Our approach consists of:

  1. A certificate based transitive representation of partial trust relationships amongst users, processes, resources, and transaction requests suitable for determining access-control policy.
  2. A monotonic representation of trust where the omission of information can only reduce access rights and is therefore suitable for distributed environments.
  3. Access controllers that determine necessary levels of reliability from agents requesting services.
  4. A set of rules for reducing a quantitative trust management access request to a stochastic process that models the reliability of the requesting agent.
  5. An analysis of the computational cost of the computation of expected reliability in a QTM system.
  6. Determination of algorithms appropriate for the computation of the expected value of a stochastic process modeling an agent's reliability.