Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31790
Trustworthy in Virtual Organization

Authors: Abdolhamid Fetanat, Mehdi Naghian Feshaareki

Abstract:

In open settings, the participants in virtual organization are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relies upon being able to model the trustworthiness of the agents with whom it interacts. Fundamentally, such models must consider the past behavior of the other parties in order to predict their future behavior. Further, it is sensible for the agents to share information via referrals to trustworthy agents. In this article, trust is a bet on the future contingent actions of others" and enumerates six major factors supporting it: (1) reputation, (2) performance, (3) appearance, (4) accountability, (5) precommitment, and (6) contextual facilitation.

Keywords: Trustworthy, trust, virtual organization.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1056058

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1135

References:


[1] N. Adam and J. Worthmann, "Security-control methods for statistical databases: a comparative study", ACM Computing Surveys, 21 (4), 515-556, 1989.
[2] M. Bovens and Z. Stavros, "From street-level to system-level bureaucracies: how information and communication technology is transforming administrative discretion and constitutional control". Public Administration Review, 62 (2), 174-184, 2002.
[3] K.M. Carley and M.J. Prietula, "Computational Organization Theory", Hillsdale, NJ, Lawrence Erlbaum Associates, 1994.
[4] P. Eckman, "Telling lies: clues to deceit in the marketplace, politics, and marriage", New York: Norton, 2001.
[5] I. Foster, C. Kesselman and S. Tuecke, "The anatomy of the grid: Enabling scalable virtual organizations", The International Journal of High Performance Computing Applications 15(3):200-222, 2001.
[6] B. Friedman, P. Kahn and D. Howe, "Trust online", Communications of the ACM, 43 (12), 34-40, 2000.
[7] M. Blaze, J. Feigenbaum and J. Lacy, "Decentralized trust management", In Proceedings of the 1996 IEEE Conference on Security and Privacy, Oakland, CA, 1996.
[8] D. Gambetta, " Can We Trust Trust?", in Trust: Making and Breaking Cooperative Relations, D. Gambetta, Ed. Basil Blackwell. Oxford, 1990, pp. 213.238.
[9] A. Kerckhoffs, "La cryptographie militaire. Journal des sciences militaries", IX(38):5.38 (January) and 161.191 (February), 1883. Available at F. Petitcola's Website: http://www.cl.cam.ac.uk/_fapp2/kerckhoffs/.
[10] N.Postman, "Technopoly: the surrender of culture to technology", New York: Vintage,1993.
[11] A.J├©sang and V.A.Bondi, "Legal Reasoning with Subjective Logic", Artificial Reasoning and Law, 8(4):289-315, winter 2000.
[12] S.Ross, "Security through Usability", Securius Newsletter,4(1), 2003.
[13] J.Prins, "E-organization and its implications for administrative law: regulatory initiatives in France, Germany, Norway, and the United States", London, UK: Cambridge, 2002.
[14] N.Rowe, "Designing good deceptions in defense of information systems", Computer Security Applications Conference, Tucson, AZ, 2004.
[15] R.Slayton and J.Arthur, "Public administration for a democratic society: Instilling public trust through greater collaboration with agents", In Malkia, M., Savolainen, R., and Anttiroiko, A.-V. (Eds.), Etransformation in governance: new directions for organization (pp. 110- 130). Hershey, PA: Idea Group, 2003.
[16] R.Smith," Authentication: from passwords to public keys", Reading, MA: Addison-Wesley Professional, 2001.
[17] P.Sztompka, "Trust", Cambridge, UK: Cambridge University Press, 1999.
[18] A. Theoharis, "A culture of secrecy: the organization versus the people's right to know", Lawrence, KS: University Press of Kansas, 1998.
[19] P.Wayner, "Disappearing cryptography: information hiding: steganography and watermarking", San Francisco: Morgan Kaufmann, 2002.
[20] H.Yu, D.Kundur, and C.Y.Lin, " Spies, thieves, and lies: the battle for multimedia in the virtualera", IEEE Multimedia, 8 (3), 8-12, 2001.
[21] A. Whitten and J. Tygar, "Usability of Security: A Case Study", Computer Science Technical Report CMU-CS-98-155, Carnegie Mellon University, 1998.
[22] A. Whitten and J. Tygar, "Why Johnny Can't Encrypt:A Usability Evaluation of PGP 5.0.", In Proceedings of the 8th USENIX Security Symposium, Washington,D.C., August 1999.
[23] M. Zurko and R. Simon, "User-Centered Security", In C. Meadows, editor, Proc. of the 1996 New Security Paradigms Workshop. ACM, 1996.