%0 Conference Proceedings %T On Robustness of Trust Systems %+ Nanyang Technological University [Singapour] %+ University of Luxembourg [Luxembourg] %A Muller, Tim %A Liu, Yang %A Mauw, Sjouke %A Zhang, Jie %Z Part 2: Full Papers %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 8th IFIP International Conference on Trust Management (IFIPTM) %C Singapore, Singapore %Y Jianying Zhou %Y Nurit Gal-Oz %Y Jie Zhang %Y Ehud Gudes %I Springer %3 Trust Management VIII %V AICT-430 %P 44-60 %8 2014-07-07 %D 2014 %R 10.1007/978-3-662-43813-8_4 %Z Computer Science [cs]Conference papers %X Trust systems assist in dealing with users who may betray one another. Cunning users (attackers) may attempt to hide the fact that they betray others, deceiving the system. Trust systems that are difficult to deceive are considered more robust. To formally reason about robustness, we formally model the abilities of an attacker. We prove that the attacker model is maximal, i.e. 1) the attacker can perform any feasible attack and 2) if a single attacker cannot perform an attack, then a group of attackers cannot perform that attack. Therefore, we can formulate robustness analogous to security. %G English %Z TC 11 %Z WG 11.11 %2 https://inria.hal.science/hal-01381678/document %2 https://inria.hal.science/hal-01381678/file/978-3-662-43813-8_4_Chapter.pdf %L hal-01381678 %U https://inria.hal.science/hal-01381678 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-AICT-430 %~ IFIP-TC11 %~ IFIP-TM %~ IFIP-WG11-11