Results 1 - 10
of
10
An analytic approach to reputation ranking of participants in online transactions
- In WI-IAT ’08: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, 2008
"... In our setup, agents from a community interact in pair-wise transactions across discrete time. Each agent reports its evaluation of another agent with which it has just had a transaction to a central system. This system uses these time-sequences of experience evaluations to infer how much the agents ..."
Abstract
-
Cited by 7 (4 self)
- Add to MetaCart
(Show Context)
In our setup, agents from a community interact in pair-wise transactions across discrete time. Each agent reports its evaluation of another agent with which it has just had a transaction to a central system. This system uses these time-sequences of experience evaluations to infer how much the agents trust each another. Our paper proposes rational-ity assumptions (also called postulates or constraints) that such inferences must obey, and proceeds to derive theorems implied by these assumptions. A basic representation theo-rem is proved. The system also uses these pairwise cross-agent trustworthiness to compute a reputation rank for each agent. Moreover, it provides with each reputation rank an estimate of the reliability, which we call weight of evidence. This paper is different from much of the current work in that it examines how a central system which computes trustwor-thiness, reputation and weight of evidence is constrained by such rationality postulates. 1
Trust Management of Services in Cloud Environments: Obstacles and Solutions
"... Trust management is one of the most challenging issues in the emerging cloud computing area. Over the past few years, many studies have proposed different techniques to address trust management issues. However, despite these past efforts, several trust management issues such as identification, priva ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Trust management is one of the most challenging issues in the emerging cloud computing area. Over the past few years, many studies have proposed different techniques to address trust management issues. However, despite these past efforts, several trust management issues such as identification, privacy, personalization, integration, security, and scalability have been mostly neglected and need to be addressed before cloud computing can be fully embraced. In this article, we present an overview of the cloud service models and we survey the main techniques and research prototypes that efficiently support trust management of services in cloud environments. We present a generic analytical framework that assesses existing trust management research prototypes in cloud computing and relevant areas using a set of assessment criteria. Open research issues for trust management in cloud environments are also discussed.
A Comprehensive Trust Model for Improved Reliability in Grid
"... Grid computing and its related technologies will only be adopted by users, if they are confident that their data and privacy are secured and the system is as scalable, robust and reliable as of their own in their places. Trust and reputation systems have been recognized as playing an important role ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Grid computing and its related technologies will only be adopted by users, if they are confident that their data and privacy are secured and the system is as scalable, robust and reliable as of their own in their places. Trust and reputation systems have been recognized as playing an important role in decision making in the internet. Reputation based systems can be used in grid to improve the reliability of transactions. Reliability is the probability that a process will successfully perform it’s prescribed task without failure at a given point of time. Hence ensuring reliable transactions plays a vital role in grid computing. To achieve reliable transactions mutual trust must be established between the initiator and the provider. This paper aims at providing a robust and reliable model by eliminating the feed backs of the entities which are not having any compatibility with it’s own evaluation procedure, This model further applies two way test criteria for initiator and provider and also includes new expression for measuring direct trust. I.
Enforcing Reputation Constraints on Business Process Workflows∗
"... The problem of trust in determining the flow of execution of business processes has been in the centre of research interst in the last decade as business processes become a de facto model of Internet-based commerce, particularly with the increasing popularity in Cloud computing. One of the main mea- ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
The problem of trust in determining the flow of execution of business processes has been in the centre of research interst in the last decade as business processes become a de facto model of Internet-based commerce, particularly with the increasing popularity in Cloud computing. One of the main mea-sures of trust is reputation, where the quality of services as provided to their clients can be used as the main factor in calculating service and service provider reputation values. The work presented here contributes to the solving of this problem by defining a model for the calculation of service reputa-tion levels in a BPEL-based business workflow. These levels of reputation are then used to control the execution of the workflow based on service-level agreement constraints provided by the users of the workflow. The main contribution of the paper is to first present a formal meaning for BPEL processes, which is constrained by reputation requirements from the users, and then we demonstrate that these requirements can be enforced using a reference architecture with a case scenario from the domain of distributed map processing. Finally, the paper discusses the possible threats that can be launched on such an architecture.
On Trust Management in Grids
"... Abstract—This paper presents an overview of the different concepts and technologies for managing trust in Grids. It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—This paper presents an overview of the different concepts and technologies for managing trust in Grids. It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management actions.
Sixth Framework STREP 045256 Deliverable D4.0 Commercial in Confidence Europe-China Grid Internetworking European Sixth Framework STREP FP6-2006-IST-045256 Deliverable D4.0 Design of Economic Grid Traffic Management and Security Mechanisms The EC-GIN Cons
"... ..."
(Show Context)
A Model for Providing List of Reliable Providers for Grid Computing
"... Grid computing is an interconnected computer system, where machines share resources that are highly heterogeneous. Reliability is the probability that a process will successfully perform its prescribed task without any failure at a given point of time. Hence, ensuring reliable transactions plays a v ..."
Abstract
- Add to MetaCart
(Show Context)
Grid computing is an interconnected computer system, where machines share resources that are highly heterogeneous. Reliability is the probability that a process will successfully perform its prescribed task without any failure at a given point of time. Hence, ensuring reliable transactions plays a vital role in grid computing. The main objective of the paper is to develop a reliable and robust two way trust model for the Grid system. Thus the goals of this proposed trust model are as follows. The Model should eliminate the incompatible and biased feed backs of the recommenders. It should provide a two way trust mechanism so that the view points of both consumers and providers are taken care of. It should also tune the direct trust calculation to finer granularity by considering parameters such as context, job size and job complexity. Finally, it should provide a ranked list of providers, so that the initiator can choose the most trusted provider based on the availability. This proposed Model encompasses all the above said features and it provides the most trusted reliable provider.
On Trust Management in Grids Invited Paper
"... Abstract—This paper presents an overview of the different concepts and technologies for managing trust in Grids. It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—This paper presents an overview of the different concepts and technologies for managing trust in Grids. It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management actions.
ANALYSINGORCHESTRATIONSWITHRISKPROFILES AND ANGEL-DAEMON GAMES ∗
"... Abstract In this paper game theory is used to analyse the effect of a number of service failures during the execution of a grid orchestration. A service failure may be catastrophic in that it causes an entire orchestration to fail. Alternatively, a grid manager may utilise alternative services in th ..."
Abstract
- Add to MetaCart
Abstract In this paper game theory is used to analyse the effect of a number of service failures during the execution of a grid orchestration. A service failure may be catastrophic in that it causes an entire orchestration to fail. Alternatively, a grid manager may utilise alternative services in the case of failure, allowing an orchestration to recover. A risk profile provides a means of modelling situations in a way that is neither overly optimistic nor overly pessimistic. Risk profiles are analysed using angel and daemon games. A risk profile can be assigned a valuation through an analysis of the structure of its associated Nash equilibria. Some structural properties of valuation functions, that show their validity as a measure for risk, are given. Two main cases are considered, the assessment of Orc expressions and the arrangement of a meeting using reputations.