[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Announcing the trust-ref mailing list


Without trust, no one could ever use cryptography for security or
privacy [1]. Even in face-to-face communication one needs to trust
the other party in several aspects. Trust seems to be fundamental to
our social and cyber interactions, commerce and e-commerce alike.

And yet, what is trust? How different people evaluate trust? Can
trust be represented in an Internet protocol? In e-commerce, as it is
in age-old commerce? What is the interplay between trust and power,
assurance, confidence, belief, risk, accuracy, reliance,
non-repudiation, authorization, delegation, privacy, security?

The very nature of these questions begs for a wide discussion forum,
with open participation. However, such discussions have been too
limited in scope and reach, so far. The list trust-ref is a new open
forum for discussions on trust -- which intends to discuss not only
our current questions of how to bind a system of trust to the design
of security systems but also all other aspects of trust, such as:

- trust, what is trust and how it can be defined socially,
  on the Internet and in-between

- trust modelling: objective, intersubjective and subjective

- using trust to provide qualified reliance on received

- international legal aspects of reliance and derived
  commitments and liabilites

- expressing trust: certificate semantics, new certification
  standards, authorization and delegation, cerimonies,
  non-repudiation and repudiation, etc.

- applications of trust: X.509, PKIX, PGP, MCs, CA CPS, etc.

- other matters related to trust and trust modelling

To subscribe to trust-ref, you can use the form available at:


or, send an e-mail with only 


in the body to majordomo@mcg.org.br 

The list trust-ref also actively doubles as an HTML searchable
repository (hence the name ref). The trust-ref search engine is
available at: http://www.mcg.org.br/search.htm

The list trust-ref is hosted as a free service to the Net community,
available to all interested parties and inviting discussions on the
broad aspects of trust.

Thank you!

Ed Gerck

[1] Some open questions are: Is that key from the actual sender? Is
the key valid at this very moment and for the purpose I want to use
it? Is the sender's private-key known to others, witttingly or not to
the sender? Can someone else have access to my messages after
decryption? Who else may influence the contents of messages sent to

Dr.rer.nat. E. Gerck                     egerck@novaware.cps.softex.br