Trust Modeling (Introduction) Ing. Arnoštka Netrvalová September 2008.

Slides:



Advertisements
Similar presentations
1DAML PI meeting, October DAML and Agents DAML and Agents Breakout Session DAML PI Meeting 17 October 2002 Tim Finin.
Advertisements

The e-Framework Bill Olivier Director Development, Systems and Technology JISC.
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
On the Economics of P2P Systems Speaker Coby Fernandess.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Dinker Batra CLUSTERING Categories of Clusters. Dinker Batra Introduction A computer cluster is a group of linked computers, working together closely.
Interpersonal Trust Model Ing. Arnoštka Netrvalová DSS - seminar,
CUSTOMER NEEDS ELICITATION FOR PRODUCT CUSTOMIZATION Yue Wang Advisor: Prof. Tseng Advanced Manufacturing Institute Hong Kong University of Science and.
Nadia Ranaldo - Eugenio Zimeo Department of Engineering University of Sannio – Benevento – Italy 2008 ProActive and GCM User Group Orchestrating.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 WEEK 10 Intelligent (Software) Agents. 2 Case Scenario Every year, ABC Enterprise will conduct annual general meeting (AGM) to report company performance.
Trust and Grid Computing Systems Presented By: Woodas Lai.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
A Secure Network Access Protocol (SNAP) A. F. Al Shahri, D. G. Smith and J. M. Irvine Proceedings of the Eighth IEEE International Symposium on Computers.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Level 2 Mobile and Games Programming Modules Cathy French K233.
Introduction What is this ? What is this ? This project is a part of a scientific research in machine learning, whose objective is to develop a system,
A New Replay Attack Against Anonymous Communication Networks Xinwen Fu June 30, 2015.
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
Agent-based E-travel Agency Agent Systems Laboratory Oklahoma State University
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 Trusted Digital Repositories,
Margaret J. Cox King’s College London
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
What are Webservices?. Web Services  What are Web Services?  Examine important Web Services acronyms (UDDI, SOAP, XML and WSDL)  What are the benefits.
1 CS 456 Software Engineering. 2 Contents 3 Chapter 1: Introduction.
Ali YILDIRIM Emre UZUNCAKARA
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
Lecture 0 Anish Arora CSE 6333 Introduction to Distributed Computing.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
The Caribbean Knowledge Management Portal Knowledge Management for the Caribbean Information Society.
Semantic Interoperability Berlin, 25 March 2008 Semantically Enhanced Resource Allocator Marc de Palol Jorge Ejarque, Iñigo Goiri, Ferran Julià, Jordi.
DIS 605: COLLINS OYUNGE OBIERO D61/70674/2008.  INTRODUCTION  What Is Social Networking? Social networking is the grouping of individuals into specific.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Proposed Task-Based VQEG Project Carolyn Ford, Mikołaj Leszczuk.
Introduction to Grid Computing to students attending Concurrent and Distributed Programming courses Zaharije Radivojević School of Electrical Engineering.
Objectives: Graph the functions listed in the Library of Functions
Service - Oriented Middleware for Distributed Data Mining on the Grid ,劉妘鑏 Antonio C., Domenico T., and Paolo T. Journal of Parallel and Distributed.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Introduction to Server-Side Web Development Introduction to Server-Side Web Development using JSP and Web Services JSP and Web Services 18 th March 2005.
Scenarios for a Learning GRID Online Educa Nov 30 – Dec 2, 2005, Berlin, Germany Nicola Capuano, Agathe Merceron, PierLuigi Ritrovato
1 ACTIVE FAULT TOLERANT SYSTEM for OPEN DISTRIBUTED COMPUTING (Autonomic and Trusted Computing 2006) Giray Kömürcü.
Veronica Eyo Sharvari Joshi. The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic.
A Social Network-Based Trust Model for the Semantic Web Yu Zhang, Huajun Chen, and Zhaohui Wu Grid Computing Lab, College of Computer Science, Zhejiang.
Riga Technical University Department of System Theory and Design Usage of Multi-Agent Paradigm in Multi-Robot Systems Integration Assistant professor Egons.
XXIII International Symposium on Nuclear Electronics & Computing NEC’11 JINR DOCUMENT SERVER: Current Status and Future Plans I.Filozova, S.Kuniaev, G.Musulmanbekov,
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Xi He Golisano College of Computing and Information Sciences Rochester Institute of Technology Rochester, NY THERMAL-AWARE RESOURCE.
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
Retele de senzori EEMon Electrical Energy Monitoring System.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
Presented by Edith Ngai MPhil Term 3 Presentation
Building Distributed Educational Applications using P2P
Enterprise Computing Collaboration System Example
CASE − Cognitive Agents for Social Environments
A framework for ontology Learning FROM Big Data
Presentation transcript:

Trust Modeling (Introduction) Ing. Arnoštka Netrvalová September 2008

2 Trust modeling Why? Where? What? Behaviour and trust Trust representation Trust visualization Trust forming Trust, agents and MAS Cooperation Results Can it be trusted? / 25 Fide, sed qui fidas, vide. It is an equal failing to trust everybody, and to trust nobody. [ChangingMinds.org]

3 September 2008 WHY? WHERE? Phenomenon of everyday life Internet e-banking – credibility e-commerce – trustworthiness of partners e-service – quality, promptness PC and computing /25 Trust modeling

4 September 2008 WHERE? WHAT? Computing and trust P2P systems – security (working together of nodes) GRID computing – security (reliability of sources, users) AD HOC networks – message integrity (node =server, router, client, malicious nodes, special protocols, cryptographic codes) MAS – security dependability (malicious agent detection, migrating, selection of „the best“ agent, system’s optimization) Semantic web – credibility of sources (machine information collection) /25 Trust modeling

5 September 2008 Trust definition Trust (or symmetrically, distrust) is a particular level of the subjective probability with which an agent will perform a particular action, both before we can monitor such an action (or independently of our capacity of ever to be able to monitor it) and in a context in which it affects our own action. /25 Trust modeling Gambetta's definition was derived as a summary of the contributions to the symposium on trust in Cambridge, England, 1988.

6 September 2008 “I trust him.” “How much do I trust him?” “How much I think, he trusts me ?” What does it mean? Can trust be measured? What is visual representation of trust? Behaviour and trust /25 Trust modeling

7 September 2008     Basic trust levels Blind trust Ignorance Absolute distrust   /25 Trust modeling

8 September 2008 Representation of trust value /25 Trust modeling  Blind trust High trust Low trust Absolute distrust Ignorance Low distrust High distrust

9 September 2008 Hysteretic trust loop Absolute distrust Blind trust Trust value /25 Trust modeling Interval

10 September 2008 Trust visualization „Trust square“: two relation for couple and one value per relationship /25 (1, 0)trust distrust Subject A distrusttrust (1, 1) (0, 1) (0, 0) Subject B (0.5, 0.5) Trust modeling

11 September 2008 Trust visualization BASIC: 1 couple of reciprocal distrust 3 couple - one entity trusts the other one and the other entity distrusts completely the first one 5 couple - one entity trusts and the other one is indifferent 7 couple - one entity is indifferent and the other distrusts the first one 9 - both entities are indifferent to each other or no relationship between them /25 Example: Trust in community Trust modeling

12 September 2008 Trust types personal personal – trust between entity - unilateral - reciprocal phenomenal phenomenal – trust to phenomenon (product) A B C Example: Representation of personal trust in group /25 Trust modeling

13 September 2008 Personal trust forming - personal trust i-th entity to j-th entity - personal trust j-th entity to i-th entity - number of reciprocal contacts i-th and j-th entities - number of recommendations of j-th entity to i-th from others - knowledge (learning, testing set) - reputation of j-th entity at i-th entity - randomness, where 0<  <  1 - trust difference (trust acquisition, trust loss) /25 Trust modeling

14 September 2008 /25 Phenomenal trust forming - trust i-th entity in k-th product - number of recommendation of k-th product to i-th entity - reputation of k-th product at i-th entity - randomness, where 0<  <  1 - trust difference (trust acquisition, trust loss) Trust modeling

15 September 2008 Trust model concept Basic idea - intervention trust model /25      Producers    World  Dominator     Consumers      Application support ---- control ….. data  communication Trust modeling 

16 September 2008 Environment Agent Trust, agents and MAS /25 Trust modeling PerceptionRepresentation Knowledge base Decision making PlanningAction Learning Agents Agent Communication Knowledge base Reputations Recommendations Trust Evaluation Context

17 September 2008 Software for agent modeling and simulation RETSINA (Reusable Environment for Task-Structured Intelligent Networked Agents ) - Carnegie Mellon University Swarm (Swarm Intelligence) - Santa FE Research Institute JADE (Java Agent DEvelopment Framework) JADE - development of MAS(FIPA standards), middleware Runtime environment Libraries for development of agent Graphical tool package for administration and monitoring of agents /25 Trust modeling

18 September 2008 Cooperation – selection of partners Application Graph theory Game theory Risk - “caution index” Reciprocal trust Trust matrix /25 Trust modeling

19 September 2008 Cooperation – caution index Payoff matrix Payoff matrix r = (y -z) x = g = (x -y) w = (1- ) t = (w -x) z = (1- ) y = (1- ) (1- ) /25 Caution matrix Caution index Trust modeling

20 September 2008 Cooperation - criteria of couple selection Trust modeling Criteria of couple selection Minimum: 1. means both of caution index 2. maximum of caution index of evaluated couples Reduced caution matrix (pre-selected pairs)

21 September 2008 Results – personal trust (Trustor) /25 Trust modeling

22 September 2008 Results - cooperation Example (n=15,  =10°, t ij - random): [0;6] c[0.45;0.15] t[0.96;0.82] [4;9] c[0.52;0.35] t[0.79;0.72] [4;13] c[0.19;0.51] t[0.78;0.94] [5;9] c[0.40;0.49] t[0.71;0.74] [5;10] c[0.36;0.50] t[0.72;0,79] [9;12] c[0.56;0.24] t[0.88;0.72] [12;14] c[0.40;0.36] t[0.83;0.81] /25 Group size n (α=15°)Number of identical couples/1000 runs Trust modeling

23 September 2008 Can it be trusted? Trust in Math The classic proof that 2 = 1 runs thus. 1. First, let x = y = 1. Then: x = y 2. x 2 = xy 3. x 2 - y 2 = xy - y 2 4. (x + y)(x - y) = y (x - y) 5. x + y = y 6. 2 = 1 Now, you could look at that, and shrug, and say … /25 Trust modeling

24 September 2008 Důvěra, práce a výsledky Trust modeling „Malá důvěra je příčinou třenic a sporů, často vyvolaných neetickým či neprofesionálním jednáním. Jejím projevem jsou skryté agendy a politikaření skupin. Bývá zdrojem nezdravé rivality, vede k uvažování „výhra-prohra“ a ústí do defenzivní komunikace. Důsledkem je snížení rychlosti a zvýšení námahy při řešení úkolů.“ … … „Tím nejdůležitějším faktorem ovlivňujícím důvěru jsou výsledky. Avšak být důvěryhodným, neznamená jen mít výsledky, ale také docílit, aby o nich věděli i ostatní.“ Stephen M. R. Covey: Důvěra: jediná věc, která dokáže změnit vše, Management Press, 2008 [Stephen M. R. Covey: The Speed of Trust, Free Press, New York, 2006] /25

Thank you for your attention.