Academia.eduAcademia.edu

Outline

The Pudding of Trust

2004, IEEE Intelligent Systems

Abstract

In this essay, we poke at several sacred cows (even though we like their milk and drink it ourselves) and point out several overlooked ordinary cows as well. We discuss our little herd of claims in five sections. Trust-"reliance on the integrity, ability, or character of a person or thing" 1 -is pervasive in social systems. We constantly apply it in interactions between people, organizations, animals, and even artifacts ("Can I trust my car on this vacation trip?"). We use it instinctively and implicitly in closed and static systems, or consciously and explicitly in open or dynamic systems. An epitome for the former case is a small village, where everybody knows everybody, and the villagers instinctively use their knowledge or stereotypes to trust or distrust their neighbors. A big city exemplifies the latter case, where people use explicit rules of behavior in diverse trust relationships. A city dweller builds up trust, for instance, by asking friends or recommendation services for a dependable plumber. If trust is so pervasive and beneficial in complex social systems, why not exploit pervasive trust as a paradigm in computing environments? (Using pervasive trust in nonpervasive computing is not a contradiction!) We already use trust in computing systems extensively, although usually subconsciously. Examples are users' trust-based decisions to search for reputable ISPs or e-banking sites, or to ignore emails from "Nigerians" asking for help transferring millions of dollars out of their country. The challenge for exploiting trust in computing lies in extending the use of trust-based solutions, first to artificial entities such as software agents or subsystems, then to human users' subconscious choices.

References (40)

  1. T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Communications Surveys and Tutorials, vol. 3, no. 4, 2000; www.comsoc. org/livepubs/surveys/public/2000/dec/pdf/grandison.pdf. Editor's Perspective References 1. The American Heritage Dictionary of the English Language, 4th ed., Houghton Mifflin, 2000.
  2. B. Bhargava et al., Trust, Privacy, and Security: Summary of a Workshop Breakout Session at the National Science Foundation Information and Data Management (IDM) Workshop held
  3. T. Grandison and M. Sloman, "Trust Man- agement Tools for Internet Applications," Proc. 1st Int'l Conf. Trust Management, LNCS 2692, Springer-Verlag, 2003, pp. 91-107.
  4. C. English, S. Terzis, and W. Wagealla, "Engi- neering Trust Based Collaborations in a Global Computing Environment," Proc. 2nd Int'l Conf. Trust Management, LNCS, Springer-Verlag, 2004, pp. 120-134.
  5. T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Com- munications Surveys and Tutorials, vol. 3, no. 4, 2000; www.comsoc.org/livepubs/surveys/ public/2000/dec/index.html.
  6. L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Elec- tronic Communities," IEEE Trans. Knowl- edge and Data Eng., vol. 16, no. 7, 2004, pp. 843-857.
  7. A. Josang and S. LoPresti, "Analysing the Relationship between Risk and Trust," Proc. 2nd Int'l Conf. Trust Management, LNCS, Springer-Verlag, 2004, pp. 135-145.
  8. S. Keoh and E. Lupu, "PEACE: A Policy-Based Establishment of Ad-Hoc Communities," Ann. Computer Security Conf. (ACSAC 04), 2004.
  9. N. Damianou et al., "The Ponder Specifica- tion Language," Proc. Policy 2001: Workshop Policies for Distributed Systems and Networks, LNCS 1995, Springer-Verlag, 2001, pp. 18-39.
  10. J. Seigneur and C. Jensen, "Trading Privacy for Trust," Proc. 2nd Int'l Conf. Trust Man- agement, LNCS, Springer-Verlag, 2004, pp. 93-107.
  11. S. Marsh, Formalizing Trust as a Computa- tional Concept, doctoral dissertation, Dept. of Computing Science, Univ. of Sterling, 1994.
  12. A. Abdul-Rahman and S. Hailes, "Support- ing Trust in Virtual Communities," Proc. 33rd Hawaii Int'l Conf. System Sciences (HICSS), IEEE CS Press, 2000.
  13. F. Hussain, E. Chang, and T.S. Dillon, "Clas- sification of Trust in Peer-to-Peer (P2P) Com- munication," Int'l J. Computer Systems Sci- ence and Eng., vol. 19, no. 2, 2004, pp. 59-72.
  14. F. Hussain, E. Chang, and T.S. Dillon, "Trust- worthiness and CCCI Metrics for Assigning Trustworthiness in P2P Communication," Int'l J. Computer Systems Science and Eng., vol. 19, no 4, 2004, pp. 95-112.
  15. B. Yu and M.P. Singh, "Distributed Reputa- tion Management for Electronic Commerce," Computational Intelligence, vol. 18, no. 4, 2002, pp. 535-549.
  16. S.D. Kamvar, M.T. Schlosser, and H. Garcia- Molina, "The EigenTrust Algorithm for Rep- utation Management in P2P Networks," Proc. 12th Int'l World Wide Web Conf., ACM Press, 2003.
  17. Y. Wang and J. Vassileva, "Bayesian Net- work-Based Trust Model in Peer-to-Peer Net- works," Proc. Workshop Deception, Fraud, and Trust in Agent Societies, Autonomous Agents and Multi-Agent Systems Conf. (AAMAS 03), 2003.
  18. E. Damiani et al., "Managing and Sharing Servents' Reputations in P2P Systems," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, 2003, pp. 840-854.
  19. L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Com- munities," to appear in IEEE Trans. Knowl- edge and Data Eng., special issue on peer-to- peer based data management, 2004.
  20. K. Aberer and Z. Despotovic, "Managing Trust in a Peer-to-Peer Information System," Proc. Conf. Information and Knowledge Man- agement (CIKM 2001), 2001, pp. 310-317.
  21. W. Nejdl et al., "EDUTELLA: A P2P Net- working Infrastructure Based on RDF," Proc. 11th Int'l World Wide Web Conf. (WWW 2002), ACM Press, 2002, pp. 604-615.
  22. A. Halevy et al., "Piazza: Data Management Infrastructure for Semantic Web Applica- tions," Proc. 12th Int'l World Wide Web Conf. (WWW 2003), ACM Press, 2003, pp. 556-567.
  23. T. Yu, M. Winslett, and K. Seamons, "Sup- porting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation," ACM Trans. Information and System Security, vol. 6, no. 1, 2003, pp. 1-42.
  24. R. Gavriloaie et al., "No Registration Needed: How to Use Declarative Policies and Negoti- ation to Access Sensitive Resources on the Semantic Web," Proc. 1st European Seman- tic Web Symp., Springer-Verlag, 2004, pp. 342-356.
  25. J. Basney et al., "Negotiating Trust on the Grid," Proc. 2nd Workshop Semantics in Peer- to-Peer and Grid Computing, 2004, www.isi. edu/~hongsuda/SemPGRID04/proceedings/ proceedings.pdf.
  26. J. Trevor, "SD3: A Trust Management Sys- tem with Certified Evaluation," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2001, p. 106.
  27. N. Li and J.C. Mitchell, "RT: A Role-Based Trust-Management Framework," Proc. DARPA Information Survivability Conf. and Exposi- tion (DISCEX 03), IEEE CS Press, 2003.
  28. M.Y. Becker and P. Sewell, "Cassandra: Dis- tributed Access Control Policies with Tun- able Expressiveness," Proc. IEEE Workshop Policies in Distributed Systems and Networks (POLICY 2004), IEEE CS Press, 2004, pp. 159-168.
  29. P.A. Bonatti and P. Samarati, "A Uniform Framework for Regulating Service Access and Information Release on the Web," J. Computer Security, vol. 10, no. 3, 2002, pp. 241-272. References
  30. "Digital Biology: The Emerging Paradigm," Biomedical Information Science and Tech- nology Symp., 2003.
  31. "Workshop on Data Management for Molec- ular and Cell Biology," 9 Dec. 2003, http:// pueblo.lbl.gov/~olken/wdmbio.
  32. V. Kashyap, "Emergent Semantics: An Orga- nizing Principle for Biomedical Informatics and Knowledge Management," Semantic Web Challenges for Knowledge Management, AIS SIGSEMIS Bulletin, vol. 1, no. 2, 2004.
  33. T. Berners-Lee, J. Hendler, and O. Lassila, "The Semantic Web: A New Form of Web Content That Is Meaningful to Computers Will Unleash a Revolution of New Possibili- ties," Scientific American, May 2001.
  34. C. Behrens and V. Kashyap, "The 'Emergent' Semantic Web: A Consensus Approach for Deriving Semantic Knowledge on the Web," Real World Semantic Web Applications, Fron- tiers in Artificial Intelligence and Applica- tions, vol. 92, IOS Press, 2002.
  35. A. Mädche et al., "Emergent Semantics," IEEE Intelligent Systems, vol. 17, no. 1, 2002, pp. 78-86.
  36. K. Aberer et al., "Emergent Semantics Sys- tems," Proc. Int'l Conf. Semantics of a Net- worked World: Semantics for Grid Databases, 2004.
  37. K. Aberer, P. Cudré-Mauroux, and M. Hauswirth, "The Chatty Web: Emergent Semantics through Gossiping," Proc. 12th Int'l World Wide Web Conf. (WWW 2003), ACM Press, 2003.
  38. V. Kashyap and A. Borgida, "Representing the UMLS Semantic Network Using OWL (or What's in a Semantic Web Link?)," Proc. 2nd Int'l Semantic Web Conf. (ISWC 03), LNCS 2870, Springer-Verlag, 2003, pp. 1-16.
  39. S. Boll et al., "Do You Trust in Data Quality?" Working Group on Trust and Data Quality, Dagstuhl Workshop on Data Quality, Nov. 2003; http://sirius.cs.ucdavis.edu/Dagstuhl03/ wgs/03362.KashyapVipul.Other.ppt.
  40. M. Richardson, R. Agrawal, and P. Domin- gos, "Trust Management for the Semantic Web," Proc. 2nd Int'l Semantic Web Conf. (ISWC 2003), LNCS 2870, Springer-Verlag, 2003, pp. 351-368.