Trust and Trustworthiness: What They Are and How to Achieve Them

Jinghui LI, Bifei MAO*, Zhizhang LIANG, Zeqi ZHANG, Qiushi LIN, Xin YAO

*Corresponding author for this work

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

7 Citations (Scopus)

Abstract

Trust and trustworthiness have been popular words in computing and communications for many years. Yet few studies investigate in-depth their definitions and how to engineer systems that are trustworthy. This paper first reviews different aspects of trust used in different disciplines. Then a comprehensive trust model is proposed, trying to capture essential elements associated with trust and trustworthiness, their relationships, and underlying mechanisms for achieving trust. Further, we explore what would be the main attributes and requirements of a trustworthy system and how to evaluate system trustworthiness.

Original languageEnglish
Title of host publication2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021 : Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages711-717
Number of pages7
ISBN (Electronic)9781665404242
ISBN (Print)9781665404242
DOIs
Publication statusPublished - 22 Mar 2021
Externally publishedYes
Event2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) - Kassel, Germany
Duration: 22 Mar 202126 Mar 2021

Workshop

Workshop2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)
Country/TerritoryGermany
CityKassel
Period22/03/2126/03/21

Bibliographical note

Publisher Copyright:
© 2021 IEEE.

Keywords

  • assurance cases
  • evaluation
  • trust
  • trustworthiness
  • trustworthy systems

Fingerprint

Dive into the research topics of 'Trust and Trustworthiness: What They Are and How to Achieve Them'. Together they form a unique fingerprint.

Cite this