A Survey of Trust Evaluation Methods (Supervisor: Yan Wang) Name:Erden Sacan Student ID:40916332 Unit:ITEC810.

Slides:



Advertisements
Similar presentations
Lecture 2 - Revenue Models
Advertisements

3 Copyright © 2005, Oracle. All rights reserved. Designing J2EE Applications.
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Paul Chu FRIB Controls Group Leader (Acting) Service-Oriented Architecture for High-level Applications.
Trust Management of Services in Cloud Environments:
The Basics of Information Systems
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
E-commerce Chapter 9 pp E-Commerce Buyer 1. Search & Identification 3. Purchasing 2. Selection & Negotiation 4. Product & Service Delivery 5.
Data Storage Strategy Brian Boyle Network Services Manager HEAnet.
1 On Death, Taxes, & the Convergence of Peer-to-Peer & Grid Computing Adriana Iamnitchi Duke University “Our Constitution is in actual operation; everything.
General Financial Supply Website & E-Commerce Solutions This presentation will demo the GFS corporate website and On-Line Order Inquiry options available.
Electronic Commerce Systems (e-commerce)
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
The Future of Online Learning and Knowledge Networks Stephen Downes Adelaide, Australia September 29, 2004.
CS 486 Software Agents and Electronic Commerce Chris Brooks.
MIS625 Session #3. Outline Porter paper –Note process orientation via competitive forces and value chain –Tie to Peter Keen slides Information Economy.
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Chapter9 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Company Information & Services
Computer Networks,Internet,& SMTP Priyanka Daultani Department of Computer Science USF, San Francsico, CA.
Review an existing website Usability in Design. to begin with.. Meeting Organization’s objectives and your Usability goals Meeting User’s Needs Complying.
PresentPC August 2009 Erick Engelke Engineering Computing.
JOINT BUY VALUE PROPOSITION TEST (BASED ON CUSTOMER INTERVIEW)
Electronic Commerce Creating a Successful Web Presence Marketing Strategy.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
E-commerce. Can we sell our products all around the World?
CONSUMER TO CONSUMER.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Auctions on the Web Presented By (in order of presentation) Frank TrovatoPayman Mahjoory Sara RadgensMike Malia Dan MuzichRob Randel.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
1 REVIEW LEARNING OUTCOME Customer Relationship Management LO I.
1 Chapter 21: Customer Relationship Management (CRM) Prepared by Amit Shah, Frostburg State University Designed by Eric Brengle, B-books, Ltd. Copyright.
4 P’s and Small ‘m’ Marketing Ted Mitchell. Big and Small ‘m’ Marketing Big M marketing is Strategic Marketing – Focus on Market Creation, goals and long.
Introduction to E-commerce and Internet Marketing
EFirm & eCommerce Digital Firm. Contents 1. Introduction 2. The opportunities of technology 3. Electronic Commerce 4. Payment systems 5. Management challenges.
Cmpe 589 Spring Software Quality Metrics Product  product attributes –Size, complexity, design features, performance, quality level Process  Used.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
NAMING: A Key Component of Robust Resolution/Linking Albert Simmonds Business Manager Open Names Service Online Computer Library Center Dublin, Ohio, USA.
PERFORMANCE CONTRACTS IN KENYA RESTORING AND BUILDING TRUST IN GOVERNMENT THROUGH INNOVATIONS TO PROMOTE QUALITY OF PUBLIC SERVICE PRESENTATION BY Ambassador.
Types of E-Commerce Prepared by: Ashis Mitra For M.Com.
Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Developed by Cool Pictures and MultiMedia Presentations.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Industry Application for Packaging Andrea Sartori Solution Architect EMEA.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
Electronic Commerce Jeff Campbell, Piyanuch Chuasiripattana, Travis Flood, Matthew Janocko, Kent Woodburn Research on Electronic Commerce.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
9,825,461,087,64 10,91 6,00 0,00 8,00 Information and Communication Networks HiPath ProCenter Compact.
Cara Cherry Lisco Director SquareTrade Mediator & Arbitrator Network Online Solution For Online Problems Presentation to OECD December 11, 2000.
1.09 Identify Sport/Event Trends – Terms – Part 1.
Electronic Commerce Semester 1 Term 1 Lecture 3. Types of E-Commerce There are three distinct general classes of e-commerce: –Inter-organisational (business-to-business/B2B)
Closing the Sale Ch. 15 ME. How to Close the Sale Section 15.1.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
CS212: Object Oriented Analysis and Design Lecture 32: Use case and Class diagrams.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Trusted P2P Transactions with Fuzzy Reputation Aggregation Authors: S. song, K. Hwang, and R. Zhou University of Southern California Yu-Kwong Kwok University.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
HCS 212: Introduction to MIS
The search engine of shipments
Relationship Marketing and Customer Relationship Management (CRM)
Chapter 2: Introduction to Electronic Commerce
What is Marketing? Marketing is societal process by which individuals and groups obtain what they need and want through creating, offering and freely.
Presentation transcript:

A Survey of Trust Evaluation Methods (Supervisor: Yan Wang) Name:Erden Sacan Student ID: Unit:ITEC810

A Survey of Trust Evaluation Methods 2 Agenda Definition of Trust and an example Four major areas in application of trust evaluation methods Findings of research & conclusion

A Survey of Trust Evaluation Methods 3 What is Trust? “A relationship of reliance dependent on what other people say.” “An agent’s estimate of how likely another is to fulfil its commitments “

A Survey of Trust Evaluation Methods 4 Trust Evaluation Methods Survey Various ways to measure trust in computer applications. – How to choose? – Which one is the best? – Is there a “best” Collect and classify trust evaluation methods Analyse and find; – Strenghts – Weaknessess – Similarities – General requirements of different applications

A Survey of Trust Evaluation Methods 5 An Example!

A Survey of Trust Evaluation Methods 6 User Feedback Ratings

A Survey of Trust Evaluation Methods 7 eBay summary Buyers and sellers in can rate each other Negative, neutral or positive ratings User Rating= positive feedback count – negative feedback Feedback ratings summary is displayed on user’s profile Too simple - But it works! (Ref:

A Survey of Trust Evaluation Methods 8 Major applications E-commerce Peer-to-peer networks – Gnutella, BitTorrent Service-oriented computing – Distributed software development – Multi-supplier supply chains for web services

A Survey of Trust Evaluation Methods 9 E-commerce Needs centralised management Binary rankings are not enough – Negative ratings are very uncommon Needs additional parameters of trust: – Customer satisfaction level – Number of transactions by a party – The amounts of transactions – Timely delivery of goods

A Survey of Trust Evaluation Methods 10 P2P Networks P2P Information sharing networks – Open to public – Big scale – No central authority Mostly requesting party doesn’t know target (serving) party

A Survey of Trust Evaluation Methods 11 P2P Networks – Trust Systems Binary rankings generally work – File transfer – (successful or unsuccessful) Self-policing (Not centralised) Anonymity (Hide user IDs) No profit for newcomers Minimal overhead Parties are not always online

A Survey of Trust Evaluation Methods 12 Service Oriented Computing (SOC) Service Oriented Computing: – Many providers offering services over the network – Distributed software development Fast, cheap, highly reusable services (coding and orchestration of code) – Also adopted by other sectors Travel agencies(car rental, hotel, airline, insurance services)

A Survey of Trust Evaluation Methods 13 Service Oriented Computing (SOC) – How to use trust?

A Survey of Trust Evaluation Methods 14 Service Oriented Computing (SOC) – Trust Methods SOC Trust Evaluation Methods: – Many domains – many rules – trust system needs to be flexible (event driven) – System should consider; Quality of Service Timeliness – Use multiple feedback sources (memberhips, certificates) – Needs good filtering of malicious and fake entries

A Survey of Trust Evaluation Methods 15 Conclusion  “All-in-one-best trust mechanism” – Not possible! (At least for now) Every area has different requirements Some needs a simple approach Some needs many parameters All of them need to prevent malicious entries

A Survey of Trust Evaluation Methods 16 Thank You... – Today we have talked about; What trust is Trust evaluation methods in different applications Trust evaluation requirements of applications.