The consensus operator for combining beliefs
Artificial Intelligence
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Trust Dynamics for Collaborative Global Computing
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Co-Operation in the Digital Age — Engendering Trust in Electronic Environments
BT Technology Journal
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Managing risks in RBAC employed distributed environments
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Trust lifecycle management in a global computing environment
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
How social structure improves distributed reputation systems: three hypotheses
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Hi-index | 0.00 |
A significant characteristic of global computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction will function as expected. In this paper, we explore an architecture for interaction/ collaboration in global computing systems. This architecture reflects the aspects of the trust lifecycle in three stages: trust formation, trust evolution and trust exploitation, forming a basis for risk assessment and interaction decisions.