Inference Management: Trust and Obfuscation in Coalition Settings

作者: Nir Oren , Murat Sensoy , Chatschik Bisdikian , Mani B. Srivastava , Lance Kaplan

DOI:

关键词:

摘要: Abstract : In modern coalition operations, decision makers must be capable of obtaining and fusing information from diverse sources. The reliability these sources can vary, and, to protect their interests, the provide could altered, e.g., obfuscated, limit inferences that made with it. trustworthiness fused depends on both inference management policies. Information consumers determine how evaluate trust in presence techniques, such as obfuscation, while providers appropriate level obfuscation ensure they remain trusted, do not reveal any private information. this paper, we present formalize context discuss relationships between two. We illustration pertinent concepts via a multi-party scenario, numerical examples, using subjective logic computational influence belief levels gathered.

参考文章(8)
Xiangdong An, Dawn Jutla, Nick Cercone, Reasoning about obfuscated private information Proceedings of the 5th ACM workshop on Privacy in electronic society - WPES '06. pp. 85- 88 ,(2006) , 10.1145/1179601.1179617
Margaret Levi, Trust : making and breaking cooperative relations Tijdschrift Voor Filosofie. ,vol. 52, ,(1990)
Chatschik Bisdikian, Murat Sensoy, Timothy J. Norman, Mani B. Srivastava, Trust and obfuscation principles for quality of information in emerging pervasive environments pervasive computing and communications. pp. 44- 49 ,(2012) , 10.1109/PERCOMW.2012.6197532
D.E. Bakken, R. Rarameswaran, D.M. Blough, A.A. Franz, T.J. Palmer, Data obfuscation: anonymity and desensitization of usable data sets ieee symposium on security and privacy. ,vol. 2, pp. 34- 41 ,(2004) , 10.1109/MSP.2004.97
Audun Jøsang, Roslan Ismail, Colin Boyd, A survey of trust and reputation systems for online service provision decision support systems. ,vol. 43, pp. 618- 644 ,(2007) , 10.1016/J.DSS.2005.05.019
Audun Jøsang, Touhid Bhuiyan, Optimal Trust Network Analysis with Subjective Logic international conference on emerging security information, systems and technologies. pp. 179- 184 ,(2008) , 10.1109/SECURWARE.2008.64
Matt Duckham, Lars Kulik, A Formal Model of Obfuscation and Negotiation for Location Privacy Lecture Notes in Computer Science. pp. 152- 170 ,(2005) , 10.1007/11428572_10
Chatschik Bisdikian, Lance M. Kaplan, Mani B. Srivastava, David J. Thornley, Dinesh Verma, Robert I. Young, Quality of Sensor-Originated Information in Coalition Information Networks IGI Global. pp. 15- 41 ,(2010) , 10.4018/978-1-61520-855-5.CH002