Search results for "Computational trust"
showing 3 items of 3 documents
Decentralised trust-management inspired by ant pheromones
2017
Computational trust is increasingly utilised to select interaction partners in open technical systems consisting of heterogeneous, autonomous agents. Current approaches rely on centralised elements for managing trust ratings (i.e. control and provide access to aggregated ratings). Consider a grid computing application as illustrating example: agents share their computing resources and cooperate in terms of processing computing jobs. These agents are free to join and leave, and they decide on their own with whom to interact. The impact of malicious or uncooperative agents can be countered by only cooperating with agents that have shown to be benevolent: trust relationships are established. T…
Understanding lacking trust in global software teams: A multi-case study
2007
Many organizations have turned toward globally distributed software development in their quest for higher-quality software delivered cheaply and quickly. But this kind of development has often been reported as problematic and complex to manage. One of the fundamental factors in determining the success and failure of globally distributed software teams is trust. The aim of our work has therefore been to describe the key factors causing lack of trust, and the main effects of lacking trust in such teams. From studying 4 projects, all located in two different countries, with trust problems we found the key factors to be poor socialization and socio-cultural fit, lack of face-to-face meetings, m…
A trust-based security enforcement in disruption-tolerant networks
2017
We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.