Local and Global Trust Based on the Concept of Promises

We use the notion of a promise to define local trust between agents possessing autonomous decision-making. An agent is trustworthy if it is expected that it will keep a promise. This definition satisfies most commonplace meanings of trust. Reputation is then an estimation of this expectation value that is passed on from agent to agent. Our definition distinguishes types of trust, for different behaviours, and decouples the concept of agent reliability from the behaviour on which the judgement is based. We show, however, that trust is fundamentally heuristic, as it provides insufficient information for agents to make a rational judgement. A global trustworthiness, or community trust can be defined by a proportional, self-consistent voting process, as a weighted eigenvector-centrality function of the promise theoretical graph.

[1]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[2]  Anatol Rapoport,et al.  N-person game theory;: Concepts and applications , 1970 .

[3]  Claudia Keser,et al.  Can We Manage Trust? , 2005, iTrust.

[4]  Mark Burgess,et al.  A graph-theoretical model of computer security , 2004, International Journal of Information Security.

[5]  N. Shadbolt,et al.  Developing an integrated trust and reputation model for open multi-agent systems , 2004 .

[6]  Jan A. Bergstra,et al.  A static theory of promises , 2008, ArXiv.

[7]  J. Neumann,et al.  The Theory of Games and Economic Behaviour , 1944 .

[8]  Arild Waaler,et al.  Trustworthiness by Default , 2005, CLIMA.

[9]  Alice Bob,et al.  The PGP Trust Model , 2005 .

[10]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[11]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[12]  J. Neumann,et al.  Theory of Games and Economic Behavior. , 1945 .

[13]  Mark Burgess,et al.  Autonomic Pervasive Computing : A Smart Mall Scenario Using Promise Theory , 2006 .

[14]  F. Zagare Game Theory: Concepts and Applications , 1984 .

[15]  Siri Fagernes,et al.  Pervasive Computer Management: A Model of Network Policy with Local Autonomy , 2006 .

[16]  T. Schelling,et al.  The Strategy of Conflict. , 1961 .

[17]  Ira S. Winkler The Non-Technical Threat to Computing Systems , 1996, Comput. Syst..

[18]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[19]  Audun Jøsang,et al.  Technologies for Trust in Electronic Commerce , 2004, Electron. Commer. Res..

[20]  Geoffrey Canright,et al.  Roles in networks , 2004, Sci. Comput. Program..

[21]  M. Vangel System Reliability Theory: Models and Statistical Methods , 1996 .

[22]  Arild Waaler,et al.  Relative Trustworthiness , 2005, Formal Aspects in Security and Trust.

[23]  Dietrich Fahrenholtz,et al.  Towards a Sociological View of Trust in Computer Science , 2001 .

[24]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[25]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[26]  G. Grimmett,et al.  Probability and random processes , 2002 .

[27]  Mark Burgess,et al.  An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation , 2005, DSOM.

[28]  A. Hasman,et al.  Probabilistic reasoning in intelligent systems: Networks of plausible inference , 1991 .

[29]  Audun Jøsang,et al.  Semantic Constraints for Trust Transitivity , 2005, APCCM.

[30]  Leonard J. LaPadula,et al.  A Rule-Set Approach to Formal Modeling of a Trusted Computer System , 1994, Comput. Syst..

[31]  David J. Sherwin,et al.  System Reliability Theory—Models and Statistical Methods , 1995 .