168,531 Hits in 4.3 sec

Context-dependent Trust Decisions with Subjective Logic [article]

Federico Cerutti, Alice Toniolo, Nir Oren, Timothy J. Norman
2013 arXiv   pre-print
Jøsang's Subjective Logic has long been used in the trust domain, and we show that its operators are insufficient to address this problem.  ...  We therefore provide a decision-making approach about trust which also considers the notion of confidence (based on context) through the introduction of a new operator.  ...  It has also been recognised that trust is often context dependent.  ... 
arXiv:1309.4994v1 fatcat:fnjfquejtrf4zdufudxgwuuwhm

Subjective logic based trust model for geographic routing in mobile ad hoc networks

2016 Tehnički Vjesnik  
This paper proposes a subjective logic based trust model in POR (SLT-POR) that integrates both the behavioural and context based trust in trust model.  ...  The behavioural based trust incorporates subjective logic based evidence fusion in indirect trust evaluation to explicitly represent and manage ignorance as uncertainty.  ...  The indirect trust is estimated by fusing the collected evidence from different observers based on the subjective logic method. • The subjective logic method improves the decision accuracy of indirect  ... 
doi:10.17559/tv-20150207070245 fatcat:qm75ybk6nfegfjrk6h3x2efdue

A Classification of Trust Systems [chapter]

Sebastian Ries, Jussi Kangasharju, Max Mühlhäuser
2006 Lecture Notes in Computer Science  
In this paper we provide a survey and classification of established and upcoming trust systems, focusing on trust models.  ...  Yet, the transfer of the multi-facetted concept of trust to virtual social networks is an open challenge.  ...  Subjective Logic The trust model presented by Jøsang [10] , named "subjective logic", combines elements of Bayesian probability theory with belief theory.  ... 
doi:10.1007/11915034_114 fatcat:gr2hxdoe7ncj7d7z3e7smyqw2u

A Survey on Trust Modeling

Jin-Hee Cho, Kevin Chan, Sibel Adali
2015 ACM Computing Surveys  
model and quantify trust with sufficient detail and context-based adequateness.  ...  In addition, the diverse application domains require different aspects of trust for decision making such as emotional, logical, and relational trust.  ...  CONSTRUCTS OF TRUST As trust is subjective in nature and context dependent, various dimensions of trust have been considered in different contexts with different purposes.  ... 
doi:10.1145/2815595 fatcat:3p5ape47tjh4bf4sn7a7utd5gy

Overview of Trust Models Integrating Trust Management into Grid Computing

Slavom´ır Kaveck´, Penka Martincov´
2015 International Journal of Computer Applications  
However, the accuracy of the made decisions is dependent on a correct assessment and representation of trustworthiness assigned to the collaborating parties.  ...  In the last few years several trust models were proposed. The models incorporate trust into the process of decision making whether or not to collaborate through a grid environment.  ...  However, the definition of decision trust implies that trust in form of direct experiences, recommendations and context dependent information is not sufficient to determine the trustworthiness of the trusted  ... 
doi:10.5120/ijca2015906657 fatcat:jj4pxjrulbgprbjbmkbdc3ofwi

Situational Awareness based Risk-adaptable Access Control in Enterprise Networks

Brian Lee, Roman Vanickis, Franklin Rogelio, Paul Jacob
2017 Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security  
Such security models incorporate risk arising from dynamic and situational factors, such as device location and security risk level risk, into the access control decision.  ...  As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),enterprises are moving away from traditional perimeter based security models toward so called zero trust  ...  The definition of these terms is very much context and organisation dependent though possible inputs to security risk determination could include e.g. trust in user or device, the current threat level,  ... 
doi:10.5220/0006363404000405 dblp:conf/iotbd/LeeVRJ17 fatcat:6hyrlplhe5hllmg2e3v2cwe3wa

Risk-Based Access Control Model: A Systematic Literature Review

Hany F. Atlam, Muhammad Ajmal Azad, Madini O. Alassafi, Abdulrahman A. Alshdadi, Ahmed Alenezi
2020 Future Internet  
With dynamic systems such as the Internet of Things (IoT) with billions of things that are distributed everywhere, these access control models are obsolete.  ...  This model estimates the security risk value related to the access request dynamically to determine the access decision.  ...  While behavioral trust works with the entity's trustworthiness, which depends on certain contexts [59] .  ... 
doi:10.3390/fi12060103 fatcat:67bie5kwpngrjdbujhtu7l4dqm

Specifying and Analysing Trust for Internet Applications [chapter]

Tyrone Grandison, Morris Sloman
2003 IFIP Advances in Information and Communication Technology  
SULTAN (Simple Universal Logic-oriented Trust Analysis Notation) is an abstract, logic-oriented notation designed to facilitate the specification and analysis of trust relationships.  ...  A trust framework for Internet applications should incorporate concepts such as experience, reputation and trusting propensity in order to specify and evaluate trust.  ...  All the logic-based frameworks that have attempted to deal with the issue of trust (namely, Jøsang's subjective logic [7] [8] [9] [10] , Jones and Firozabadi's model [11] , Rangan's model [12] , etc  ... 
doi:10.1007/978-0-387-35617-4_10 fatcat:lh2m2m3l3nb3nkhabkuylvqvmi

Context-based Retrieval for Explainable Reasoning

Stefan Schulz, Thomas R. Roth-Berghofer
2005 Revue d'intelligence artificielle : Revue des Sciences et Technologies de l'Information  
And finally, we show how to apply our approach for trust management.  ...  We present an integrative, case-based modelling approach for context and context management. We discuss the incorporation of context-based reasoning and explanation.  ...  In short, trust management is the maintenance of subject related evidence and associated decisions on trust.  ... 
doi:10.3166/ria.19.519-535 fatcat:2itpitg7ufeqpgnbcngpv5br6m

XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure

Yuri Demchenko, Mihai Cristea, Cees de Laat
2009 2009 IEEE International Symposium on Policies for Distributed Systems and Networks  
management, simple delegation, conditional authorisation decisions, and policy obligations handling.  ...  Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning workflow and network control  ...  security context and conditional policy decision.  ... 
doi:10.1109/policy.2009.33 dblp:conf/policy/DemchenkoCL09 fatcat:3b2notfzlfdf7jtg5rx2khklty

Local Trust Versus Global Trust Networks in Subjective Logic

Charif Haydar, Azim Roussanaly, Anne Boyer
2013 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)  
Subjective logic, is an extension of probabilistic logic that deals with the cases of lack of evidences. An elaborated local trust model based on subjective logic already exists.  ...  Then, we propose another global trust model based also on subjective logic.  ...  Subjective logic Subjective logic (SL) [29] is an extension of probabilistic logic, which associates each probability with a degree of uncertainty.  ... 
doi:10.1109/wi-iat.2013.5 dblp:conf/webi/HaydarRB13 fatcat:vwyooh2kv5f3zflxrqginxmlk4

Context and Trust Aware Workflow Oriented Access Framework

Tapalina Bhattasali, Nabendu Chaki, Rituparna Chaki, Khalid Saeed
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
Here, we propose a context and trust aware workflow oriented access framework.  ...  Trust is either directly or indirectly dependent on service level agreement (SLA) compliance, quality of service, reputation and provenance (historical data).  ...  Access Dependency (AD): It represents the relation between access decisions in workflow instances.  ... 
doi:10.18293/seke2016-179 dblp:conf/seke/BhattasaliCCS16 fatcat:3k5kapmkxnheressuhqyd5hori

Securing business operations in an SOA [article]

Theo Dimitrakos, David Brossard, Pierre de Leusse
2012 arXiv   pre-print
Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability.  ...  They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and transformation; and (security) policy governance for service-oriented  ...  The contributions made by the partners in the European collaborative research projects TrustCOM and BEinGRID are also acknowledged, along with those made by the researchers involved in BT's service-oriented  ... 
arXiv:1203.0429v1 fatcat:pn45fvjtcffppfcglkehj6p5pi

Analogical Trust Reasoning [chapter]

Mozhgan Tavakolifard, Peter Herrmann, Pinar Öztürk
2009 IFIP Advances in Information and Communication Technology  
We validate the proposed framework for Subjective Logic trust management model and evaluate it by conducting experiments on a large real dataset.  ...  Our framework can be coupled with existing trust management models to make them situation-aware. It uses the underlying model of trust management to transfer trust information between situations.  ...  In our approach TMM is implemented using the Subjective Logic [12] . One of our main contributions is the extension of the Subjective Logic with a context-sensitive domain model.  ... 
doi:10.1007/978-3-642-02056-8_10 fatcat:xkcb3kyhmndjjdiqfjsldcgucq

A Fuzzy Logic Based Certain Trust Model for E-Commerce [article]

Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M.M.A Hashem
2013 arXiv   pre-print
Most of the present trust models are subjective and have failed to account vagueness and ambiguity of different domain.  ...  In this paper we have proposed a new fuzzy logic based Certain Trust model which considers these ambiguity and vagueness of different domain.  ...  Again, want to thank all the researchers and developers of Trust models for their excellent work which make authors work easier to accomplish.  ... 
arXiv:1304.4028v1 fatcat:2ktityijtfdgtofjlgn6ucbg2y
« Previous Showing results 1 — 15 out of 168,531 results