Abstract
We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents, (ii) repetitive interactions and (iii) similar trusting situations. The proposed approach formalizes the situation (context) and/or trusted agent identity in a multi-dimensional Identity-Context feature space, and attaches the trustworthiness evaluations to individual elements from this metric space, rather than to fixed identity tags (e.g. AIDs, addresses). Trustworthiness of the individual elements of the I-C space can be evaluated using any trust model that supports weighted aggregations and updates, allowing the integration of the mechanism with most existing work. Trust models with the proposed extension are appropriate for deployment in dynamic, ad-hoc and mobile environments, where the agent platform can’t guarantee the identity of the agents and where the cryptography-based identity management techniques may be too costly due to the unreliable and costly communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marsh, S.: Formalising trust as a computational concept (1994)
Falcone, R., Castelfranchi, C.: Social trust: a cognitive approach, pp. 55–90 (2001)
Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33–60 (2005)
Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multiagent systems. The Knowledge Engineering Review 19 (2004)
Stallings, W.: Cryptography and network security: principles and practice, 2nd edn. Prentice-Hall, Inc., Englewood Cliffs (1999)
Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Alonso, E., Kudenko, D., Kazakov, D. (eds.) Adaptive Agents and Multi-Agent Systems. LNCS (LNAI), vol. 2636, pp. 475–482. Springer, Heidelberg (2003)
Pechoucek, M., Rehak, M., Marik, V.: Expectations and deployment of agent technology in manufacturing and defence: case studies. In: Pechoucek, M., Steiner, D., Thompson, S.G. (eds.) AAMAS Industrial Applications, pp. 100–106. ACM Press, New York (2005)
Sabater, J., Sierra, C.: Social regret, a reputation model based on social relations. SIGecom Exch. 3, 44–56 (2002)
Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems 13, 119–154 (2006)
Rehák, M., Foltýn, L., Pěchoucek, M., Benda, P.: Trust model for open ubiquitous agent systems. In: Intelligent Agent Technology, 2005 IEEE/WIC/ACM International Conference. Number PR2416 in IEEE (2005)
Josang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4, 139–162 (2006)
Yu, B., Singh, M.P.: Detecting deception in reputation management. In: AAMAS 2003, pp. 73–80. ACM Press, New York (2003)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn., p. 654. John Wiley & Sons, New York (2001)
Rehák, M., Tožička, J, Pěchouček, M., prokopová, M., Foltýn, L.: Autonomous protection mechanism for joint networks in coalition operations. In: Knowledge Systems for Coalition Operations 2007, Proceedings of KIMAS 2007 (2007)
Birk, A.: Boosting cooperation by evolving trust. Applied Artificial Intelligence 14, 769–784 (2000)
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.-N., Kumar, V., Srivastava, J., Dokas, P.: Minds - minnesota intrusion detection system. In: Next Generation Data Mining, MIT Press, Cambridge (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rehák, M., Pěchouček, M. (2007). Trust Modeling with Context Representation and Generalized Identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds) Cooperative Information Agents XI. CIA 2007. Lecture Notes in Computer Science(), vol 4676. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75119-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-75119-9_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75118-2
Online ISBN: 978-3-540-75119-9
eBook Packages: Computer ScienceComputer Science (R0)