The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust is becoming an increasingly important issue in large-scale distributed systems. Especially self-managed systems from the Autonomic and Organic Computing domains consisting of several cooperating entities have to rely on an automated estimation how reliable and trustworthy potential cooperation partners are. In this paper, we introduce a novel concept to represent trust among those entities....
In order to cater for a growing user base that requires varied functionalities and owns multiple devices, software providers are using cloud solutions as the preferred technical means. In fact, all major operating systems come with a tight integration to cloud services. Software solutions that have such integration with cloud services should disclose (transparency) this to the consumer. Furthermore,...
Transaction context is an important aspect that should be taken into account for reputation-based trust assessment, because referrals are bound to the situation-specific context in which they were created. The non-consideration of transaction context may cause several threats such as the value imbalance problem. Exploiting this weakness, a seller can build high reputation by selling cheap products...
This study describes and evaluates a novel trust model for a range of collaborative applications. The model assumes that humans routinely choose to trust their peers by relying on few recurrent presumptions, which are domain independent and which form a recognisable trust expertise. We refer to these presumptions as trust schemes, a specialised version of Walton's argumentation schemes. Evidence is...
In the absence of legal authorities and enforcement mechanisms in open e-marketplaces, it is extremely challenging for a user to validate the quality of opinions (i.e. Ratings and reviews) of products or services provided by other users (referred as advisers). Rationally, advisers tend to be reluctant to share their truthful experience with others. In this paper, we propose an adaptive incentive mechanism,...
In Intelligent Tutoring System (ITS), peer affective feedback could be an effective solution to regulate the learners' emotions when the feedback provided by the ITS is inadequate. However, this option raises many privacy problems since peer affective feedback involves the disclosure of the learner's personal data. However, the protection of learners' privacy is imperative to ensure an unbiased environment...
There are some contexts in social networks in which obsolescence of knowledge of a person regarding some topic of interest should be considered when establishing trust between parties. However, and as of this writing, obsolescence of knowledge has not been considered as a dimension in trust models. In this work we propose to consider obsolescence of knowledge in trust models. Two studies were run...
In p2p marketplaces, users often have to decide if someone is trustworthy or not. Sometimes, this decision is based purely on faith, which is something not everyone is willing to do. For this reason, trust has been identified as one of the key factors for the success of the sharing economy. Over the years trust mechanisms have been developed on a per site basis (i.e. feedback, voting or reputation...
The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to be used to infer about the state of the world and decide actions in response. In these highly fluid operational environments, involving information providers and consumers of various...
Reputation is an important aspect of trust. If no direct trust experiences are available, one needs to rely on reputation data from other sources. In this paper we present the Neighbor-Trust metric that exploits these communication capabilities of a network by directly asking all neighbors of a target communication partner for reputation trust data. This results in a reputation path of length one,...
Peer-to-peer (P2P) networks have shown great potentials in providing a wide range of services starting from simple file sharing to distributed computing. However, P2P systems present ominous threats due to its anonymous and dynamic nature. One feasible way to minimize the threats is to evaluate the trust and reputation of the interacting peers. Trust models have often been deployed in determining...
Being able to make objective Quality of Service (QoS) judgments or assessments is a challenging and crucial activity. The process of making these assessments is compounded when the environment in which the assessments have to be made are virtual; in the sense the interacting parties might not have necessarily met with each other physically. In a broad sense Quality of Service assessments could be...
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
Rigidly pre-planned business processes are applied in the field of production planning and product development to coordinate the collaboration of single enterprises. Each step in these workflows is precisely scheduled, accounting for external constraints such as availability of material, delivery dates, and efficiency of humans and machines. However, finally all these steps are performed, or at least...
Knowledge would be considered as important element in knowledge-based economy and it makes a strong competitive advantage in dynamic business environment. In knowledge management, knowledge sharing is the most critical elements of effective knowledge processing. Several studies have been done to explain why people share knowledge and some of them have been mentioned in this paper. The next issue is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.