Dimitri DeFigueiredo Earl Barr S. (Felix) Wu Adobe Systems Inc. UC Davis UC Davis International Conference on Privacy, Security, Risk and Trust 2009 1.

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

Mathematical Preliminaries
Advanced Piloting Cruise Plot.
1
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt ShapesPatterns Counting Number.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
ZMQS ZMQS
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Turing Machines.
PP Test Review Sections 6-1 to 6-6
ABC Technology Project
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
2 |SharePoint Saturday New York City
Green Eggs and Ham.
VOORBLAD.
15. Oktober Oktober Oktober 2012.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Copyright © 2013, 2009, 2006 Pearson Education, Inc.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
Sets Sets © 2005 Richard A. Medeiros next Patterns.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Addition 1’s to 20.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Subtraction: Adding UP
Slippery Slope
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Energy Generation in Mitochondria and Chlorplasts
CpSc 3220 Designing a Database
Presentation transcript:

Dimitri DeFigueiredo Earl Barr S. (Felix) Wu Adobe Systems Inc. UC Davis UC Davis International Conference on Privacy, Security, Risk and Trust

Overview Motivation Conceptual Properties Formal Model Theorems Key Point 2 PASSAT 2009

Can I trust him? What is it? What is it used for? 3 PASSAT 2009

Trust Trust is useful. What is it? What is it used for? Ratings are not the same as trust. Why not? 4 PASSAT 2009

How do we use Trust? Trust helps us avoid risks that depend on others We dont take risks with people we do not trust We are vulnerable to the actions of people we trust Trust is under each persons complete control I trust you as much as I want 5 PASSAT 2009

Basic Properties Two-role rule Domain specific Complete ordering Higher is better 6 PASSAT 2009

Trust Values Definition: Trust values are real numbers. Think in dollar$ How much would you bet C will be on time for dinner? 7 PASSAT 2009

Reputation Graph From your experience, how much would you bet C is a good seller? 8 PASSAT 2009 $100 B A C D E $20 $50 $10 $60 $30 $10

World G 0 G 1 G k A World is a sequence of reputation graphs 9 PASSAT 2009 …

Reputation Function World Trust Graph f … 10 PASSAT 2009

Trust Graph 11 PASSAT AB CD 20

Trust Graph 12 PASSAT AB CD ? ? ? ? ? ? ? ? ? 20

Trust Threshold Trusted or Untrusted? h A =30 h C =9 13 PASSAT AB CD 20

How can we make Trust transitive? 14 PASSAT AB CD 20

Trust - Definition Trust is the personal threshold determined by the trusting party that describes the maximum utility the trusting party is willing to risk when dealing with the trusted party. 15 PASSAT 2009

For any world W For any permutation of vertices π World Trust Graph … Normalized Reputation Function 16 PASSAT 2009 f

Why normalize? 17 PASSAT 2009 trusted Why? A B C F E D N.Y.T

Why normalize? 18 PASSAT 2009 N.Y.T. trusted A B C F E D

A DC B Types of Reputation Function Trivial 19 PASSAT 2009 AB C D A DC B

Types of Reputation Function Trivial Consensus-based 20 PASSAT 2009 A DC B AB C D 30 = 30

Types of Reputation Function Trivial Consensus-based Personalized 21 PASSAT 2009 A DC B AB C D

A Collusion 22 PASSAT AB CD 20

An Untrusted Collusion h A =30 23 PASSAT AB CD 20 10

W W A Manipulated World 24 PASSAT AB CD A DC B ? AB CD ? ? W Manipulated W f f h A =30

Non-exploitability For any trust threshold h a vertex chooses, no untrusted collusion can fool it. 25 PASSAT 2009 A DC B ? AB CD ? ? Manipulated W f

Theorems Impossibility All non-exploitable consensus-based reputation functions are trivial Possibility There are non-trivial non-exploitable personalized reputation functions 26 PASSAT 2009

Impossibility Proof Sketch h A = PASSAT A C=20D= B=50 What if h C = 30 ?!

Possibility Proof Sketch Constructive proof For a reputation threshold λ=0.5 Define: λ= PASSAT B A C

Possibility Proof Sketch Non-trivial λ= PASSAT B A C

Possibility Proof Sketch Non-exploitable For any trust threshold h set by any trusting party: untrusted node is not reachable unreachable node node cannot make other nodes reachable or unreachable 30 PASSAT B A C

Key Point Trust is a personal value. Rating systems should allow different people to have different points of view 31 PASSAT 2009

Questions? Thank you! Full version 32 PASSAT 2009