Academia.eduAcademia.edu

Computational Models of Trust

description45 papers
group79 followers
lightbulbAbout this topic
Computational Models of Trust refer to the formal representations and algorithms used to quantify, analyze, and simulate trust dynamics in various systems, particularly in artificial intelligence and multi-agent systems. These models aim to understand how trust influences interactions, decision-making, and cooperation among agents in uncertain environments.
lightbulbAbout this topic
Computational Models of Trust refer to the formal representations and algorithms used to quantify, analyze, and simulate trust dynamics in various systems, particularly in artificial intelligence and multi-agent systems. These models aim to understand how trust influences interactions, decision-making, and cooperation among agents in uncertain environments.
We provide a defence against whitewashing for trust assessment mechanisms (TAM) by using an underlying social network in MAS and P2P. Since interaction requests are routed through the social network, routers can block requests from... more
Presentation by Petri Yllö 1.11.2006 Agenda • Background, motivation and goals • Trust definition and generic model components • 4 sample integrated trust models • Comparison evaluation test • Conclusion and future work
Currently, knowledge management is a key issue for companies as it gives them a competitive advantage. A Community of Practice (CoP) is a means to encourage employees to manage knowledge and enables them to exchange knowledge and... more
Cryptocurrencies based on blockchain infrastructures have shown their advantages such as double-spending resistance and decentralization. Each transaction of cryptocurrency requires a certain amount of computation and attracts transaction... more
Nowadays knowledge management is a highly important issue for organizations since it helps to improve their competitive advantage. A means to encourage employees to manage knowledge is that of communities of practice in which employees... more
In this paper we present a trust model for an enhanced version of MR2 micropayment scheme. We named this scheme TMR2. TMR2's lightweight trust model is based on user polling, sales volume and vendor's reputation. We claim that TMR2 can... more
The development of novel high-throughput technologies has opened up the opportunity to deeply characterize patient tissues at various molecular levels and has given rise to a paradigm shift in medicine towards personalized therapies.... more
In a multi-agent system (MAS), it is very usual that agents delegate tasks to each other. However, due to the subjectivity of the information used by agents during the decision-making process, an agent may end up delegating a task to an... more
Many computational methods to predict the macromolecular targets of small organic molecules have been presented to date. Despite progress, target prediction methods still have important limitations. For example, the most accurate methods... more
A proposal of offline transaction system in cellular transactions based on the study of micro-transactions. Actually, it is an study of implementation of safer transaction system in cellular network. The past framework has wide usage of... more
Cinnamons are a new computation model intended to form a theoretical foundation for Control Network Programming (CNP). CNP has established itself as a programming approach combining declarative and imperative features. It supports... more
Abstract. Studies on trust in information sources have mostly focused on whether the source is capable of providing correct and complete information, thus overlooking another essential aspect of trust: the assessment of relevance.... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
Currently, knowledge management is a key issue for companies as it gives them a competitive advantage. A Community of Practice (CoP) is a means to encourage employees to manage knowledge and enables them to exchange knowledge and... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
The micropayment has a special position in mobile commerce (m-commerce). Micropayment systems allow payments with low values. In these systems amount of payments are very low so implementation of security is limited to necessity. One of... more
In this paper we focus on the importance of generalized knowledge: agents' categories. The cognitive advantage of generalized knowledge can be synthesized in this claim: "It allows us to know a lot about something/somebody we do... more
We present the results from a series of experiments aimed at uncovering the discourse structure of man-machine communication in natural language (Wizard of Oz experiments). The results suggest the existence of different classes of... more
Coral reefs are highly biodiverse ecosystems and provide vital resources for the human population. Due to increasing pressure by climate change and local stressors, these ecosystems currently face a global crisis. The development of tools... more
by to le
Recently, electronic commerce has become the focus of Information Technology development. Many electronic payment protocols and systems have been launched onto the Internet, but most of them induce complex cryptography and authentication... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
In open MAS it is often a problem to achieve agents' interoperability. The heterogeneity of its components turns the establishment of interaction or cooperation among them into a non trivial task, since agents may use different internal... more
Trust and reputation have proved to help protect societies against harmful individuals. Inspired by these principles, many computational models have been and new ones continue to be proposed in the literature to protect multiagent... more
Interaction between heterogeneous agents can raise some problems since agents may not use the same models and concepts. Therefore, the use of some mechanisms to achieve interoperability between models allows agents to interact. In this... more
Everyone agrees on the importance of enabling trust on the SemanticWeb to ensure more efficient agent interaction. Current research on trust seems to focus on developing computational models, semantic representations, inference... more
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can affect decisions.... more
This work describes a cognitive heuristic allowing agents to assess trust and delegations merging heterogenous information sources. The model is realized through Uninformed Cognitive Maps, based on the combination of: (i) categorization... more
In open and dynamic multiagent systems (MASs), agents often need to rely on resources or services provided by other agents to accomplish their goals. During this process, agents are exposed to the risk of being exploited by others. These... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
Electronic payment systems are increasingly in need of improvement as they constitute the base for electronic commerce which is rapidly dominating much trade and particularly retail. One such system that allows payments of low value is... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the uncertainty and risk inherent in the environment. Reputation... more
Micropayments (payments worth a few pennies) have numerous potential applications. A challenge in achieving them is that payment networks charge fees that are high compared to "micro" sums of money. Wheeler (1996) and Rivest (1997)... more
We propose MITRA, a meta-model for the information flow in (computational) trust and reputation architectures. On an abstract level, MITRA describes the information flow as it is inherent in prominent trust and reputation models from the... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
In this paper we will examine two main aspects of trust dynamics: a) How direct experiences involving trust, with their successes or failures, influence the future trust of an agent about similar facts. We challenge the trivial idea that... more
In the last decades globalization dynamics have determined a continuous increase in freight flows and a growing global competition for the interception of these flows. This had a tremendous impact on the global supply chains configuration... more
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a... more
Cinnamons are a new computation model intended to form a theoretical foundation for Control Network Programming (CNP). CNP has established itself as a programming approach combining declarative and imperative features. It supports... more
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their dynamic nature, the lack of central points, and their highly resource-constrained nodes. In this paper we explore the use of evolutionary... more
The development of electronic commerce has led to a new trend: the distribution of digital information. Micropayment systems come as an alternative, allowing the implementation of such transactions at low costs. This work introduces a... more
Secure multi-party computation (MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. Among many secure MPC primitives, Shamir's secret sharing (SSS) has the advantages of having low... more
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash... more
Everyone agrees on the importance of enabling trust on the SemanticWeb to ensure more efficient agent interaction. Current research on trust seems to focus on developing computational models, semantic representations, inference... more
Reputation systems have the potential of improving the quality of on-line markets by identifying fraudulent users and subsequently dealing with these users can be prevented. The behaviour of participants involved in e-commerce can be... more
There have been a number of proposals for trust and reputation-based systems. Some have been implemented, some have been analysed only by simulation. In this paper we first present a general architecture for a trust-based system, placing... more
Route path identification on the Internet of Vehicles (IoV) is complicated due to the nature of high dynamic mobility, bandwidth constraints, and traffic load. A vehicle present on the IoV communicates with each other to find the status... more
Recently Peer-to-Peer Content Delivery Networks (P2P CDNs) have attracted considerable attention as a cost-effective way to disseminate digital contents to paid users in a scalable and dependable manner. However, due to its peer-to-peer... more
Micropayments are increasingly being adopted by a large number of applications. However, processing micropayments individually can be expensive, with transaction fees exceeding the payment value itself. By aggregating these small... more
Download research papers for free!