433
dc.identifier.otherPURE: 2289549
dc.identifier.otherPURE UUID: 49cb97d6-e01e-42b1-a4c1-69f4de32d994
dc.identifier.otherScopus: 84890708642
dc.identifier.urihttp://hdl.handle.net/2299/12151
dc.descriptioncopyright The Author(s) 2013. This article is published with open access at Springerlink.com
dc.description.abstractMany accounts of online trust are based upon mechanisms for building reputation. Trust is portrayed as desirable, and handing off trust is easier if trust is modelled to be transitive. But in the analysis of cyber-security protocols, trust is usually used as a substitute for certain knowledge: it follows that if there is no residual risk, then there is no need for trust. On this grimmer understanding, the less that users are required to trust, the better. Involuntary transitivity of trust becomes corrosive, because it prevents participants from having control—or even knowledge—of the risks to which their trust assumptions expose them. In this paper, we take the stance that controlling the transitivity of trust requires us to recognise trust as a non-referentially transparent modality, similar to but significantly weaker than the epistemic modalities, and to accept the corollary that imaginary (indeed—even impossible) threats can have real consequences that adversely affect online security. An apparently paradoxical outcome is that the desire of principals to keep their trust assumptions private can actually assist the design of systems to satisfy multiple security agendas. However, this approach requires agents to have the capability to predicate accurately about states of affairs that are logically inconsistent with their beliefs, and consequently, designing systems in this way becomes more akin to diplomacy than engineeringen
dc.language.isoeng
dc.relation.ispartofPhilosophy and Technology
dc.subjectCounterfactual reasoning . Doxastic logic . Intensional properties . Privacy. Security . Trust
dc.titleLiving in an Impossible World : Real-izing the Consequences of Intransitive Trusten
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.description.statusPeer reviewed
rioxxterms.versionVoR
rioxxterms.versionofrecordhttps://doi.org/10.1007/s13347-013-0128-5
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record