1 / 42

“You can't trust any bugger further than you can throw him, and there's nothing you can do about it, so let's have a dri

Trust Areas Steve Marsh Carleton University, November 25th, 2009 steve.marsh@crc.gc.ca. “You can't trust any bugger further than you can throw him, and there's nothing you can do about it, so let's have a drink” Terry Pratchett. © stephen marsh, 2009. Outline. Caveats…. Why.

chi
Télécharger la présentation

“You can't trust any bugger further than you can throw him, and there's nothing you can do about it, so let's have a dri

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trust Areas Steve Marsh Carleton University, November 25th, 2009 steve.marsh@crc.gc.ca “You can't trust any bugger further than you can throw him, and there's nothing you can do about it, so let's have a drink” Terry Pratchett © stephen marsh, 2009

  2. Outline Caveats… Why What (including talk of many things) What Next

  3. Caveats Point, not tell…

  4. Why?

  5. Why? The need for assurance

  6. Why? The wisdom of crowds

  7. Why? The aggregation of data

  8. Why? Squeezing the tomatoes

  9. Agents

  10. Services and Grid

  11. What?

  12. What? Authentication and Security Reputation Systems Trust Management Systems Trusted Computing Regret Management Trust Reasoning Grids Agents HCI, Persuasion

  13. Trust Management

  14. Trust Management Umbrella

  15. Trust Management Background

  16. Trust Management Currently

  17. Trust Management Rule or Reputation…

  18. Authentication and Security Proving you are who you say you are Proving you’re an okay person Getting access to resources Sending private messages (and receiving same) Getting assurance Gaining confidence Sharing secrets

  19. Authentication and Security PKI

  20. Authentication and Security WoT

  21. Authentication and Security PGP

  22. Authentication and Security Trusted Computing No, wait…

  23. Trusted Computing (deserves its own slides…)

  24. Authentication and Security Policies and Negotiation

  25. Reputation Management

  26. Reputation Management Principles

  27. Reputation Management Whuffie

  28. Reputation Management Practice

  29. Reputation Management PageRank

  30. Reputation Management SlashDot

  31. Reputation Management eBay

  32. Reputation Management Quis custodiet ipsos custodes?

  33. Reputation Management P2P

  34. Reputation Management Referral networks and “if you liked this…”

  35. Reputation Management The Strength of Weak Ties

  36. Reputation Management Transitivity

  37. Regret Management

  38. Persuasion(HCI)

  39. (Some of )This should not work!

  40. Problems Deceit Cheap pseudonyms Expectations Fraud Attacks

  41. Problems See next lecture… Deceit Cheap pseudonyms Expectations Fraud Attacks

  42. Resources

More Related