Software reliability: measurement, prediction, application
Software reliability: measurement, prediction, application
Software engineering for safety: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Safety Critical Computer Systems
Safety Critical Computer Systems
Trust in Cyberspace
CHI '00 Extended Abstracts on Human Factors in Computing Systems
Formal System Development with KIV
FASE '00 Proceedings of the Third Internationsl Conference on Fundamental Approaches to Software Engineering: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Progress on the State Explosion Problem in Model Checking
Informatics - 10 Years Back. 10 Years Ahead.
Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the volumes are based on the Advanced Course on Petri Nets
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Trust in Electronic Commerce: Definition and Theoretical Considerations
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 4 - Volume 4
An investigation of functional correctness issues
An investigation of functional correctness issues
On-line trust: concepts, evolving themes, a model
International Journal of Human-Computer Studies - Special issue: Trust and technology
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Usability Meanings and Interpretations in ISO Standards
Software Quality Control
Organic computing: on the feasibility of controlled emergence
Proceedings of the 2nd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
The Knowledge Engineering Review
Toward Trustworthy Software Systems
Computer
Emergence is coupled to scope, not level: Research Articles
Complexity - Complex Systems Engineering
Toward establishing trust in adaptive agents
Proceedings of the 13th international conference on Intelligent user interfaces
A Multi-agent Model of Deceit and Trust in Intercultural Trade
ICCCI '09 Proceedings of the 1st International Conference on Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems
Specifying standard security mechanisms in multi-agent systems
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Autonomic trust management in a component based software system
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Dependability in Pervasive Computing: Challenges and Chances
Journal of Information Technology Research
Hi-index | 0.00 |
Organic Computing (OC) systems differ from classical software systems as the topology and the participating components of the system are not predefined and therefore are subject to unforeseeable change during the systems' runtime. Thus, completely new challenges to the verification and validation of such systems as well as for interactions between system components and, of course, between the system and the user arise. These challenges can be subsumed by the terms trustworthiness or trust. This paper proposes - after exploring the notions and principles of trust in the literature - a definition of trust which encompasses all aspects that define the trustworthiness of an Organic Computing system. It then outlines the different research challenges that have to be tackled in order to provide an understanding of trust in OC-systems and gives perspectives on how this endeavour can be taken on. Current research initiatives in the area of trust in computing systems are reviewed and discussed.