Social Computational Trust Model (SCTM): A Framework to Facilitate Selection of Partners

Creating a cyber security alliance among network domain owners, as a means to minimize security incidents, has gained the interest of practitioners and academics in the last few years. A cyber security alliance, like any membership organization, requires the creation and maintenance of trust among its members, in this case the network domain owners. To promote the disclosure and sharing of cyber security information among the network domain owners, a trust framework is needed. This paper discusses a social computational trust model (SCTM), that helps alliance members to select the right partner to collaborate with and perform collective tasks​ and encourages the sharing of incident data and intelligence. The social computational trust model combines benevolence and competence to estimate the risk of interaction. Benevolence is computed from personal experiences gained through direct interactions and competence is assessed on the base of the received feedback from the other members. An agent based model case study is presented to demonstrate our approach. The practicability of the proposed risk estimation is validated with a detailed experiment.

[1]  N. Noorderhaven,et al.  When Does Trust Matter to Alliance Performance , 2006 .

[2]  Rino Falcone,et al.  Trust Theory: A Socio-Cognitive and Computational Model , 2010 .

[3]  L. Toledo-Pereyra Trust , 2006, Mediation Behaviour.

[4]  P. Ring,et al.  Structuring cooperative relationships between organizations , 1992 .

[5]  Cees T. A. M. de Laat,et al.  Measuring the efficiency of SDN mitigations against attacks on computer infrastructures , 2019, Future Gener. Comput. Syst..

[6]  T. Das,et al.  Trust, Control, and Risk in Strategic Alliances: An Integrated Framework , 2001 .

[7]  J. Barney,et al.  Trustworthiness as a Source of Competitive Advantage , 1994 .

[8]  William A. Wallace,et al.  Trust in digital information , 2008, J. Assoc. Inf. Sci. Technol..

[9]  Patricia M. Fandt,et al.  The management of information and impressions: When employees behave opportunistically , 1990 .

[10]  A. Zaheer,et al.  Does Trust Matter? Exploring the Effectsof Interorganizational and Interpersonaltrust on Performance , 1998 .

[11]  Edward Hinchman Trust and Will , 2020, The Routledge Handbook of Trust and Philosophy.

[12]  Ana Paula Rocha,et al.  The Impact of Benevolence in Computational Trust , 2013, AT.

[13]  Schahram Dustdar,et al.  Modeling and mining of dynamic trust in complex service-oriented systems , 2010, Inf. Syst..

[14]  Jordi Sabater-Mir,et al.  Computational trust and reputation models for open multi-agent systems: a review , 2013, Artificial Intelligence Review.

[15]  Bing-Sheng Teng,et al.  RISK TYPES AND INTER‐FIRM ALLIANCE STRUCTURES* , 1996 .

[16]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[17]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[18]  Daniel Tranel,et al.  The human amygdala is necessary for developing and expressing normal interpersonal trust , 2011, Neuropsychologia.

[19]  Sajal K. Das,et al.  SelCSP: A Framework to Facilitate Selection of Cloud Service Providers , 2015, IEEE Transactions on Cloud Computing.

[20]  Emiliano Lorini,et al.  A logic of trust and reputation , 2010, Log. J. IGPL.