Interpersonal Trust Model Ing. Arnoštka Netrvalová DSS - seminar, 8.12.2008.

Slides:



Advertisements
Similar presentations
Revisiting the efficiency of malicious two party computation David Woodruff MIT.
Advertisements

Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Trust Modeling (Introduction) Ing. Arnoštka Netrvalová September 2008.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
Presentation 7 part 2: SOAP & WSDL. Ingeniørhøjskolen i Århus Slide 2 Outline Building blocks in Web Services SOA SOAP WSDL (UDDI)
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
1 © 1998 HRL Laboratories, LLC. All Rights Reserved Construction of Bayesian Networks for Diagnostics K. Wojtek Przytula: HRL Laboratories & Don Thompson:
Traffic Engineering With Traditional IP Routing Protocols
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust and Grid Computing Systems Presented By: Woodas Lai.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Chess Review May 11, 2005 Berkeley, CA Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
The Implicit Mapping into Feature Space. In order to learn non-linear relations with a linear machine, we need to select a set of non- linear features.
Chapter 5 Continuous Random Variables and Probability Distributions
PageRank Identifying key users in social networks Student : Ivan Todorović, 3231/2014 Mentor : Prof. Dr Veljko Milutinović.
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Agent-based E-travel Agency Agent Systems Laboratory Oklahoma State University
ECE355 Fall 2004Software Reliability1 ECE-355 Tutorial Jie Lian.
A User-Oriented Software Reliability Model Per Trygve Myhrer 20 februar Roger C. Cheung.
Multi-Agent Model to Multi-Process Transformation A Housing Market Case Study Gerhard Zimmermann Informatik University of Kaiserslautern.
Towards Highly Reliable Enterprise Network Services via Inference of Multi-level Dependencies Paramvir Bahl, Ranveer Chandra, Albert Greenberg, Srikanth.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Team Formation between Heterogeneous Actors Arlette van Wissen Virginia Dignum Kobi Gal Bart Kamphorst.
Computer Science 112 Fundamentals of Programming II Introduction to Graphs.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
University of Westminster – Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics.
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
4.4 The Fundamental Theorem of Calculus
Reputation Based Trust The using of reputation to accomplish trust between users on the Internet M.Vološin, R.Gore, Ibe2roč. PF UPJŠ, Košice, Slovakia.
1 ACTIVE FAULT TOLERANT SYSTEM for OPEN DISTRIBUTED COMPUTING (Autonomic and Trusted Computing 2006) Giray Kömürcü.
A Social Network-Based Trust Model for the Semantic Web Yu Zhang, Huajun Chen, and Zhaohui Wu Grid Computing Lab, College of Computer Science, Zhejiang.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
 Course Overview Distributed Systems IT332. Course Description  The course introduces the main principles underlying distributed systems: processes,
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
Measuring reputation in Testbeds Chrysa Papagianni, Symeon Papavassiliou National Technical University of Athens.
1 A Multi-Rate Routing Protocol with Connection Entropy for MANETs Cao Trong Hieu, Young Cheol Bang, Jin Ho Kim, Young An Kim, and Choong Seon Hong Presenter:
Data Communications and Networks Chapter 9 – Distributed Systems ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Paper Study – Propagation of Trust in E-commerce Communities, and others YuanDa Cao (曹元大), etc. Beijing Institute of Technology Presented by Vincent Dec/2004.
1 Developing Aerospace Applications with a Reliable Web Services Paradigm Pat. P. W. Chan and Michael R. Lyu Department of Computer Science and Engineering.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
1 Relational Factor Graphs Lin Liao Joint work with Dieter Fox.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Biostatistics Class 3 Probability Distributions 2/15/2000.
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Trustworthiness Management in the Social Internet of Things
The Beta Reputation System
Giannis F. Marias, Vassileios Tsetsos,
بسم الله الرحمن الرحيم.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
GANG: Detecting Fraudulent Users in OSNs
Presentation transcript:

Interpersonal Trust Model Ing. Arnoštka Netrvalová DSS - seminar,

2 Interpersonal trust model Why? Where? What? Trust definition Trust values Trust types Mapping functions Trust representation Personal trust factors Personal trust design Personal trust forming Aggregation and transformation Model behaviour study Personal trust effect Conclusion Fide, sed qui fidas, vide. It is an equal failing to trust everybody, and to trust nobody. [ChangingMinds.org] /33

3 DSS-seminar, WHY? WHERE? Phenomenon of everyday life Internet e-banking – credibility e-commerce – trustworthiness of partners e-service – quality, promptness PC and computing /33 Interpersonal trust model

4 DSS-seminar, WHERE? WHAT? Computing and trust P2P systems – security (working together of nodes) GRID computing – security (reliability of sources, users) AD HOC networks – message integrity (node =server, router, client, malicious nodes, special protocols, cryptographic codes) MAS – security dependability (malicious agent detection, migrating, selection of „the best“ agent, system’s optimization) Semantic web – credibility of sources (machine information collection) /33 Interpersonal trust model

5 DSS-seminar, Trust definition Trust (or symmetrically, distrust) is a particular level of the subjective probability with which an agent will perform a particular action, both before we can monitor such an action (or independently of our capacity of ever to be able to monitor it) and in a context in which it affects our own action Gambetta's definition was derived as a summary of the contributions to the symposium on trust in Cambridge, England, /33 Interpersonal trust model THE TRUST THE TRUST in an individual is a commitment to an action based on a belief that the future actions of that individual will be make for a good outcome.

6 DSS-seminar, Trust values  Blind trust High trust Low trust Absolute distrust Ignorance Low distrust High distrust /33 Interpersonal trust model

7 DSS-seminar, Trust types personal personal – trust between entity - unilateral - reciprocal phenomenal phenomenal – trust to phenomenon (products of phenomenon) /33 Interpersonal trust model

8 DSS-seminar, Mapping function /33 Interpersonal trust model  non-linear  asymmetrical

9 DSS-seminar, Personal trust description Group of n autonomous individuals X ={x 1, x 2, …, x n } Measure of the interpersonal trust (between two individual x i and x j ) Reciprocal trust: x i →x j and x j →x i [ ] Trust representation (in the group) The interpersonal trust in the group - directed weighted graph vertices - the individuals directed edge with weight - measure of interpersonal trust Complete distrust Complete distrust - edge with zero weight No contact No contact - no edge /33 Interpersonal trust model

10 DSS-seminar, Group trust representation A B C /33 Interpersonal trust model Example: Representation of personal trust in three individual’s group (A, B, and C) Trust (adjacency) matrix

11 DSS-seminar, Basic personal trust factors Initial trust  Initial trust – is defined as the initial trust value Reputation  Reputation of an entity - is an expectation of its behavior based on information about the entity’s past behavior within a specific context at a given time Recommendation  Recommendation – is based on expectation given by other entities’ observations by communication Contact  Contact – represents direct trust experience  Disposition  Disposition – acceptation intensity of acquired information /33 Interpersonal trust model

12 DSS-seminar, Personal trust factors representation /33 Interpersonal trust model Initial trust matrix Reputation matrix Contact matrix Recommendation matrix Disposition matrix

13 DSS-seminar, Personal trust design /33 Interpersonal trust model Subject Knowledge Base Communication Reputations Recommendations Trust Evaluation Contacts Disposition Initial trust Group of subjects Context

14 DSS-seminar, Personal trust forming - personal trust i-th entity to j-th entity - number of reciprocal contacts i-th and j-th entities - number of recommendations of j-th entity to i-th from others - reputation of j-th entity at i-th entity - randomness, where 0≤  <  1 0  1 1 /33 Interpersonal trust model

15 DSS-seminar, weight (effect) of reputation (constant / number of steps) - weight (sum of contacts of i-th subject) - weight (sum of recommendations of j-th subject to i-th one Personal trust forming /33 Interpersonal trust model

16 DSS-seminar, Aggregation function /33 Interpersonal trust model

17 DSS-seminar, Transformation – logistic S-curve Interpersonal trust model /33 Transformation  bounded interval  0, 1  Option: min, max  weights Linear transformation (min, max known )Universal transformation

18 DSS-seminar, Model behavior study Personal trust forming Number of contacts influence Number of recommendations influence Initial trust influence Reputation influence Trust disposition influence Weight of contacts effect Weight of recommendations effect Weight of reputation effect /33 Interpersonal trust model

19 DSS-seminar, Personal trust – study /33 Interpersonal trust model

20 DSS-seminar, Personal trust – study Obr. 4: Graf utváření důvěry se zobrazením uskutečněných kontaktů a /33 Interpersonal trust model

21 DSS-seminar, Personal trust – study /33 Interpersonal trust model

22 DSS-seminar, Personal trust – study /33 Interpersonal trust model

23 DSS-seminar, Personal trust – study /33 Interpersonal trust model

24 DSS-seminar, Personal trust – study /33 Interpersonal trust model

25 DSS-seminar, Personal trust – study /33 Interpersonal trust model

26 DSS-seminar, Personal trust – study /33 Interpersonal trust model

27 DSS-seminar, Personal trust – study /33 Interpersonal trust model

28 DSS-seminar, Personal trust – study /33 Interpersonal trust model

29 DSS-seminar, Information effect model Transformation – joint initial and effective probability distribution Initial probability distribution p(x) (Input) Effective probability distribution r(x) Final probability distribution q(x) (Output) Convenient measure of intensity effect evaluation: Potential solution: /33 Interpersonal trust model

30 DSS-seminar, Example: Symmetrical divergence Interpersonal trust model /33 Commodity: Apples Given % inter-weeks tolerance = 0,05% Symmetrical divergence (incr., decr.) Price CZK/kg,

31 DSS-seminar, Personal trust effect λ   0, 1  - effect intensity E(α,  ), 0≤α<  ≤1 - effect distribution /33 n – number of subjects, i -th subject, i -th subject Interpersonal trust model

32 DSS-seminar, Conclusion /33 Interpersonal trust model Cooperation – selection of partners (published) Cooperation – selection of partners (published) Personal trust model (submitted) Personal trust model (submitted) Phenomenal trust model (simultaneous verification) Phenomenal trust model (simultaneous verification) Trust model with intervention by agent technology application (JADE) Trust model with intervention by agent technology application (JADE) Available information:

Thank you for your attention. Questions?