43,548 Hits in 3.1 sec

Towards an Ontology of Trust for Situational Understanding [chapter]

Owain Carpanini, Federico Cerutti
2017 Advances in Intelligent Systems and Computing  
In this paper we propose a computational methodology for assessing the impact of trust associated to sources of information in situational understanding activities-i.e. relating relevant information and  ...  Often trust in the source of information serves as a proxy for evaluating the quality of the information itself, especially in the cases of information overhead.  ...  An Ontology of Trust for Situational Understanding What is an Ontology? An ontology comprises two components [1] : the vocabulary (TBox) and the assertions about individuals (ABox).  ... 
doi:10.1007/978-3-319-66939-7_25 fatcat:dcfyowfoyjbfhe3tm3dp33oy4y

UTPO: User's Trust Profile Ontology - Modeling trust towards Online Health Information Sources [article]

Prakruthi Karuna, Hemant Purohit, Vivian Motti
2019 arXiv   pre-print
We design a survey experiment to validate the taxonomical factors, and propose an ontology using the taxonomy of factors, such that each user's trust could be modeled as an instance of our ontology and  ...  This paper presents a taxonomy of relevant factors that influence user' trust towards online health information sources.  ...  These cues or factors later determine the value of trust for a given situation or context.  ... 
arXiv:1901.01276v1 fatcat:uyhfmj6gabbwdcvownxnhhogea

The Realization of Harmony in a Broken World: Reconsidering the Role of Ethics in Milbank's Ontology of Peace

Christiane Alpers
2017 Political Theology  
as an ideal toward which an entire society should work, under the guidance of ethical laws.  ...  Milbank's Christian ontology of peace indicates a way out of the contemporary crisis of Western democracies.  ...  Milbank's understanding of the present situation is all too tragic, which is why he introduces an ideal harmony as goal toward which the whole society should work.  ... 
doi:10.1080/1462317x.2017.1312142 fatcat:jmvelwmgsngzboiupszzgdhexa

Comtrusto: Composite Trust-Based Ontology Framework For Information And Decision Fusion

Alessandro Oltramari, Jin-Hee Cho
2015 Zenodo  
In this work, we propose an ontology-based framework for information fusion, as a support system for human decision makers.  ...  Based on the concept of multidimensional trust, we construct a composite trust ontology framework, called ComTrustO, that embraces four trust ontologies, one for each trust type.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
doi:10.5281/zenodo.23209 fatcat:iaaxrgmo4rbk5o25lrgg473zjy

The Phenomena of Trusting and Relational Ontologies

Joseph J Godfrey S.J
1995 Journal of French and Francophone Philosophy  
Insofar as the ontologies suggest what to look for as phenomena, and how to interpret phenomena, the ontologies contribute to the understanding of trust, within the hermeneutic circle.  ...  My aim in this essay is to show connections between the phenomena of trusting and some types of ontology, specifically of relational ontologies.  ...  NEGATIVE ONTOLOGY: BUBER' Martin Buber's understanding of I-Thou relation may indeed point towards an ontology, but apointer is not a description, let alone an ontology formulated in a conventional way  ... 
doi:10.5195/jffp.1995.100 fatcat:ptn3ww22fbgk5ff4jf2xqzkgte

Computational ontology of network operations

Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls, Patrick McDaniel
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
In this article we outline an ontology of secure operations in cyberspace, describing its primary characteristics through some basic modeling examples.  ...  We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art, namely lack of comprehensive knowledge representation and effective automatic  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
doi:10.1109/milcom.2015.7357462 dblp:conf/milcom/OltramariCWM15 fatcat:gf2jgh2tofdxvof3o3qjoppape

ORDAIN: An Ontology for Trust Management in the Internet of Things [chapter]

Kalliopi Kravari, Nick Bassiliades
2017 Lecture Notes in Computer Science  
Defining an ontology and using semantic descriptions for data related to trustworthiness issues will provide an important instrument in developing distributed trust (reputation) models.  ...  Currently, most of the ontologies and semantic description frameworks in the Internet of Things are either context-based or at an early stage.  ...  Acknowledgments The Postdoctoral Research was implemented through an IKY scholarship funded by the "Strengthening Post-Academic Researchers / Researchers" Act from the resources of the OP "Human Resources  ... 
doi:10.1007/978-3-319-69459-7_15 fatcat:gbmhwhdgbbehho3bh25oesdzri

Towards an Ontology of Trust [chapter]

Lea Viljanen
2005 Lecture Notes in Computer Science  
This analysis is used to create a new comprehensive ontology for trust to facilitate interaction between business systems.  ...  However, there is no single definition of trust that everybody would share.  ...  Acknowledgements This article is based on work performed in the TuBE project (Trust based on evidence) at the Department of Computer Science at the University of Helsinki.  ... 
doi:10.1007/11537878_18 fatcat:vlnajjov2rdupaxar23udwaxxi

Trust and Reputation for Successful Software Self-organisation [chapter]

Jean-Marc Seigneur, Pierpaolo Dondio
2011 Natural Computing Series  
Objectives After reading this chapter the reader will: • understand what computational trust and reputation are; 155 . . .a way of exploiting established trust relationships for distributed security policy  ...  Firstly, in quality assessment of open source software, discussing the case where different trustors have different understandings of trust and trust estimation methods.  ...  It defines the elements composing the notion of trust for the particular domain. We can represent a trust model as an ontology.  ... 
doi:10.1007/978-3-642-17348-6_8 fatcat:zikljtdwmzd5bn3nn7hial4vne

Ontological security, self-articulation and the securitization of identity

Christopher S Browning, Pertti Joenniemi
2016 Cooperation and Conflict  
In contrast, the article calls for a more open understanding that: (i) links ontological security to reflexivity and avoids collapsing together the concepts of self, identity and ontological security;  ...  of violence more towards the theorization of positive change.  ...  Thus, following Giddens both Mitzen and Steele emphasise the importance of 'basic trust' and 'reflexivity' to an actor's search for ontological security.  ... 
doi:10.1177/0010836716653161 fatcat:xks62o5x3re6xbtf5vnl7fxm2i

The Re-Emergence of Critical Pedagogy: A Three-Dimensional Framework for Teacher Education in the Age of Teacher Effectiveness

Nicholas J. Shudak
2014 Creative Education  
An understanding of critical pedagogy must begin with a disclaimer. This disclaimer suggests that though there are common objectives, there are key points of contestation.  ...  In light of the extensive treatment given over its thirty year existence, this article develops a framework for helping teachers understand the applicability and relevance of critical pedagogy in the classroom  ...  On Freire's terms, it is the essential difference between an ontology of becoming versus an ontology of being.  ... 
doi:10.4236/ce.2014.511113 fatcat:z2val7wukreetaju34nitjaspa

A real-world approach to secure and trusted negotiation in MASs

Roberto Bianchi, Andrea Fontana, Federico Bergenti
2005 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05  
In this work we present an innovative model of interaction between agents that leads to an increase in the level of trust in negotiation-intensive MASs.  ...  Agents are supposed to perform crucial tasks autonomously; however, they cannot exploit an extensive set of laws since the development of a full legal corpus for the computer world is yet to come.  ...  The authors would like to thank all partners for their contributions.  ... 
doi:10.1145/1082473.1082674 dblp:conf/atal/BianchiFB05 fatcat:s6kxlehw75cvtarvrdex22nyre

Sustainable Islamic Development Recognizing The Primacy Of Trust, Iman And Institutions

Nazim Zaman, Shafiullah Jan
2012 Business & Economic Review  
Modern socio-economic writings on trust have contributed much to its understanding as an important element in studying human behaviour in society.  ...  This study will identify some fundamental assumptions of modernity which prevent the better understanding of trust as a human entity and then propose that Islamic ontology, not confined by any such assumptions  ...  stabilise the order and so bolster trust Considering each of the three situations given above in more detail, the roles, functions and results of trust in each one may be explored. a ) Trust at an individual  ... 
doi:10.22547/ber/4.1.3 fatcat:hrvlhvwd65bllihnowgdryanmy


Daniel Trivellato, Nicola Zannone, Sandro Etalle
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
In this demo we present a prototype implementation of POLIPO, a security framework that combines context-aware access control with trust management and ontology-based services to protect information in  ...  Systems of Systems (SoS) are dynamic, distributed coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal.  ...  ACKNOWLEDGEMENTS This work has been carried out as part of the POSEIDON project under the responsibility of the Embedded Systems Institute (ESI).  ... 
doi:10.1145/2046707.2093513 fatcat:ztqg5ehlv5bulgfzaxl56prnme

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security.  ...  Methods/Statistical Analysis: The main focus of the study includes analysis of the security schemes with respect to the use of security parameters such as context and trust.  ...  applications need to understand the requirements and demands of the situation without the intrusion of the human to organise and structure the dynamic operability of its internal components.  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq
« Previous Showing results 1 — 15 out of 43,548 results