Advertisement

Trustworthy Organic Computing Systems: Challenges and Perspectives

  • Jan-Philipp Steghöfer
  • Rolf Kiefhaber
  • Karin Leichtenstern
  • Yvonne Bernard
  • Lukas Klejnowski
  • Wolfgang Reif
  • Theo Ungerer
  • Elisabeth André
  • Jörg Hähner
  • Christian Müller-Schloer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6407)

Abstract

Organic Computing (OC) systems differ from classical software systems as the topology and the participating components of the system are not predefined and therefore are subject to unforeseeable change during the systems’ runtime. Thus, completely new challenges to the verification and validation of such systems as well as for interactions between system components and, of course, between the system and the user arise. These challenges can be subsumed by the terms trustworthiness or trust.

This paper proposes – after exploring the notions and principles of trust in the literature – a definition of trust which encompasses all aspects that define the trustworthiness of an Organic Computing system. It then outlines the different research challenges that have to be tackled in order to provide an understanding of trust in OC-systems and gives perspectives on how this endeavour can be taken on. Current research initiatives in the area of trust in computing systems are reviewed and discussed.

Keywords

Organic Computing Trust Trustworthy Systems 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proc. of the 33rd Hawaii International Conference on System Sciences, vol. 6, pp. 1–25 (2000)Google Scholar
  2. 2.
    Abrams, M.D., Joyce, M.V.: Trusted system concepts. Computers & Security 14(1), 45–56 (1995)CrossRefGoogle Scholar
  3. 3.
    Abran, A., Khelifi, A., Suryn, W., Seffah, A.: Usability meanings and interpretations in ISO standards. Software Quality Journal 11(4), 325–338 (2003)CrossRefGoogle Scholar
  4. 4.
    Avižienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing, 11–33 (2004)Google Scholar
  5. 5.
    Azzedin, F., Maheswaran, M.: Evolving and managing trust in grid computing systems. In: Proc. of the IEEE Canadian Conference on Electrical & Computer Engineering, pp. 1424–1429. IEEE, Los Alamitos (2002)Google Scholar
  6. 6.
    Balser, M., Reif, W.: Interactive verification of concurrent systems using symbolic execution. In: Proc. of 7th International Workshop of Implementation of Logics, IWIL 2008 (2008)Google Scholar
  7. 7.
    Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, Springer, Heidelberg (2000)CrossRefGoogle Scholar
  8. 8.
    Boella, G., Pigozzi, G., van der Torre, L.: Normative systems in computer science - ten guidelines for normative multiagent systems. In: Normative Multi-Agent Systems. Dagstuhl Seminar Proceedings, vol. (09121), Dagstuhl (2009)Google Scholar
  9. 9.
    Boon, S.D., Holmes, J.G.: The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. Cooperation and Prosocial Behaviour, 190–211 (1991)Google Scholar
  10. 10.
    Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Progress on the state explosion problem in model checking. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 176–194. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Coleman, J.S.: Foundations of social theory. Belknap Press (1994)Google Scholar
  12. 12.
    Corritore, C.L., Kracher, B., Wiedenbeck, S.: On-line trust: concepts, evolving themes, a model. International Journal of Human-Computer Studies 58(6), 737–758 (2003)CrossRefGoogle Scholar
  13. 13.
    Deutsch, M.: Trust and suspicion. The Journal of Conflict Resolution 2(4), 265–279 (1958)CrossRefGoogle Scholar
  14. 14.
    Deutsch, M.: Cooperation and trust: Some theoretical notes. In: Nebraska Symposium on Motivation, vol. 10, pp. 275–319. University of Nebraska Press (1962)Google Scholar
  15. 15.
    Dunlop, D.D.: An investigation of functional correctness issues. PhD thesis, University of Maryland (1982)Google Scholar
  16. 16.
    Dunn, J.: The concept of trust in the politics of John Locke. Philosophy in History: Essays on the Historiography of Philosophy, 279–301 (1984)Google Scholar
  17. 17.
    Gambetta, D.: Can we trust trust. Trust: Making and Breaking Cooperative Relations, 213–237 (2000)Google Scholar
  18. 18.
    Glass, A., McGuinness, D.L., Wolverton, M.: Toward establishing trust in adaptive agents. In: IUI 2008: Proc. of the 13th International Conference on Intelligent User Interfaces, pp. 227–236. ACM, New York (2008)Google Scholar
  19. 19.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4), 2–16 (2000)CrossRefGoogle Scholar
  20. 20.
    Hasselbring, W., Reussner, R.: Toward trustworthy software systems. Computer 39(4), 91 (2006)CrossRefGoogle Scholar
  21. 21.
    Hofstede, G.J., Jonker, C.M., Verwaart, T.: A Multi-agent Model of Deceit and Trust in Intercultural Trade. In: Nguyen, N.T., Kowalczyk, R., Chen, S.-M. (eds.) ICCCI 2009. LNCS, vol. 5796, pp. 205–216. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  22. 22.
    IEEE. IEEE Standard 610.12-1990: Glossary of Software Engineering TerminologyGoogle Scholar
  23. 23.
    Jones, S., Morris, P.: TRUST-EC: Requirements for Trust and Confidence in E-Commerce: Report of the Workshop held in Luxembourg, April 8–9 (1999)Google Scholar
  24. 24.
    Kini, A., Choobineh, J.: Trust in electronic commerce: definition and theoretical considerations. In: Proc. of the Hawaii International Conference on System Sciences, vol. 31, pp. 51–61 (1998)Google Scholar
  25. 25.
    Kramer, R.M., Brewer, M.B., Hanna, B.A.: Collective trust and collective action. Trust in organizations: Frontiers of theory and research, 357–389 (1996)Google Scholar
  26. 26.
    Luck, M., McBurney, P., Shehory, O., Willmott, S.: Agentlink Roadmap. Agenlink. org. (2005)Google Scholar
  27. 27.
    Luhmann, N.: Trust and power. Wiley, Chichester (1979)Google Scholar
  28. 28.
    Luhmann, N.: Familiarity, confidence, trust: Problems and alternatives. Trust: Making and Breaking Cooperative Relations, 94–107 (2000)Google Scholar
  29. 29.
    Lutz, R.R.: Software engineering for safety: a roadmap. In: Proc. of the Conference on The Future of Software Engineering, pp. 213–226. ACM, New York (2000)Google Scholar
  30. 30.
    Marsh, S., Meech, J.: Trust in design. In: Proc. of the Conference on Human Factors in Computing Systems, pp. 45–46. ACM, New York (2000)Google Scholar
  31. 31.
    McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. The Academy of Management Review 23(3), 473–490 (1998)Google Scholar
  32. 32.
    Moebius, N., Reif, W., Stenzel, K.: Modeling Security-Critical Applications with UML in the SecureMDD Approach. International Journal On Advances in Software 1, 59–79 (2009)Google Scholar
  33. 33.
    Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proc. of the 35th Hawaii International Conference on System Sciences, pp. 188–196 (2002)Google Scholar
  34. 34.
    Müller-Schloer, C.: Organic computing: on the feasibility of controlled emergence. In: CODES+ISSS, pp. 2–5 (2004)Google Scholar
  35. 35.
    Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy computing. Whitepaper, Microsoft Corporation (2002)Google Scholar
  36. 36.
    Musa, J.D., Iannino, A., Okumoto, K.: Software reliability: measurement, prediction, application. McGraw-Hill, Inc., New York (1987)Google Scholar
  37. 37.
    Poslad, S., Charlton, P., Calisti, M.: Specifying standard security mechanisms in multi-agent systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 163–176. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  38. 38.
    Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review 19(01), 1–25 (2005)Google Scholar
  39. 39.
    Rotter, J.B.: A new scale for the measurement of interpersonal trust. Journal of Personality 35(4), 651–665 (1967)CrossRefGoogle Scholar
  40. 40.
    Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: A cross-discipline view of trust. Academy of management review 23(3), 393–404 (1998)CrossRefGoogle Scholar
  41. 41.
    Ryan, A.J.: Emergence is coupled to scope, not level. Complexity 13(2), 67–77 (2007)CrossRefGoogle Scholar
  42. 42.
    Schneider, F.B.: Trust in Cyberspace. National Academy Press, Washington (1998)Google Scholar
  43. 43.
    Storey, N.R.: Safety Critical Computer Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (1996)Google Scholar
  44. 44.
    Sydow, J.: Understanding the constitution of interorganizational trust. Trust within and between organizations: Conceptual issues and empirical applications, 31–63 (1998)Google Scholar
  45. 45.
    Tschannen-Moran, M., Hoy, W.K.: A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research 70(4), 547 (2000)CrossRefGoogle Scholar
  46. 46.
    Valmari, A.: The state explosion problem. In: Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, pp. 429–528. Springer, London (1998)Google Scholar
  47. 47.
    van de Bunt, G.G., Wittek, R.P.M., de Klepper, M.C.: The evolution of intra-organizational trust networks: The case of a German paper factory: An empirical test of six trust mechanisms. International Sociology 20(3), 339 (2005)CrossRefGoogle Scholar
  48. 48.
    Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. of the 3rd International Conference on Peer-to-Peer Computing (2003)Google Scholar
  49. 49.
    Wong, H.C., Sycara, K.: Adding security and trust to multiagent systems. Applied Artificial Intelligence 14(9), 927–941 (2000)CrossRefGoogle Scholar
  50. 50.
    Yan, Z., Holtmanns, S.: Trust modeling and management: from social trust to digital trust. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions (2008)Google Scholar
  51. 51.
    Yan, Z., MacLaverty, R.: Autonomic trust management in a component based software system. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 279–292. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jan-Philipp Steghöfer
    • 1
  • Rolf Kiefhaber
    • 1
  • Karin Leichtenstern
    • 1
  • Yvonne Bernard
    • 2
  • Lukas Klejnowski
    • 2
  • Wolfgang Reif
    • 1
  • Theo Ungerer
    • 1
  • Elisabeth André
    • 1
  • Jörg Hähner
    • 2
  • Christian Müller-Schloer
    • 2
  1. 1.Insitut für InformatikUniversität AugsburgAugsburg
  2. 2.Institut für Systems Engineering, FG System- und RechnerarchitekturLeibniz Universität HannoverHannover

Personalised recommendations