يك مدل اعتماد توزيع‍شده براي محيطهاي محاسبات فراگير

Slides:



Advertisements
Similar presentations
UBICOMP-RG BOF II Adrian Friday, Oliver Storz and Nigel Davies Lancaster University & University of Arizona.
Advertisements

The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
Trust and Reputation in Social Networks Laura Zavala 03/2010.
Foundations of Comparative Analytics for Uncertainty in Graphs Lise Getoor, University of Maryland Alex Pang, UC Santa Cruz Lisa Singh, Georgetown University.
Crash Scene Re-Generation Using Structural Hidden Markov Models Professor Djamel Bouchaffra (Advisor) Raef Aidibi (Ph.D. Student) Computer Science & Engineering.
Information Agents for Autonomous Acquisition of Sensor Network Data A. Rogers and N. R. Jennings University of Southampton, UK M. A. Osborne and S. J.
WI/AOC Related Work (supported by RGC/CA) Jiming Liu, HKBU Aug 27, 2005.
Wednesday, September 6, rd International Conference on Trust, Privacy & Security in Digital Business Kraków, Poland, September 4-8, 2006 Panel Discussion:
Intelligent Web Applications (Part 1) Course Introduction Vagan Terziyan AI Department, Kharkov National University of Radioelectronics / MIT Department,
Teaching and Learning. Topics Knowledge Surveys Clickers Online/Hybrid Courses Student Peer Review Systems.
WRITING REFERENCES ULAB  General & Specialized References (books)  Journals / Periodicals (print and electronic)  Conference / Symposium articles.
U.S. National Committee for CODATA Overview of Recent Activities and Plans September 2006 U.S. National Committee for CODATA Overview of Recent Activities.
Microsoft Research Innovation at the Frontiers of Computing Andrew Herbert Chairman, Microsoft Research, EMEA 31st March 2011.
ACCURATE TELEMONITORING OF PARKINSON’S DISEASE SYMPTOM SEVERITY USING SPEECH SIGNALS Schematic representation of the UPDRS estimation process Athanasios.
Marco Blumendorf I July 21th, 2009 Towards a Model-Based Framework for the Development of Adaptive Multimodal User Interfaces.
DCS 891C Research Seminar Summer 2004 July 16, 2004 Richard Harvey
Wrocław University of Technology leaded by Ngoc Thanh Nguyen Institute of Information Science and Engineering Multi-agent Systems and Knowledge Integration.
revised CmpE 583 Fall 2006Discussion: OWL- 1 CmpE 583- Web Semantics: Theory and Practice DISCUSSION: OWL Atilla ELÇİ Computer Engineering.
Ontology Based Context Model Yingyi Bu NjuIcs. What is Context? Any information that can be used characterize the situation of an entity, where an entity.
I5310 : Part II Context-Aware Computing [Introduction to the course] Yun-Maw Kevin Cheng 鄭穎懋 Context-Aware Interactive Systems Lab.
Patterns for Location and Context-based access control
The Generalization of λ-fuzzy measures on Application to Options Pricing   Liyan Han, Wenli Chen, Juan Zhou School of economics & management, Beihang.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Loc-based Variability for Mobile Information Systems Raian Ali, Fabiano Dalpiaz, Paolo Giorgini CAiSE’ June 2008.
A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.
Sanna Liimatainen T Internetworking Seminar1 Scientific Writing T Internetworking Seminar Sanna Liimatainen, Lic. Sc. (Tech)
Secure Systems Research Group - FAU Contexts and Context-based Access Control Model PhD Dissertation Progress Report Candidate: Alvaro E. Escobar Advisors:
updated CmpE 583 Fall 2008 Ontology Integration- 1 CmpE 583- Web Semantics: Theory and Practice ONTOLOGY INTEGRATION Atilla ELÇİ Computer.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
CSCE 824 Secure and Distributed Database Management Systems FarkasCSCE 8241.
1 Why? Who? What? Jon Oberlander Director of SICSA.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Software Quality Improvements from Refactoring Wes J. Lloyd July 15, 2008 Computer Science Department Colorado State University Dr. Sudipto Ghosh, co-advisor.
1 Granular Computing: Formal Theory & Applications Tsau Young (‘T. Y.’) Lin GrC Society and Computer Science Department, San Jose State University San.
Majid Sazvar Knowledge Engineering Research Group Ferdowsi University of Mashhad Semantic Web Reasoning.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Paper Study – Propagation of Trust in E-commerce Communities, and others YuanDa Cao (曹元大), etc. Beijing Institute of Technology Presented by Vincent Dec/2004.
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
Analysing the Relationship between Risk and Trust By Audun Jøsang and Stéphzne Lo Presti.
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
NEW TRENDS IN EDUCATION OF ROBOTICS Óbuda University, Doctoral School of Safety and Security Sciences, Budapest, Hungary Gyula.
Upcoming Conferences, Workshops and Journals of Interest BRWS Meeting July 18, 2002 Bruce Spencer.
Journal Ranking John Lamp Julie Fisher. The process ACPHIS journal rankings have been supplied to the ERA ACPHIS journal ranking differ from some CORE.
Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management Knowledge & Data Engineering Group, School of Computer Science & Statistics,
Miklós Zoltán Technical University of Vienna Distributed Systems Group
معرفی مجموعه‌ای از الگوهای فرآيند مخصوص نرم‌افزارهای بی‌درنگ
The Next Steps to the Future of the Internet
A Data Management framework for Mobile Ad hoc Networks (MANET)
Services Computing Taxonomy
Computer Engineering Department Eastern Mediterranean University
National Taiwan University of Science and Technology
Postgraduate Research in Edinburgh
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Knowledge Discovery in the Semantic Web
نمايش زمينه توسط وب معنايي براي محيط‌هاي محاسبات فراگير
روشي جديد برای آزمون مدل ماشين های محدوديت احتمالی
Introduction to Agents
UNDERGROUNDCOAL.COM.AU March ’09
Thoughts on IEEE My Vision as President
Albert Park, Ph.D. Background: Public Health Informatics, Consumer Health Informatics, Data and Computational Science, Human-Computer.
Electronic Resources for Mathematics and Statistics
A Survey of Trust Management Systems
Fig. 1 Flow chart of included patients for analyses
CSE 4340/5349 Mobile Systems Engineering
Presentation transcript:

يك مدل اعتماد توزيع‍شده براي محيطهاي محاسبات فراگير A Distributed Trust Model for Pervasive Computing Environments محسن طاهريان استاد راهنما: دكتر رسول جليلي استاد مشاور: دكتر حسن ابوالحسني دانشكده كامپيوتر، دانشگاه صنعتي شريف، زمستان 85.

فهرست مطالب اعتماد چيست؟ اعتماد در مقابل شهرت مدلهاي اعتماد در محيطهاي توزيع‍شده محيطهاي محاسبات فراگير كارهاي انجام شده كار آينده

اعتماد در زندگي روزمره پيشرفتهای اخير در فناوری شبکه و ريزپردازنده نقش روزافزون کامپيوتر و تکنولوژی در زندگی تبادلات الكترونيكي در محيط وب مشکلاتی چون ويروسهای کامپيوتری نقش عنصر ”اعتماد“ در کاربر ؟! دشواري يافتن شواهد در مورد طرفي كه از ما دور است

تعريف اعتماد (Trust) تعريف 1 تعريف 2 تعريف 3 رفتار مبتني بر اعتماد زماني رخ مي‍دهد كه يك شخص با يك مسير مبهم مواجه مي‍شود كه نتيجه انتخاب او مي‍تواند خوب و يا بد باشد و نتيجه خوب يا بد به عمل شخص ديگري وابسته است. زياني كه نتيجه بد وارد مي‍سازد بيشتر از سودي است كه نتيجه خوب براي ما دارد. حال اگر شخص بخواهد اين مسير را انتخاب كند، در واقع يك انتخاب بر مبناي اعتماد انجام داده است و اگر اين مسير را انتخاب نكند، او عدم اعتماد را پيشه كرده است (Morton Deutsch, 1962). تعريف 2 اعتماد، احتمال ذهني است كه شخص A انتظار دارد شخص B عملي انجام دهد كه منجر به شادكامي او گردد (Gambetta, 1988). تعريف 3 اعتماد، محدوده و وسعتي است كه يك طرف مايل است در يك موقعيت همراه با يك احساس امنيت به طرف ديگر وابسته باشد و حتي نتايج منفي براي اين اعتماد ممكن است (McKnigh, 1996 و Chervany).

اعتماد و شهرت تعريف تفاوت اعتماد و شهرت شهرت، چيزي است كه به طور عمومي در مورد شخصيت كسي و يا وضعيت چيزي گفته مي‍شود (ديكشنري آكسفورد). تفاوت اعتماد و شهرت من به دليل شهرت خوبِ تو، به تو اعتماد مي‍كنم. من عليرغم شهرت بدِ تو، به تو اعتماد مي‍كنم.

اعتماد در محيطهاي توزيع‍شده معماري متمركز معماري غيرمتمركز

مدلهاي موجود براي اعتماد جمع و يا ميانگين ساده eBay تئوري بيزين مدل اعتقادي (Belief Model) Josang (2001) مدلهاي فازي مدل شاره Google Page Rank

مدلهاي اعتماد شناخته شده محيطهاي كاربرد Public Key Infra-Structure Maurer (1996) شبكه‍هاي اجتماعي در وب الگوريتم TidalTrust - Golbeck (2005) بر اساس منطق ذهني - Josang (2006) بيان و استدلال فازي – لساني 2006 شبكه‍هاي P2P روش فازي - Griffiths (2006) محيطهاي چند عامل محيطهاي محاسبات فراگير بر اساس اعتبار – Joshi , Kagal (2001)

محاسبات فراگير تاريخچه با رشد سيستمهاي توزيع‍شده از سال 1970مسائل جديدي مطرح گشت تغيير در كيفيت شبكه، عناصر متحرك، محدوديت وزن و اندازه عناصر، مصرف انرژي. ساخت سيستمهاي توزيع‍شده با عناصر متحرك مارك ويزر در سال 91: تكنولوژيهاي نامرئي و آميخته با زندگي روزمره

خصوصيات محاسبات فراگير تحرك موجوديت‍ها ويژگيهاي ديگر استفاده موثر از فضاهاي هوشمند تاثير متقابل كاربر و محيط بر يكديگر نامرئيت كمترين مزاحمت براي كاربر قابليت گسترش محلي‍شده اهميت فاصله فيزيكي كاهش حجم محاسبات كاربر با دور شدن وي از محيط عملياتي پوشاندن شرايط يكنواخت عدم يكنواختي زيرساختارها جبران عدم هوشمندي محيط با ابزار محاسباتي شخصي كاربر

معماريهاي محاسبات فراگير اجزا مشتري محاسبات فراگير (ابزار محاسباتي كاربر) كارگزار محاسبات فراگير كاربر محاسبات فراگير

معماريهاي محاسبات فراگير (ادامه) اجزا ابزار فراگير شبكه فراگير ميان‍افزار فراگير برنامه‍هاي كاربردي

اعتماد در محاسبات فراگير

كار آينده مشكلات موجود كار آينده عدم وجود مدل محاسباتي اعتماد در محاسبات فراگير عدم درنظرگيري امنيت نرم (محافظت كاربران در برابر منابع بد) كار آينده بررسي نقاط عدم تطابق الگوريتمهاي موجود اعتماد و ويژگيهاي خاص محاسبات فراگير ارائه يك مدل منطبق با ويژگيهاي محاسبات فراگير تعريف الگوريتمهاي تركيب و استنتاج در اين مدل به منظور اختصاص مقادير عددي اعتماد بيان رسمي و صوري مدل الگوريتم شبكه مقاومتي براي استنتاج در گراف اعتماد

خصوصيات مدل پيشنهادي خودمختاري پويايي (مدل اعتماد آگاه از زمينه) سادگي (مصرف انرژي كم) امنيت همكاري (استفاده از دانش زيرسيستمهاي موجود) ريزدانگي (اختصاص مقادير اعتماد به عناصر محيط) جامعيت (كاربردپذيري در ساير محيطهاي توزيع‍شده)

زمانبندي ادامه كار ارائه مدل مفهومي اعتماد و بيان معماري كلي آن براي محاسبات فراگير 2 ماه ارائه الگوريتمهاي استنتاج و تركيب اعتماد در مدل چگونگي كاربردپذيري مدل در ساير محيطهاي توزيع‍شده نظير P2P 1.5 ماه بيان مدل به صورت رسمي و صوري 1 ماه جمع‍بندي و تهيه مستندات پروژه

مراجع L. Kagal, T. Finin, and A. Joshi. “Moving from Security to Distributed Trust in Ubiquitous Computing Environments”, IEEE Computer, December 2001. M. Blaze, J. Feigenbaum, and A. D. Keromytis. “The role of trust management in distributed systems security”, In Proceedings of the Secure Internet Programming, pages 185-210, 1999. C. English, P. Nixon, S. Terzis, A. McGettrick and H. Lowe. “Dynamic Trust Models for Ubiquitous Computing Environments”, Ubicomp Security Workshop, 2002. M. Satyanarayanan. “Pervasive computing: Vision and Challenges”, IEEE Personal Communications , Vol. 8, No. 4, pages 10-17, Aug 2001. M. Nielsen and K. Krukow. “Towards a formal notion of trust”, In Proceedings from the 5th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming (PPDP’03), pages 4-7, ACM Press, 2003. S. P. Marsh. “Formalizing Trust as a Computational Concept”, PhD thesis, Department of Mathematics and Computer Science, University of Stirling, 1994. D.W. Manchala. “Trust Metrics, Models and Protocols for Electronic Commerce Transactions”, In Proceedings of the 18th International Conference on Distributed Computing Systems, 1998. A. Jøsang and S. Lo Presti. “Analysing the Relationship Between Risk and Trust”, In Proceedings of the Second International Conference on Trust Management, Oxford, March 2004. A. Abdul-Rahman and S. Hailes. “A Distributed Trust Model”, In Proceedings of the New Security Paradigms Workshop, ACM Press, pages 48–60, 1998. J. Golbeck. “Computing and Applying Trust in Web-based Social Networks”, Doctor of Philosophy Dissertation, University of Maryland, College Park, 2005, 200 pages. A. Josang , R. Hayward and S. Pope. “Trust Network Analysis with Subjective Logic”, In Proceedings of the Australasian Computer Science Conference (ACSC2006), 2006. A. Josang. “A Logic for Uncertain Probabilities”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. Vol. 9, Issue 3, pages 279-311, June 2001. N. Griffiths, K.-M. Chao, and M. Younas, “Fuzzy Trust for Peer-to-Peer systems”, In Proceedings of P2P Data and Knowledge Sharing Workshop (P2P/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, July 2006. N. Griffiths, “A Fuzzy Approach to Reasoning with Trust”, Distrust and Insufficient Trust in Proceedings of the 10th International Workshop on Cooperative Information Agents, Edinburgh, UK, pp. 360-374, Springer, September 2006. M. Lesani and S. Bagheri, “Applying and Inferring Fuzzy Trust in Semantic Web Social Networks”, In Proceeding of the Canadian Semantic Web Working Symposium Conference 2006. M. Weiser. “The Computer for the 21st Century”, Scientific American, September, 1991. D. Saha and A. Mukherjee. "Pervasive Computing: A Paradigm for the 21st Century", Published by the IEEE Computer Society, March 2003. L. Kagal, T. Finin, and A. Joshi. “Trust-based security in pervasive computing environments”, IEEE Computer, Vol. 34 No. 12, pages 154-157, December 2001.

پايان از توجه شما متشكرم.