1 / 16

A Survey of Trust Evaluation Methods (Supervisor : Yan Wang )

A Survey of Trust Evaluation Methods (Supervisor : Yan Wang ). Name :Erden Sacan Student ID :40916332 Unit :ITEC810 . Agenda. Definition of Trust and an example Four major areas in application of trust evaluation methods Findings of research & conclusion. What is Trust?.

ima
Télécharger la présentation

A Survey of Trust Evaluation Methods (Supervisor : Yan Wang )

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Survey of Trust Evaluation Methods(Supervisor: Yan Wang) Name :Erden Sacan Student ID :40916332 Unit :ITEC810

  2. Agenda • Definition of Trust and an example • Four major areas in application of trust evaluation methods • Findings of research & conclusion A Survey of Trust Evaluation Methods

  3. What is Trust? • “A relationship of reliance dependent on what other people say.” • “An agent’s estimate of how likely another is to fulfil its commitments “ A Survey of Trust Evaluation Methods

  4. Trust Evaluation Methods Survey • Various ways to measure trust in computer applications. • How to choose? • Which one is the best? • Is there a “best” • Collect and classify trust evaluation methods • Analyse and find; • Strenghts • Weaknessess • Similarities • General requirements of different applications A Survey of Trust Evaluation Methods

  5. An Example! A Survey of Trust Evaluation Methods

  6. User Feedback Ratings A Survey of Trust Evaluation Methods

  7. eBay summary • Buyers and sellers in can rate each other • Negative, neutral or positive ratings • User Rating= positive feedback count – negative feedback • Feedback ratingssummary is displayed on user’s profile • Too simple - But it works! (Ref:www.ebay.com) A Survey of Trust Evaluation Methods

  8. Major applications • E-commerce • Peer-to-peer networks • Gnutella, BitTorrent • Service-oriented computing • Distributed software development • Multi-supplier supply chains for web services A Survey of Trust Evaluation Methods

  9. E-commerce • Needs centralised management • Binary rankings are not enough • Negative ratings are very uncommon • Needs additional parameters of trust: • Customer satisfaction level • Number of transactions by a party • The amounts of transactions • Timely delivery of goods A Survey of Trust Evaluation Methods

  10. P2P Networks • P2P Information sharing networks • Open to public • Big scale • No central authority • Mostly requesting party doesn’t know target (serving) party A Survey of Trust Evaluation Methods

  11. P2P Networks – Trust Systems • Binary rankings generally work • File transfer – (successful or unsuccessful) • Self-policing (Not centralised) • Anonymity (Hide user IDs) • No profit for newcomers • Minimal overhead • Parties are not always online A Survey of Trust Evaluation Methods

  12. Service Oriented Computing (SOC) • Service Oriented Computing: • Many providers offering services over the network • Distributed software development • Fast, cheap, highly reusable services(coding and orchestration of code) • Also adopted by other sectors • Travel agencies(car rental, hotel, airline, insurance services) A Survey of Trust Evaluation Methods

  13. Service Oriented Computing (SOC) – How to use trust? A Survey of Trust Evaluation Methods

  14. Service Oriented Computing (SOC) – Trust Methods • SOC Trust Evaluation Methods: • Many domains – many rules – trust system needs to be flexible (event driven) • System should consider; • Quality of Service • Timeliness • Use multiple feedback sources (memberhips, certificates) • Needs good filtering of malicious and fake entries A Survey of Trust Evaluation Methods

  15. Conclusion • “All-in-one-best trust mechanism” – Not possible! (At least for now) • Every area has different requirements • Some needs a simple approach • Some needs many parameters • All of them need to prevent malicious entries A Survey of Trust Evaluation Methods

  16. Thank You... • Today we have talked about; • What trust is • Trust evaluation methods in different applications • Trust evaluation requirements of applications. A Survey of Trust Evaluation Methods

More Related