Download presentation
Presentation is loading. Please wait.
Published byLamar Tyner Modified over 9 years ago
1
“You can't trust any bugger further than you can throw him, and there's nothing you can do about it, so let's have a drink” Terry Pratchett Trust Areas Steve Marsh Carleton University, November 25th, 2009 steve.marsh@crc.gc.ca © stephen marsh, 2009
2
Outline Why What (including talk of many things) What Next Caveats…
3
Caveats Point, not tell…
4
Why?
5
The need for assurance
6
Why? The wisdom of crowds
7
Why? The aggregation of data
8
Why? Squeezing the tomatoes
9
Agents
10
Services and Grid
11
What?
12
Authentication and Security Reputation Systems Trust Management Systems Trusted Computing Regret Management Trust Reasoning Grids Agents HCI, Persuasion
13
Trust Management
14
Umbrella
15
Trust Management Background
16
Trust Management Currently
17
Trust Management Rule or Reputation…
18
Authentication and Security Proving you are who you say you are Proving you’re an okay person Getting access to resources Sending private messages (and receiving same) Getting assurance Gaining confidence Sharing secrets
19
Authentication and Security PKI
20
Authentication and Security WoT
21
Authentication and Security PGP
22
Authentication and Security Trusted Computing No, wait…
23
Trusted Computing (deserves its own slides…)
24
Authentication and Security Policies and Negotiation
25
Reputation Management
26
Principles
27
Reputation Management Whuffie
28
Reputation Management Practice
29
Reputation Management PageRank
30
Reputation Management SlashDot
31
Reputation Management eBay
32
Reputation Management Quis custodiet ipsos custodes?
33
Reputation Management P2P
34
Reputation Management Referral networks and “if you liked this…”
35
Reputation Management The Strength of Weak Ties
36
Reputation Management Transitivity
37
Regret Management
38
Persuasion (HCI)
39
(Some of ) This should not work!
40
Problems Deceit Expectations Fraud Cheap pseudonyms Attacks
41
Problems Deceit Expectations Fraud Cheap pseudonyms See next lecture… Attacks
42
Resources
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.