Abstract

Abstract . Collaborative systems are growing in use and popularity. The need to boost the methods concerning the interoperability is growing as well; therefore, trustworthy interactions of the different systems are a priority. The decision regarding with whom and how to interact with other users or applications depends on each system. We focus on providing trust verdicts by evaluating the behaviors of different agents, using distributed on-line network monitoring. This will provide trust management systems information regarding a trustee experience, for those trust management systems based on soft trust. In this work, we propose a scalable evaluation method for any on-line network monitoring system, by using an auxiliary model, an extended finite state automaton (EFSA), and as well as other known methods to reduce the time complexity of the evaluation algorithm. Keywords: trust management; on-line network monitoring; scalable evaluation; 1. Introduction Internet applications have become one of the most popular ways to socially interact, make commerce, and create collaborative work; making them a daily part of our living. With time, the collaborative aspects supported by Internet have evolved bringing new tools, methodologies and concepts. These systems keep growing in use and in popularity. The need to boost the interoperability methods related to them is growing as well; making thus trustworthy interactions of the different systems a priority. These concepts of trust have been brought to computer science. The systems need to interact with users and with other applications. The decision regarding with whom and how to interact with other users or applications depend on each application or system. There are many definitions of trust in the literature, but the one we adopt

Highlights

  • Internet applications have become one of the most popular ways to socially interact, make commerce, and create collaborative work; making them a daily part of our living

  • Some trust management systems use security policies and authentication in order to provide the concept of trust

  • Our aim is to provide trust information in a generic manner such that, any generic framework can use the information about these behaviors and incorporate it into the trust estimation algorithm. It is our point of view, that trust management systems will benefit from different inputs using different techniques; that is the reason why we do not aim to provide another approach how to assess trust, but rather providing existing trust management systems with behavioral evaluation of interactions

Read more

Summary

Introduction

Internet applications have become one of the most popular ways to socially interact, make commerce, and create collaborative work; making them a daily part of our living. Here is the one commonly applied and defined in [1], “the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context” From this definition different types of trust management engines have been created. Some trust management systems use security policies and authentication in order to provide the concept of trust In these types of systems, to determine the entity called trustee, it implies there is a related authentication mechanism. Our aim is to provide trust information in a generic manner such that, any generic framework can use the information about these behaviors and incorporate it into the trust estimation algorithm It is our point of view, that trust management systems will benefit from different inputs using different techniques; that is the reason why we do not aim to provide another approach how to assess trust, but rather providing existing trust management systems with behavioral evaluation of interactions. In this paper, we discuss how a number of properties can be still verified for a system under test when the formal system specification is absent; and especially how to perform this process in a scalable way

Approach
Definitions and Assumptions
Scalable Evaluation of On-line Network Monitoring Systems
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.