| Preface | 7 |
|---|
| Acknowledgments | 10 |
|---|
| Contents | 12 |
|---|
| Figures | 14 |
|---|
| Tables | 15 |
|---|
| About the Author | 16 |
|---|
| 1 Introduction: Motivations for a New Trust Model | 17 |
|---|
| 1.1 The Cybersecurity Context of the Mobile Internet | 18 |
| 1.2 Limitations of Current Trust Models | 21 |
| References | 26 |
| 2 Wireless Threats and Key Management Issues | 28 |
|---|
| 2.1 Attack Vectors in Wireless NGNs | 29 |
| 2.2 Key Management for Mobility in Wireless NGNs | 33 |
| 2.3 Current Approaches to Seamless Handovers | 38 |
| References | 45 |
| 3 Trust, Epistemic Normativity, and Rationality | 46 |
|---|
| 3.1 Motivations for Virtue Perspectivism | 47 |
| 3.2 Animal Knowledge and Reflective Knowledge | 50 |
| 3.3 Epistemic Circularity and Cross-Level Coherence | 56 |
| References | 61 |
| 4 Challenges to Virtue Perspectivism | 62 |
|---|
| 4.1 Legitimation and Retrospective Justification | 63 |
| 4.2 The Relation Between Belief and Action | 65 |
| 4.3 A 3-Level Basic Knowledge Structure | 73 |
| References | 76 |
| 5 Other Theories of Trust and Trust Models | 78 |
|---|
| 5.1 Self-Trust and Trust in Other People | 79 |
| 5.2 Basic Trust and Full-Fledged Trust | 81 |
| 5.3 Epistemically Rational Belief and Responsible Belief | 86 |
| References | 90 |
| 6 A Normative Virtue-Based Trust Model | 91 |
|---|
| 6.1 Trust Relations, Epistemic States, and Social Ends | 92 |
| 6.2 A Unified Theory of Trust | 98 |
| 6.3 Toward an Intercultural Theory of Trust | 102 |
| References | 108 |
| 7 Conclusion: Modeling Human Social Interaction | 110 |
|---|
| 7.1 Advantages of a Virtue-Based Trust Model | 111 |
| 7.2 General Features of a Virtue-Based Trust Model | 113 |
| 7.3 Summary | 115 |
| References | 119 |
| Glossary | 120 |