Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Social trust: a cognitive approach
Trust and deception in virtual societies
Reputation and social network analysis in multi-agent systems
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Social ReGreT, a reputation model based on social relations
ACM SIGecom Exchanges - Chains of commitment
Detecting deception in reputation management
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
The Knowledge Engineering Review
Expectations and deployment of agent technology in manufacturing and defence: case studies
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Trust Model for Open Ubiquitous Agent Systems
IAT '05 Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology
An integrated trust and reputation model for open multi-agent systems
Autonomous Agents and Multi-Agent Systems
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Agent-Based Network Protection Against Malicious Code
CEEMAS '07 Proceedings of the 5th international Central and Eastern European conference on Multi-Agent Systems and Applications V
Collaborative Attack Detection in High-Speed Networks
CEEMAS '07 Proceedings of the 5th international Central and Eastern European conference on Multi-Agent Systems and Applications V
Towards Trust-Based Acquisition of Unverifiable Information
CIA '08 Proceedings of the 12th international workshop on Cooperative Information Agents XII
Trust-Based Classifier Combination for Network Anomaly Detection
CIA '08 Proceedings of the 12th international workshop on Cooperative Information Agents XII
Improving Anomaly Detection Error Rate by Collective Trust Modeling
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Cross-Situation Trust Reasoning
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Combining Cognitive with Computational Trust Reasoning
Trust in Agent Societies
Trust estimation using contextual fitness
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part I
Partial identities as a foundation for trust and reputation
Engineering Applications of Artificial Intelligence
A situation-aware computational trust model for selecting partners
Transactions on computational collective intelligence V
A dynamic agents' behavior model for computational trust
EPIA'11 Proceedings of the 15th Portugese conference on Progress in artificial intelligence
Trust evaluation initialization using contextual information
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Engineering trust alignment: Theory, method and experimentation
International Journal of Human-Computer Studies
Hi-index | 0.00 |
We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents, (ii) repetitive interactions and (iii) similar trusting situations. The proposed approach formalizes the situation (context) and/or trusted agent identity in a multi-dimensional Identity-Context feature space, and attaches the trustworthiness evaluations to individual elements from this metric space, rather than to fixed identity tags (e.g. AIDs, addresses). Trustworthiness of the individual elements of the I-C space can be evaluated using any trust model that supports weighted aggregations and updates, allowing the integration of the mechanism with most existing work. Trust models with the proposed extension are appropriate for deployment in dynamic, ad-hoc and mobile environments, where the agent platform can't guarantee the identity of the agents and where the cryptography-based identity management techniques may be too costly due to the unreliable and costly communication.