A Discussion on Trust Requirements for a Social Network of Eahoukers
Conference paper
- 4 Citations
- 2k Downloads
Abstract
A social network of eahoukers is intended to benefit from the socially generated knowledge to deal with the home appliances in a domestic environment. The entire system being developed in the SandS project has diverse facets, in this paper we focus on a discussion of the trust requirements from several points of view. Trust has been studied for a long time in different contexts. In this paper we review some definitions and ideas related to trust, as a basis for the desired discussion, as a first step previous to any implementation.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Adams, W.J., Hadjichristofi, G.C., Davis IV, N.J.: Calculating a node’s reputation in a mobile ad hoc network. In: 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005, pp. 303–307 (April 2005)Google Scholar
- 2.Ahamed, S.I., Haque, M.M., Endadul Hoque, M., Rahman, F., Talukder, N.: Design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments. Journal of Systems and Software 83(2), 253–270 (2010); Computer Software and ApplicationsCrossRefGoogle Scholar
- 3.Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2), 58–71 (2007); Software Engineering and the Semantic WebCrossRefGoogle Scholar
- 4.Bharadwaj, K.K., Al-Shamri, M.Y.H.: Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications 8(1), 37–47 (2009)CrossRefGoogle Scholar
- 5.Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T.S., Chang, E., Hussain, F.K., Nejdl, W., Olmedilla, D., Kashyap, V.: The pudding of trust (intelligent systems). IEEE Intelligent Systems 19(5), 74–88 (2004)CrossRefGoogle Scholar
- 6.Blomqvist, K.: The many faces of trust. Scandinavian Journal of Management 13(3), 271–286 (1997)CrossRefGoogle Scholar
- 7.Can, A.B., Bhargava, B.: Sort: A self-organizing trust model for peer-to-peer systems. IEEE Transactions on Dependable and Secure Computing 10(1), 14–27 (2013)CrossRefGoogle Scholar
- 8.Chadwick, D.W., Young, A.J., Cicovic, N.K.: Merging and extending the pgp and pem trust models-the ice-tel trust model. IEEE Network 11(3), 16–24 (1997)CrossRefGoogle Scholar
- 9.Chang, B.-J., Kuo, S.-L.: Markov chain trust model for trust-value analysis and key management in distributed multicast manets. IEEE Transactions on Vehicular Technology 58(4), 1846–1863 (2009)CrossRefGoogle Scholar
- 10.Cho, J.-H., Swami, A., Chen, I.-R.: A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys Tutorials 13(4), 562–583 (2011)CrossRefGoogle Scholar
- 11.Cook, K.S. (ed.): Trust in Society, New York. Russell Sage Foundation Series on Trust, vol. 2 (February 2003)Google Scholar
- 12.Fachrunnisa, O., Hussain, F.K.: A methodology for maintaining trust in industrial digital ecosystems. IEEE Transactions on Industrial Electronics 60(3), 1042–1058 (2013)CrossRefGoogle Scholar
- 13.Gai, X., Li, Y., Chen, Y., Shen, C.: Formal definitions for trust in trusted computing. In: 2010 7th International Conference on Ubiquitous Intelligence Computing and 7th International Conference on Autonomic Trusted Computing (UIC/ATC), pp. 305–310 (October 2010)Google Scholar
- 14.Golbeck, J.: Computing with trust: Definition, properties, and algorithms. In: Securecomm and Workshops, August 28-September 1, pp. 1–7 (2006)Google Scholar
- 15.He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine 16(6), 1164–1175 (2012)CrossRefGoogle Scholar
- 16.Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Commun. ACM 49(7), 94–101 (2006)CrossRefGoogle Scholar
- 17.Manchala, D.W.: E-commerce trust metrics and models. IEEE Internet Computing 4(2), 36–44 (2000)CrossRefGoogle Scholar
- 18.Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)zbMATHCrossRefGoogle Scholar
- 19.Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)CrossRefGoogle Scholar
- 20.Wang, X., Liu, L., Su, J.: Rlm: A general model for trust representation and aggregation. IEEE Transactions on Services Computing 5(1), 131–143 (2012)CrossRefGoogle Scholar
- 21.Xiu, D., Liu, Z.: A formal definition for trust in distributed systems. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 482–489. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 22.Zhang, P., Durresi, A., Barolli, L.: Survey of trust management on various networks. In: 2011 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), June 30-July 2, pp. 219–226 (2011)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2013