Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Wireless next generation networks : a virtue-based trust model
Harvey M., Springer Publishing Company, Incorporated, New York, NY, 2014. 117 pp. Type: Book (978-3-319119-02-1)
Date Reviewed: Mar 23 2015

This is an interesting book. The author, trained in physics and astronomy, has master’s degrees from three universities where he studied epistemology, theory of religion, cognitive psychology, and computer science. According to the notes, he is currently studying cyber security.

This short book of about 100 pages comes with a ten-page glossary but no index. The format is largely prose accompanied by several figures. The setting is the area where mobile and fixed networks converge, with emphasis on the so-called next-generation networks. (As an aside, the acronym NGN for next-generation network has been in use for over 20 years and should perhaps be retired.) The author’s premise is that in the imminent future, trust models based upon the exchange of digital credentials or access control procedures cannot be reliably extended to the emerging universe of communicating entities.

The author proposes: “A virtue-based trust model [could be] an efficient and flexible version of trust without identity based on the actions of an entity rather than on personal knowledge of the actor.” The seven chapters develop the author’s concept of a value-based trust model. The book begins with two chapters discussing the state of trust in the emerging network of networks. The limitations of current trust models and various attack vectors in wireless networks are also covered.

Chapters 3 through 6 cover ways to consider value perspectivism and theories of trust and trust models. Chapter 6 proposes “a unified theory of trust” and “an intercultural theory of trust.”

The concluding chapter, “Conclusion: Modeling Human Social Interaction,” lays out the author’s reasons why current trust models are inadequate, and how the proposed virtue-based trust models could improve the situation.

The book contains long discussions drawn from the referenced material. The author frequently refers to the work of others. One of the most frequent phrases is in the form of: “[so-and-so] argues that” followed by long passages cited from the source. Not an expert in formal epistemology, I found the work densely worded and difficult to read.

The main conclusion rests upon the two parties developing trust based upon their exchanges. The possibility that one of the members of the exchange might be a devious exploiter of a trusting partner is not considered. A backstabber (call him Brutus) could establish a virtue-based trust relationship with a partner (call him Caesar) and wait until the Ides of March to turn on the unsuspecting partner. “Trust, but verify” may be necessary but not sufficient.

There is merit in the work, but many questions remain.

Reviewer:  J. S. Edwards Review #: CR143262 (1506-0427)
Bookmark and Share
  Featured Reviewer  
 
Wireless Communication (C.2.1 ... )
 
 
Data Communications (C.2.0 ... )
 
 
Modeling Techniques (C.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Wireless Communication": Date
Mobile power management for wireless communication networks
Rulnick J., Bambos N. Wireless Networks 3(1): 3-14, 1997. Type: Article
Aug 1 1998
New call blocking versus handoff blocking in cellular networks
Sidi M., Starobinski D. Wireless Networks 3(1): 15-27, 1997. Type: Article
Sep 1 1998
The wireless Net
Fowler D. netWorker: The Craft of Network Computing 1(2): 24-34, 1997. Type: Article
Sep 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy