A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A trustworthy mechanized formalization of R
2018
Proceedings of the 14th ACM SIGPLAN International Symposium on Dynamic Languages - DLS 2018
We present CoqR, a trustworthy formalization of the R programming language in the Coq proof assistant. ...
The formalization is composed of two parts: a mechanized specification and an interpreter. ...
doi:10.1145/3276945.3276946
dblp:conf/dls/BodinDT18
fatcat:wqeiw6wpzjgllnroyt5zld23ri
Behavioral Attestation for Business Processes
2009
2009 IEEE International Conference on Web Services
Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified. ...
This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. ...
Trustworthiness) The activity behavior is trustworthy if all of the following conditions hold: • create(s, o, r) → o ∈ O ∧ s ∈ S ∧ s ∈ A (o, r) • end(s, o, r) → S = S {s} ∧ O = O {o}∧ A (o, r) = A(o, ...
doi:10.1109/icws.2009.139
dblp:conf/icws/AlamNZAH09
fatcat:u7hkmtpss5gmla3qvm6flz42sq
Trust over time in exchange relationships: Meta-analysis and theory
2013
Strategic Management Journal
We then argue that the relative strength of these mechanisms should influence whether trust increases, remains constant, or decreases over time. ...
We therefore build a theoretical framework to specify four different mechanisms-initial bias correction, change in relationship value, identification, and trust-based selection-that may affect the development ...
Shipilov, seminar participants at Eindhoven University of Technology, INSEAD, and Tilburg University as well as for the research assistance of Cécile Girardon. ...
doi:10.1002/smj.2198
fatcat:xowa2q4birbevjsgkmbfev7h3q
A Trust-Based Incentive Mechanism for E-Marketplaces
[chapter]
2008
Lecture Notes in Computer Science
To ease this problem, we propose a novel trust-based incentive mechanism for eliciting fair ratings of sellers from buyers. ...
Reputable buyers provide fair ratings of sellers, and are likely considered trustworthy by many other buyers. ...
neg,i = 2T r(aj ) N a j neg,i (1−T r(aj )) (N a j pos,i +N a j neg,i ) + 2 (11) where T r(a j ) is the trustworthiness of the advisor a j . ...
doi:10.1007/978-3-540-92803-4_8
fatcat:xk4t3dovxzfqxmr5px7v54nl4q
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations
2007
Third International Symposium on Information Assurance and Security
We investigated using of a fuzzy approach to address the issue in order to provide a more practical solution. ...
The concept of trustworthiness, which is fuzzy in nature, is used to express this model. In comparison with non-fuzzy methods, our method is more pragmatic and more consistent with the real world. ...
Formally: assigned pemissions(r) = {p ∈ P RMS | (p, r) ∈ P A} • U T (u : U SERS) → T D, the mapping of user u into the corresponding trustworthiness degree (manyto-one mapping). • RT (r : ROLES) → T D, ...
doi:10.1109/isias.2007.4299762
fatcat:cojuhzjxtjakvc7lptzevgddca
Determining the Optimal Reporting Strategy in Competitive E-marketplaces
2012
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
The results of the experiments carried out in a simulated competitive emarketplace confirm that our proposed mechanism leads to better utility for buyers in such an environment. ...
In this paper, we propose an adaptive mechanism built on a game theoretic basis for buyers to determine their optimal reputation reporting strategy, by modeling both the competency and willingness of other ...
To formalize the importance degree of the interaction partner (as used in both Equations 1 and 2), we further define a distribution of V p (T r) = −log(1 − T r) where T r represents the trustworthiness ...
doi:10.1109/trustcom.2012.125
dblp:conf/trustcom/NoorianZFM12
fatcat:uyqzirbqsbf4xmwchclvbqfn3e
Between trust and control in interorganizational collaboration – rethinking formal and informal governance in R&D alliances
2019
VINE Journal of Information and Knowledge Management Systems
In this study, the authors move from the opposite ends of a continuum between trust as an attitude and control exercised through formal contracts toward the center of the continuum where trust and contracting ...
Findings The authors find, first, that controlling an organization's own knowledge assets in R&D alliances with informal means of protection can be more effective than a strategy of controlling the alliance ...
We suggest that for trust to create value in R&D alliances, a trustor must analytically evaluate and audit a specific trustee's trustworthiness along the dimensions of trust, specifically, competence, ...
doi:10.1108/vjikms-02-2019-0027
fatcat:v7lbv7cv2zeyvkb63xrygo2wpy
A formal approach towards measuring trust in distributed systems
2011
Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11
The results of the qualitative part include the specification of a formal trust language and the representation of its terms by means of propositional logic formulas. ...
Based on these formulas, the quantitative part returns trust metrics for the determination of trustworthiness with which given distributed systems are assumed to fulfill a particular security requirement ...
We use this model for the proposition of a formal trust language, which contains trustworthiness terms, which formally describe trustworthiness properties of a system (regarding a particular security requirement ...
doi:10.1145/1982185.1982548
dblp:conf/sac/SchryenVRH11
fatcat:xqqxntri6jawvli3tszzzci7xu
Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces
2013
Autonomous Agents and Multi-Agent Systems
In this paper, we propose a trustoriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy, by modeling the trustworthiness (competency and willingness ...
) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers' preferences on product quality. ...
More formally, the trustworthiness of an adviser is calculated as follows: W i (a i ) = H b (a i ) * e −Dev t (a i ) (9) Dev t (a i ) = Dev t−1 (a i ) +|r (a i ) −μ| 0 e x dx, Dev 0 a i = 0 ( 1 0 ) where ...
doi:10.1007/s10458-013-9243-z
fatcat:hpt2vuc45jbcba6zimrs6j7xdy
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations
2007
Third International Symposium on Information Assurance and Security
We investigated using of a fuzzy approach to address the issue in order to provide a more practical solution. ...
The concept of trustworthiness, which is fuzzy in nature, is used to express this model. In comparison with non-fuzzy methods, our method is more pragmatic and more consistent with the real world. ...
Formally: assigned pemissions(r) = {p ∈ P RMS | (p, r) ∈ P A} • U T (u : U SERS) → T D, the mapping of user u into the corresponding trustworthiness degree (manyto-one mapping). • RT (r : ROLES) → T D, ...
doi:10.1109/ias.2007.68
dblp:conf/IEEEias/TakabiAJ07
fatcat:mrbdklqt6jfhjhlvnryxdzr6o4
Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces
[chapter]
2010
IFIP Advances in Information and Communication Technology
We theoretically prove that in a marketplace operating with our mechanism: i) buyers will be better off honestly reporting seller ratings and ii) sellers are better off being honest, to earn better profit ...
In this paper, we examine a trust-based framework for promoting honesty in e-marketplaces that relies on buyers forming social networks to share reputation ratings of sellers and sellers rewarding the ...
The buyer in our mechanism will allow only a number of the most trustworthy sellers to join the auction. ...
doi:10.1007/978-3-642-13446-3_15
fatcat:cydn6msgkbahlnc4o7q7tpqrdu
An incentive mechanism for eliciting fair ratings of sellers in e-marketplaces
2007
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems - AAMAS '07
In this paper, we propose a novel incentive mechanism for eliciting fair ratings of selling agents from buying agents. ...
In our mechanism, buyers model other buyers and select the most trustworthy ones as their neighbors from whom they can ask advice about sellers. ...
INCENTIVE MECHANISM To formalize the proposed incentive mechanism, we consider the scenario that in an electronic marketplace a buyer B wants to buy a product p. ...
doi:10.1145/1329125.1329258
dblp:conf/atal/ZhangC07
fatcat:w4eizglzirfr5j5yed6t3c2vuq
COMBINING TRUST MODELING AND MECHANISM DESIGN FOR PROMOTING HONESTY IN E-MARKETPLACES
2012
Computational intelligence
We emphasize the value of our approach through a series of illustrative examples and in direct contrast to other frameworks for addressing agent trustworthiness. ...
In our mechanism, buyers model other buyers and select the most trustworthy ones as their neighbors to form a social network which can be used to ask advice about sellers. ...
The buyer in our mechanism will allow only a number of the most trustworthy sellers to join the auction. ...
doi:10.1111/j.1467-8640.2012.00428.x
fatcat:rljxfxfmmfhpvpaji4ctdopfq4
Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy
2018
Entropy
Accompanying the trustworthiness mechanism, the measurement algorithm, with uncertain software behaviour trustworthiness information of the WfMS, should be resolved as an infrastructure. ...
In order to construct a trustworthy workflow management system (TWfMS), the design of a software behaviour trustworthiness measurement algorithm is an urgent task for researchers. ...
Conflicts of Interest: The author declares no conflict of interest. ...
doi:10.3390/e20030195
pmid:33265286
fatcat:66llurixknfkhm5hsxwjra43am
Model-based behavioral attestation
2008
Proceedings of the 13th ACM symposium on Access control models and technologies - SACMAT '08
In this paper, we present a novel approach where the trustworthiness of a platform is associated with the behavior of a policy model. ...
Existing approaches for the realization of remote attestation measure the trustworthiness of a target platform from its binaries, configurations, properties or security policies. ...
Formally: States : p → P(T ) For each state ti for usage session (s, o, r) where ti ∈ T and s ∈ S, o ∈ O,r ∈ R, the expected behavior exbi of state ti is equal to a set of symbols used to denote that trustworthiness ...
doi:10.1145/1377836.1377864
dblp:conf/sacmat/AlamZNAS08
fatcat:bfptnanq6vf5dlwtfju3hm6egu
« Previous
Showing results 1 — 15 out of 40,945 results