Skip to main content

Trust Modeling with Context Representation and Generalized Identities

  • Conference paper
Cooperative Information Agents XI (CIA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4676))

Included in the following conference series:

Abstract

We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents, (ii) repetitive interactions and (iii) similar trusting situations. The proposed approach formalizes the situation (context) and/or trusted agent identity in a multi-dimensional Identity-Context feature space, and attaches the trustworthiness evaluations to individual elements from this metric space, rather than to fixed identity tags (e.g. AIDs, addresses). Trustworthiness of the individual elements of the I-C space can be evaluated using any trust model that supports weighted aggregations and updates, allowing the integration of the mechanism with most existing work. Trust models with the proposed extension are appropriate for deployment in dynamic, ad-hoc and mobile environments, where the agent platform can’t guarantee the identity of the agents and where the cryptography-based identity management techniques may be too costly due to the unreliable and costly communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marsh, S.: Formalising trust as a computational concept (1994)

    Google Scholar 

  2. Falcone, R., Castelfranchi, C.: Social trust: a cognitive approach, pp. 55–90 (2001)

    Google Scholar 

  3. Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33–60 (2005)

    Article  MATH  Google Scholar 

  4. Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multiagent systems. The Knowledge Engineering Review 19 (2004)

    Google Scholar 

  5. Stallings, W.: Cryptography and network security: principles and practice, 2nd edn. Prentice-Hall, Inc., Englewood Cliffs (1999)

    Google Scholar 

  6. Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Alonso, E., Kudenko, D., Kazakov, D. (eds.) Adaptive Agents and Multi-Agent Systems. LNCS (LNAI), vol. 2636, pp. 475–482. Springer, Heidelberg (2003)

    Google Scholar 

  7. Pechoucek, M., Rehak, M., Marik, V.: Expectations and deployment of agent technology in manufacturing and defence: case studies. In: Pechoucek, M., Steiner, D., Thompson, S.G. (eds.) AAMAS Industrial Applications, pp. 100–106. ACM Press, New York (2005)

    Google Scholar 

  8. Sabater, J., Sierra, C.: Social regret, a reputation model based on social relations. SIGecom Exch. 3, 44–56 (2002)

    Article  Google Scholar 

  9. Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems 13, 119–154 (2006)

    Article  Google Scholar 

  10. Rehák, M., Foltýn, L., Pěchoucek, M., Benda, P.: Trust model for open ubiquitous agent systems. In: Intelligent Agent Technology, 2005 IEEE/WIC/ACM International Conference. Number PR2416 in IEEE (2005)

    Google Scholar 

  11. Josang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4, 139–162 (2006)

    Google Scholar 

  12. Yu, B., Singh, M.P.: Detecting deception in reputation management. In: AAMAS 2003, pp. 73–80. ACM Press, New York (2003)

    Chapter  Google Scholar 

  13. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn., p. 654. John Wiley & Sons, New York (2001)

    MATH  Google Scholar 

  14. Rehák, M., Tožička, J, Pěchouček, M., prokopová, M., Foltýn, L.: Autonomous protection mechanism for joint networks in coalition operations. In: Knowledge Systems for Coalition Operations 2007, Proceedings of KIMAS 2007 (2007)

    Google Scholar 

  15. Birk, A.: Boosting cooperation by evolving trust. Applied Artificial Intelligence 14, 769–784 (2000)

    Article  Google Scholar 

  16. Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.-N., Kumar, V., Srivastava, J., Dokas, P.: Minds - minnesota intrusion detection system. In: Next Generation Data Mining, MIT Press, Cambridge (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Matthias Klusch Koen V. Hindriks Mike P. Papazoglou Leon Sterling

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rehák, M., Pěchouček, M. (2007). Trust Modeling with Context Representation and Generalized Identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds) Cooperative Information Agents XI. CIA 2007. Lecture Notes in Computer Science(), vol 4676. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75119-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75119-9_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75118-2

  • Online ISBN: 978-3-540-75119-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics