Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems

We acknowledge the fact that situational details can have impact on the trust that a Trustor assigns to some Trustee. Motivated by that, we discuss and formalize functions for determining context-aware trust. A system implementing such functions takes into account the Trustee’s profile realized by what we call quality attributes. Furthermore, the system is aware of some context attributes characterizing additional aspects of the Trustee, of the Trustor, and of the environment around them. These attributes can also have impact on trustor’s trust formation process. The trust functions are concretized with running examples throughout the paper.

[1]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[2]  Sarvapali D. Ramchurn,et al.  Trust evaluation through relationship analysis , 2005, AAMAS '05.

[3]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[4]  Mikko Laukkanen,et al.  Context-Sensitive Conversation Patterns for Agents in Wireless Environments , 2004, IWUC.

[5]  Omer F. Rana,et al.  Reputation-based semantic service discovery , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[6]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[7]  Vladimiro Sassone,et al.  A Framework for Concrete Reputation-Systems , 2005 .

[8]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[9]  Paula M. C. Swatman,et al.  Towards The Knowledge Society: eCommerce, eBusiness, and eGovernment, The Second IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2002), October 7-9, 2002, Lisbon, Portugal , 2002, I3E.

[10]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[11]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[12]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[13]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  Fredrik Espinoza,et al.  GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.

[15]  Kun Yang,et al.  Policy-Driven Mobile Agents for Context-Aware Service in Next Generation Networks , 2003, MATA.

[16]  Oh,et al.  SEAL — A Framework for Developing SEmantic PortALs , 2001 .

[17]  Harith Alani,et al.  Trust Strategies for the Semantic Web , 2004, Trust@ISWC.

[18]  Birger Larsen,et al.  Proceedings of the ACM SIGIR 2005 Workshop on Information Retrieval in Context (IRiX) , 2005 .

[19]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[20]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[21]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[22]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[23]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[24]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[25]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[26]  Grit Denker,et al.  The Impact of Context on the Trustworthiness of Communication: An Ontological Approach , 2004, Trust@ISWC.

[27]  Philip Robinson,et al.  Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.

[28]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[29]  Morris Sloman,et al.  Specifying and Analysing Trust for Internet Applications , 2002, I3E.

[30]  Jason Pascoe,et al.  The stick-e note architecture: extending the interface beyond the user , 1997, IUI '97.

[31]  Vitaly Shmatikov,et al.  Reputation-Based Trust Management ∗ , 2003 .

[32]  Vladimiro Sassone,et al.  A framework for concrete reputation-systems with applications to history-based access control , 2005, CCS '05.

[33]  Audun Jøsang,et al.  Analysing the Relationship between Risk and Trust , 2004, iTrust.

[34]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[35]  Béat Hirsbrunner,et al.  Context Aware Service Provisioning , 2004, The IEEE/ACS International Conference on Pervasive Services.

[36]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[37]  Catherine Faron-Zucker,et al.  Searching the semantic Web: approximate query processing based on ontologies , 2006, IEEE Intelligent Systems.