skip to main content
article

Establishing recommendation trust relationships for internetwares

Published: 01 January 2006 Publication History

Abstract

Internetware is a kind of significant emerging software systems built upon the coordination of autonomous, heterogeneous, and distributed software entities in the Internet. For the openness and dynamism of Internetwares, there are no central controllers existing to choose reliable software entities for them. Recently some distributed systems apply recommendation as the evidence to choose reliable entities, which may be a new approach suitable for internetwares. However, how to establish the recommendation trust relationships (RTR) among entities in the Internet dynamically is a very hard problem. This paper proposes an approach based on the relevant experiences to establish RTR among software entities dynamically during the runtime of internetwares. The main work includes: (1) providing a general approach to quantify trust and a description for experiences; (2) presenting an approach to evaluate recommendations based on the idea of hypothesis testing in statistics; (3) evolving the RTR based on the evaluations by considering history information and information quantity of interactions. It will be a beneficial contribution to the reliability and evolution of internetwares. A simulation is conducted to verify the rationality and validity of the approach at the end of the paper.

References

[1]
M. Shaw, Everyday dependability for everyday needs, Supplemental Proceedings of the 13th International Symposium on Software Reliability Engineering, IEEE Computer Society, 2002, pp. 7--11.]]
[2]
M. Shaw, Self-healing: Softening precision to avoid brittleness, Proceeding of the First ACM SIGSOFT Workshop on Self-healing Systems, 2002, pp. 111--113.]]
[3]
Yang FQ, Mei H, Lü J, Jin Z. Some discussion on the development of software technology. Acta Electronica Sinica, 2002, 30(12A):1901--1906.]]
[4]
A. Abdul-Rahman and S. Hailes. A Distributed Trust Model. In Proceedings of the 1997 New Security Paradigms Workshop, pages 48--60, Cumbria, 1997. ACM.]]
[5]
T. Beth, et al. Valuation of Trust In Open Network. In Proceedings of European Symposium On Research in Security, pages 3--18, Brighton, 1994. Springer-Verlag.]]
[6]
D. Gambetta Can we trust trust? In: Gambetta, D., ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213--237.]]
[7]
C. Jonker, J. Treur: Formal Analysis of Models for the Dynamics of Trust Based on Experiences. In: Proc. of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World. Volume 1647 of LNAI, Valencia, Springer-Verlag (1999)]]
[8]
C. English, P. Nixon, S. Terzis, et al. Dynamic Trust Models for Ubiquitous computing Environments. First Workshop on Security in Ubiquitous Computing at the Fourth Annual conference on Ubiquitous computing, October 2002.]]
[9]
Catholijn M. Jonker, et al. Human Experiments in Trust Dynamics. Second International Conference On Trust Management, 29 March- 1 April 2004, St Anne's College, Oxford UK.]]
[10]
Charles M. Grinstead and J. Laurie Snell, Introduction to Probability, available on http://www.dartmouth.edu/~chance/teaching_aids/books_articles/probability_book/book.html.]]
[11]
A. Jøsang, An Algebra for Assessing Trust in Certificate Chains. The Internet Society Symposium on Network and Distributed System Security February 03 - February 05, 1999. San Diego, California.]]
[12]
A. Jøsang, S. J. Knapskog, A metric for trusted systems. Global IT Security. Wien: Austrian Computer Society, 1998. 541--549.]]
[13]
A. Jøsang, A logic for uncertain probabilities, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Volume 9, Issue 3, June 2001.]]

Cited By

View all
  • (2021)Stability in Software Engineering: Survey of the State-of-the-Art and Research DirectionsIEEE Transactions on Software Engineering10.1109/TSE.2019.292561647:7(1468-1510)Online publication date: 1-Jul-2021
  • (2018)A Case Study on Granularity of Industrial Vision ServicesProceedings of the 2nd International Symposium on Computer Science and Intelligent Control10.1145/3284557.3284713(1-6)Online publication date: 21-Sep-2018
  • (2012)A feature-oriented approach to platform-specific modelling of coarse-grained componentsInternational Journal of Computer Applications in Technology10.1504/IJCAT.2012.04820744:1(46-60)Online publication date: 1-Jul-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 31, Issue 1
January 2006
203 pages
ISSN:0163-5948
DOI:10.1145/1108768
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2006
Published in SIGSOFT Volume 31, Issue 1

Check for updates

Author Tags

  1. internetware
  2. recommendation
  3. trust

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Stability in Software Engineering: Survey of the State-of-the-Art and Research DirectionsIEEE Transactions on Software Engineering10.1109/TSE.2019.292561647:7(1468-1510)Online publication date: 1-Jul-2021
  • (2018)A Case Study on Granularity of Industrial Vision ServicesProceedings of the 2nd International Symposium on Computer Science and Intelligent Control10.1145/3284557.3284713(1-6)Online publication date: 21-Sep-2018
  • (2012)A feature-oriented approach to platform-specific modelling of coarse-grained componentsInternational Journal of Computer Applications in Technology10.1504/IJCAT.2012.04820744:1(46-60)Online publication date: 1-Jul-2012
  • (2011)Beyond GreenProceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications10.1109/GreenCom.2011.48(234-237)Online publication date: 4-Aug-2011
  • (2010)A Measurement of Software Trustworthiness Based on Approximation AlgorithmsProceedings of the 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing10.1109/UIC-ATC.2010.58(282-287)Online publication date: 26-Oct-2010
  • (2009)Max-Minimum Algorithm for Trust Transitivity in Trustworthy NetworksProceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 0310.1109/WI-IAT.2009.231(62-64)Online publication date: 15-Sep-2009
  • (2008)A Service Trust Model with Passive TrustProceedings of the 2008 IFIP International Conference on Network and Parallel Computing10.1109/NPC.2008.14(218-225)Online publication date: 18-Oct-2008
  • (2008)A Computation Model of Trustworthy DegreeProceedings of the 2008 International Symposium on Intelligent Information Technology Application Workshops10.1109/IITA.Workshops.2008.164(523-526)Online publication date: 21-Dec-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media