Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria

被引:10
作者
Bistarelli, S. [1 ,2 ,3 ]
Foley, S. N. [4 ]
O'Sullivan, B. [4 ,5 ]
Santini, F. [1 ,3 ]
机构
[1] CNR, Ist Informat & Telemat, IT-56124 Pisa, Italy
[2] Univ Perugia, Dipartimento Matemat & Informat, I-06100 Perugia, Italy
[3] Univ G dAnnunzio, Dipartimento Sci, Chieti Pescara, Italy
[4] Univ Coll Cork, Dept Comp Sci, Cork, Ireland
[5] Cork Constraint Computat Ctr, Cork, Ireland
关键词
soft constraint logic programming; and-or graphs; trust propagation; trust network;
D O I
10.1002/sec.252
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multitrust provides a flexible approach to encoding trust metrics whereby definitions for trust propagation and aggregation are specified in terms of a semiring. Determining the degree of trust between principals across a trust network (TN) is, in turn, programmed as a (semiring-based) soft-constraint satisfaction problem. In this paper, we consider the use of semiring-based metrics in reasoning about trust between coalition-forming principals. The configurable nature of multitrust makes it well-suited to modeling trust within coalitions: whether adding more principals to a coalition increases trust or decreases trust is captured by the definition of trust aggregation within the semiring. Copyright (c) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:595 / 610
页数:16
相关论文
共 45 条
[31]   A survey of trust and reputation systems for online service provision [J].
Josang, Audun ;
Ismail, Roslan ;
Boyd, Colin .
DECISION SUPPORT SYSTEMS, 2007, 43 (02) :618-644
[32]   Dynamic coalition formation among rational agents [J].
Klusch, M ;
Gerber, A .
IEEE INTELLIGENT SYSTEMS, 2002, 17 (03) :42-47
[33]   Coalition formation for large-scale electronic markets [J].
Lerman, K ;
Shehory, O .
FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS, 2000, :167-174
[34]   OPTIMIZING DECISION TREES THROUGH HEURISTICALLY GUIDED SEARCH [J].
MARTELLI, A ;
MONTANARI, U .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :1025-1039
[35]  
Rahman AA., 1997, PROC ACM NEW SECURIT, P48
[36]  
Ramakrishnan I.V., 1995, INT C LOGIC PROGRAMM, P697
[37]   Constraint Handling Rules and tabled execution [J].
Schrijvers, T ;
Warren, DS .
LOGIC PROGRAMMING, PROCEEDINGS, 2004, 3132 :120-136
[38]  
Theodorakopoulos George., 2004, Proc. ACM Workshop on Wireless Security, P1, DOI DOI 10.1145/1023646.1023648
[39]  
Twigg A, 2003, TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, P275
[40]   Trust and reputation management in a small-world network [J].
Venkatraman, M ;
Yu, B ;
Singh, MP .
FOURTH INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS, PROCEEDINGS, 2000, :449-450