Gathering Experience in Trust-Based Interactions
Evidence based trust management, where automated decision making is supported through collection of evidence about the trustworthiness of entities from a variety of sources, has gained popularity in recent years. So far work in this area has primarily focussed on schemes for combining evidence from potentially unreliable sources (recommenders) with the aim of improving the quality of decision making. The large body of literature on reputation systems is testament to this. At the same time, little consideration has been given to the actual gathering of useful and detailed experiential evidence. Most proposed systems use quite simplistic representations for experiences, and mechanisms where high level feedback is provided by users. Consequently, these systems provide limited support for automated decision making. In this paper we build upon our previous work in trust-based interaction modelling and we present an interaction monitor that enables automated collection of detailed interaction evidence. The monitor is a prototype implementation of our generic interaction monitoring architecture that combines well understood rule engine and event management technology. This paper also describes a distributed file server scenario, in order to demonstrate our interaction model and monitor. Finally, the paper presents some preliminary results of a simulation-based evaluation of our monitor in the context of the distributed file server scenario.
KeywordsInteraction Model Intrusion Detection System Trust Management Cost Event Client Application
Unable to display preview. Download preview PDF.
- 1.Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, vol. 6. IEEE Computer Society Press, Los Alamitos (2000)Google Scholar
- 2.Cilia, M., Bornhovd, C., Buchmann, A.P.: Moving active functionality from centralized to open distributed heterogeneous environments. In: CooplS 2001: Proceedings of the 9th International Conference on Cooperative Information Systems, pp. 195–210. Springer, Heidelberg (2001)Google Scholar
- 3.English, C., Terzis, S.: Monitoring interactions between trusting entities A Simulation-based Analysis. Technical Report 02, University of Strathclyde, Computer and Information Sciences (December 2005) (to appear)Google Scholar
- 4.English, C., Terzis, S., Nixon, P.: Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Personal and Ubiquitous Computing (November 2005)Google Scholar
- 5.Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. In: Pervasive Computing Magazine, vol. 2, pp. 52–61. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
- 6.Friedman-Hill, E.: Jess in Action. Manning Publications (2003)Google Scholar
- 7.The Mandarax Project Homepage, http://mandarax.sourceforge.net/
- 8.The Mantaray Project Homepage, http://www.mantamq.org/
- 9.The RuleCore System Homepage, http://www.rulecore.com/
- 10.Jøsang, A., Gray, E., Kinateder, M.: Analysing topologies of transitive trust. In: Dimitrakos, T., Martielli, F. (eds.) Proceedings of the Workshop on Formal Aspects of Security and Trust (FAST 2003) at FM 2003, Pisa, Italy, September 2003. IIT Technical Reports, vol. TR-10/2003, pp. 9–22 (2003)Google Scholar
- 14.Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: Proceedings of the 4th ACM conference on Electronic commerce, San Diego, CA, USA, pp. 228–229. ACM Press, New York (2003)Google Scholar