Search results for "Computational trust"

showing 3 items of 3 documents

Decentralised trust-management inspired by ant pheromones

2017

Computational trust is increasingly utilised to select interaction partners in open technical systems consisting of heterogeneous, autonomous agents. Current approaches rely on centralised elements for managing trust ratings (i.e. control and provide access to aggregated ratings). Consider a grid computing application as illustrating example: agents share their computing resources and cooperate in terms of processing computing jobs. These agents are free to join and leave, and they decide on their own with whom to interact. The impact of malicious or uncooperative agents can be countered by only cooperating with agents that have shown to be benevolent: trust relationships are established. T…

0301 basic medicinebusiness.industryComputer scienceComputer Networks and CommunicationsMulti-agent systemAutonomous agent02 engineering and technologyOrganic computingGridcomputer.software_genreComputer securityManagement Information SystemsPublic-key cryptography03 medical and health sciences030104 developmental biologyGrid computingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringTrust management (information system)020201 artificial intelligence & image processingComputational trustbusinesscomputerSoftwareInternational Journal of Mobile Network Design and Innovation
researchProduct

Understanding lacking trust in global software teams: A multi-case study

2007

Many organizations have turned toward globally distributed software development in their quest for higher-quality software delivered cheaply and quickly. But this kind of development has often been reported as problematic and complex to manage. One of the fundamental factors in determining the success and failure of globally distributed software teams is trust. The aim of our work has therefore been to describe the key factors causing lack of trust, and the main effects of lacking trust in such teams. From studying 4 projects, all located in two different countries, with trust problems we found the key factors to be poor socialization and socio-cultural fit, lack of face-to-face meetings, m…

EngineeringKnowledge managementbusiness.industrymedia_common.quotation_subjectSocializationCognitionSoftwareWork (electrical)Quality (business)Computational trustbusinessProductivityInformation exchangemedia_common
researchProduct

A trust-based security enforcement in disruption-tolerant networks

2017

We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.

Network packetbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreMedical servicesTrustworthiness020204 information systems0202 electrical engineering electronic engineering information engineeringPeer to peer computingComputational trustUnavailabilitySubjective logicbusinessEnforcementcomputerComputer network2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct