Modeling Reactive Trust Acquisition Using State Transition Systems

作者: Sergiy Gladysh , Peter Herrmann

DOI: 10.1007/978-3-642-38323-6_19

关键词:

摘要: In this work-in-progress article, we propose the use of state transition systems to model and specify non-trivial real-life trust acquisition strategies, which are stateful may dynamically adapt, depending on particular context/situation a truster, trustee or an environment. The approach is exemplified with oral examination scenario in kind questions and, hence, strategy can be automatically adjusted according performance examinee. We define discrete metric (a “state trust”), built top continuous representation (Josang’s subjective logic our example). To policy as state-transition system, temporal cTLA.

参考文章(21)
Trust Management III Trust Management III. ,vol. 300, ,(2009) , 10.1007/978-3-642-02056-8
Peter Herrmann, Temporal Logic-Based Specification and Verification of Trust Models Lecture Notes in Computer Science. pp. 105- 119 ,(2006) , 10.1007/11755593_9
Peter Herrmann, Trust-Based Protection of Software Component Users and Designers Lecture Notes in Computer Science. pp. 75- 90 ,(2003) , 10.1007/3-540-44875-6_6
D. Harrison Mcknight, Norman L. Chervany, Hubert H. Humphrey, THE MEANINGS OF TRUST ,(2000)
Audun Josang, Roslan Ismail, The Beta Reputation System bled econference. pp. 41- ,(2002)
Computing with Social Trust Springer Publishing Company, Incorporated. ,(2008) , 10.1007/978-1-84800-356-9
Mozhgan Tavakolifard, Peter Herrmann, Svein J. Knapskog, Inferring Trust Based on Similarity with TILLIT international conference on trust management. ,vol. 300, pp. 133- 148 ,(2009) , 10.1007/978-3-642-02056-8_9
Rajeev Motwani, Terry Winograd, Lawrence Page, Sergey Brin, The PageRank Citation Ranking : Bringing Order to the Web the web conference. ,vol. 98, pp. 161- 172 ,(1999)
A. Jøsang, S. J. Knapskog, A metric for trusted systems international conference on information security. pp. 541- 545 ,(1998)
Qun Ni, Elisa Bertino, Jorge Lobo, Risk-based access control systems built on fuzzy inferences computer and communications security. pp. 250- 260 ,(2010) , 10.1145/1755688.1755719