Filters








40,945 Hits in 4.2 sec

A trustworthy mechanized formalization of R

Martin Bodin, Tomás Diaz, Éric Tanter
2018 Proceedings of the 14th ACM SIGPLAN International Symposium on Dynamic Languages - DLS 2018  
We present CoqR, a trustworthy formalization of the R programming language in the Coq proof assistant.  ...  The formalization is composed of two parts: a mechanized specification and an interpreter.  ... 
doi:10.1145/3276945.3276946 dblp:conf/dls/BodinDT18 fatcat:wqeiw6wpzjgllnroyt5zld23ri

Behavioral Attestation for Business Processes

Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C.K. Hung
2009 2009 IEEE International Conference on Web Services  
Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.  ...  This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified.  ...  Trustworthiness) The activity behavior is trustworthy if all of the following conditions hold: • create(s, o, r) → o ∈ O ∧ s ∈ S ∧ s ∈ A (o, r) • end(s, o, r) → S = S {s} ∧ O = O {o}∧ A (o, r) = A(o,  ... 
doi:10.1109/icws.2009.139 dblp:conf/icws/AlamNZAH09 fatcat:u7hkmtpss5gmla3qvm6flz42sq

Trust over time in exchange relationships: Meta-analysis and theory

Bart S. Vanneste, Phanish Puranam, Tobias Kretschmer
2013 Strategic Management Journal  
We then argue that the relative strength of these mechanisms should influence whether trust increases, remains constant, or decreases over time.  ...  We therefore build a theoretical framework to specify four different mechanisms-initial bias correction, change in relationship value, identification, and trust-based selection-that may affect the development  ...  Shipilov, seminar participants at Eindhoven University of Technology, INSEAD, and Tilburg University as well as for the research assistance of Cécile Girardon.  ... 
doi:10.1002/smj.2198 fatcat:xowa2q4birbevjsgkmbfev7h3q

A Trust-Based Incentive Mechanism for E-Marketplaces [chapter]

Jie Zhang, Robin Cohen, Kate Larson
2008 Lecture Notes in Computer Science  
To ease this problem, we propose a novel trust-based incentive mechanism for eliciting fair ratings of sellers from buyers.  ...  Reputable buyers provide fair ratings of sellers, and are likely considered trustworthy by many other buyers.  ...  neg,i = 2T r(aj ) N a j neg,i (1−T r(aj )) (N a j pos,i +N a j neg,i ) + 2 (11) where T r(a j ) is the trustworthiness of the advisor a j .  ... 
doi:10.1007/978-3-540-92803-4_8 fatcat:xk4t3dovxzfqxmr5px7v54nl4q

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

Hassan Takabi, Morteza Amini, Rasool Jalili
2007 Third International Symposium on Information Assurance and Security  
We investigated using of a fuzzy approach to address the issue in order to provide a more practical solution.  ...  The concept of trustworthiness, which is fuzzy in nature, is used to express this model. In comparison with non-fuzzy methods, our method is more pragmatic and more consistent with the real world.  ...  Formally: assigned pemissions(r) = {p ∈ P RMS | (p, r) ∈ P A} • U T (u : U SERS) → T D, the mapping of user u into the corresponding trustworthiness degree (manyto-one mapping). • RT (r : ROLES) → T D,  ... 
doi:10.1109/isias.2007.4299762 fatcat:cojuhzjxtjakvc7lptzevgddca

Determining the Optimal Reporting Strategy in Competitive E-marketplaces

Zeinab Noorian, Jie Zhang, Michael Fleming, Stephen Marsh
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
The results of the experiments carried out in a simulated competitive emarketplace confirm that our proposed mechanism leads to better utility for buyers in such an environment.  ...  In this paper, we propose an adaptive mechanism built on a game theoretic basis for buyers to determine their optimal reputation reporting strategy, by modeling both the competency and willingness of other  ...  To formalize the importance degree of the interaction partner (as used in both Equations 1 and 2), we further define a distribution of V p (T r) = −log(1 − T r) where T r represents the trustworthiness  ... 
doi:10.1109/trustcom.2012.125 dblp:conf/trustcom/NoorianZFM12 fatcat:uyqzirbqsbf4xmwchclvbqfn3e

Between trust and control in interorganizational collaboration – rethinking formal and informal governance in R&D alliances

Kaisa Henttonen, Pia Hurmelinna-Laukkanen, Kirsimarja Blomqvist
2019 VINE Journal of Information and Knowledge Management Systems  
In this study, the authors move from the opposite ends of a continuum between trust as an attitude and control exercised through formal contracts toward the center of the continuum where trust and contracting  ...  Findings The authors find, first, that controlling an organization's own knowledge assets in R&D alliances with informal means of protection can be more effective than a strategy of controlling the alliance  ...  We suggest that for trust to create value in R&D alliances, a trustor must analytically evaluate and audit a specific trustee's trustworthiness along the dimensions of trust, specifically, competence,  ... 
doi:10.1108/vjikms-02-2019-0027 fatcat:v7lbv7cv2zeyvkb63xrygo2wpy

A formal approach towards measuring trust in distributed systems

Guido Schryen, Melanie Volkamer, Sebastian Ries, Sheikh Mahbub Habib
2011 Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11  
The results of the qualitative part include the specification of a formal trust language and the representation of its terms by means of propositional logic formulas.  ...  Based on these formulas, the quantitative part returns trust metrics for the determination of trustworthiness with which given distributed systems are assumed to fulfill a particular security requirement  ...  We use this model for the proposition of a formal trust language, which contains trustworthiness terms, which formally describe trustworthiness properties of a system (regarding a particular security requirement  ... 
doi:10.1145/1982185.1982548 dblp:conf/sac/SchryenVRH11 fatcat:xqqxntri6jawvli3tszzzci7xu

Trust-oriented buyer strategies for seller reporting and selection in competitive electronic marketplaces

Zeinab Noorian, Jie Zhang, Yuan Liu, Stephen Marsh, Michael Fleming
2013 Autonomous Agents and Multi-Agent Systems  
In this paper, we propose a trustoriented mechanism built on a game theoretic basis for buyers to: (1) determine an optimal seller reporting strategy, by modeling the trustworthiness (competency and willingness  ...  ) of advisers in reporting seller information; (2) discover sellers who maximize their profit by modeling the trustworthiness of sellers and considering the buyers' preferences on product quality.  ...  More formally, the trustworthiness of an adviser is calculated as follows: W i (a i ) = H b (a i ) * e −Dev t (a i ) (9) Dev t (a i ) = Dev t−1 (a i ) +|r (a i ) −μ| 0 e x dx, Dev 0 a i = 0 ( 1 0 ) where  ... 
doi:10.1007/s10458-013-9243-z fatcat:hpt2vuc45jbcba6zimrs6j7xdy

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

Hassan Takabi, Morteza Amini, Rasool Jalili
2007 Third International Symposium on Information Assurance and Security  
We investigated using of a fuzzy approach to address the issue in order to provide a more practical solution.  ...  The concept of trustworthiness, which is fuzzy in nature, is used to express this model. In comparison with non-fuzzy methods, our method is more pragmatic and more consistent with the real world.  ...  Formally: assigned pemissions(r) = {p ∈ P RMS | (p, r) ∈ P A} • U T (u : U SERS) → T D, the mapping of user u into the corresponding trustworthiness degree (manyto-one mapping). • RT (r : ROLES) → T D,  ... 
doi:10.1109/ias.2007.68 dblp:conf/IEEEias/TakabiAJ07 fatcat:mrbdklqt6jfhjhlvnryxdzr6o4

Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces [chapter]

Jie Zhang, Robin Cohen, Kate Larson
2010 IFIP Advances in Information and Communication Technology  
We theoretically prove that in a marketplace operating with our mechanism: i) buyers will be better off honestly reporting seller ratings and ii) sellers are better off being honest, to earn better profit  ...  In this paper, we examine a trust-based framework for promoting honesty in e-marketplaces that relies on buyers forming social networks to share reputation ratings of sellers and sellers rewarding the  ...  The buyer in our mechanism will allow only a number of the most trustworthy sellers to join the auction.  ... 
doi:10.1007/978-3-642-13446-3_15 fatcat:cydn6msgkbahlnc4o7q7tpqrdu

An incentive mechanism for eliciting fair ratings of sellers in e-marketplaces

Jie Zhang, Robin Cohen
2007 Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems - AAMAS '07  
In this paper, we propose a novel incentive mechanism for eliciting fair ratings of selling agents from buying agents.  ...  In our mechanism, buyers model other buyers and select the most trustworthy ones as their neighbors from whom they can ask advice about sellers.  ...  INCENTIVE MECHANISM To formalize the proposed incentive mechanism, we consider the scenario that in an electronic marketplace a buyer B wants to buy a product p.  ... 
doi:10.1145/1329125.1329258 dblp:conf/atal/ZhangC07 fatcat:w4eizglzirfr5j5yed6t3c2vuq

COMBINING TRUST MODELING AND MECHANISM DESIGN FOR PROMOTING HONESTY IN E-MARKETPLACES

Jie Zhang, Robin Cohen, Kate Larson
2012 Computational intelligence  
We emphasize the value of our approach through a series of illustrative examples and in direct contrast to other frameworks for addressing agent trustworthiness.  ...  In our mechanism, buyers model other buyers and select the most trustworthy ones as their neighbors to form a social network which can be used to ask advice about sellers.  ...  The buyer in our mechanism will allow only a number of the most trustworthy sellers to join the auction.  ... 
doi:10.1111/j.1467-8640.2012.00428.x fatcat:rljxfxfmmfhpvpaji4ctdopfq4

Trustworthiness Measurement Algorithm for TWfMS Based on Software Behaviour Entropy

Qiang Han
2018 Entropy  
Accompanying the trustworthiness mechanism, the measurement algorithm, with uncertain software behaviour trustworthiness information of the WfMS, should be resolved as an infrastructure.  ...  In order to construct a trustworthy workflow management system (TWfMS), the design of a software behaviour trustworthiness measurement algorithm is an urgent task for researchers.  ...  Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/e20030195 pmid:33265286 fatcat:66llurixknfkhm5hsxwjra43am

Model-based behavioral attestation

Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert
2008 Proceedings of the 13th ACM symposium on Access control models and technologies - SACMAT '08  
In this paper, we present a novel approach where the trustworthiness of a platform is associated with the behavior of a policy model.  ...  Existing approaches for the realization of remote attestation measure the trustworthiness of a target platform from its binaries, configurations, properties or security policies.  ...  Formally: States : p → P(T ) For each state ti for usage session (s, o, r) where ti ∈ T and s ∈ S, o ∈ O,rR, the expected behavior exbi of state ti is equal to a set of symbols used to denote that trustworthiness  ... 
doi:10.1145/1377836.1377864 dblp:conf/sacmat/AlamZNAS08 fatcat:bfptnanq6vf5dlwtfju3hm6egu
« Previous Showing results 1 — 15 out of 40,945 results