what-when-how
In Depth Tutorials and Information
STN Applications
Risk Assessment
Trustworthiness Evaluation
Trust Propagation
Trust Computing Platform
Entity Recognition
Network Layer
Figure 11.3
Trust computing security architecture. (From Fengming Liu and
Yongsheng Ding. Social network-based trust computing in P2P environments
intelligentcontrolandautomation,2008. 7th World Congress on WCICA 2008 .
June25-27,2008,pp.2130-2135.)
harm the benefits of the nodes (e.g., the more investment put in a transaction, the
more risk will be generated).
hus, a risk assessment mechanism is needed to calculate the risk involved in
cooperation to avoid some kind of loss. he risk information can be disseminated
by mutual acquaintances [14]. Trust can be propagated through the relationship
among nodes, which could be a trust decreasing procedure. Finally, the web of trust
will be established in an STN.
11.4 TrustComputation
In this section we will focus on how to calculate trustworthiness. As an impor-
tant indicator of the degree of trust, reputation is used widely in the trust
modeling. Reputation is a form of collective opinion about a subject by the
community that is part of a larger sociocognitive mechanism [13]. It can be
used to direct the transaction and communication cooperatively in social tech-
nical systems.
he factors that affect reputation must be considered when modeling trust.
here might be several essential issues [19]:
1. he opinion in terms of amount of satisfaction a peer receives from another
peer (O)
2. he total number of transactions/interactions a peer has performed (N)
3. he reputation of the opinion provider, relecting his/her credibility (R)
4. Temporal adaptability of opinion factor (T)
5. he community context factor (W)
he importance of factor (O) is obvious. Reputation is determined mostly by the feed-
back from other nodes. he opinion providers who have a good reputation tend to
 
Search WWH ::




Custom Search