Trustworthy in Virtual Organization

In open settings, the participants in virtual organization are autonomous and there is no central authority to ensure the felicity of their interactions. When agents interact in such settings, each relies upon being able to model the trustworthiness of the agents with whom it interacts. Fundamentally, such models must consider the past behavior of the other parties in order to predict their future behavior. Further, it is sensible for the agents to share information via referrals to trustworthy agents. In this article, trust is a bet on the future contingent actions of others" and enumerates six major factors supporting it: (1) reputation, (2) performance, (3) appearance, (4) accountability, (5) precommitment, and (6) contextual facilitation.




References:
[1] N. Adam and J. Worthmann, "Security-control methods for statistical
databases: a comparative study", ACM Computing Surveys, 21 (4),
515-556, 1989.
[2] M. Bovens and Z. Stavros, "From street-level to system-level
bureaucracies: how information and communication technology is
transforming administrative discretion and constitutional control".
Public Administration Review, 62 (2), 174-184, 2002.
[3] K.M. Carley and M.J. Prietula, "Computational Organization Theory",
Hillsdale, NJ, Lawrence Erlbaum Associates, 1994.
[4] P. Eckman, "Telling lies: clues to deceit in the marketplace, politics, and
marriage", New York: Norton, 2001.
[5] I. Foster, C. Kesselman and S. Tuecke, "The anatomy of the grid:
Enabling scalable virtual organizations", The International Journal of
High Performance Computing Applications 15(3):200-222, 2001.
[6] B. Friedman, P. Kahn and D. Howe, "Trust online", Communications
of the ACM, 43 (12), 34-40, 2000.
[7] M. Blaze, J. Feigenbaum and J. Lacy, "Decentralized trust management",
In Proceedings of the 1996 IEEE Conference on Security and Privacy,
Oakland, CA, 1996.
[8] D. Gambetta, " Can We Trust Trust?", in Trust: Making and Breaking
Cooperative Relations, D. Gambetta, Ed. Basil Blackwell. Oxford, 1990,
pp. 213.238.
[9] A. Kerckhoffs, "La cryptographie militaire. Journal des sciences
militaries", IX(38):5.38 (January) and 161.191 (February), 1883.
Available at F. Petitcola's Website:
http://www.cl.cam.ac.uk/_fapp2/kerckhoffs/.
[10] N.Postman, "Technopoly: the surrender of culture to technology", New
York: Vintage,1993.
[11] A.J├©sang and V.A.Bondi, "Legal Reasoning with Subjective Logic",
Artificial Reasoning and Law, 8(4):289-315, winter 2000.
[12] S.Ross, "Security through Usability", Securius Newsletter,4(1), 2003.
[13] J.Prins, "E-organization and its implications for administrative law:
regulatory initiatives in France, Germany, Norway, and the United
States", London, UK: Cambridge, 2002.
[14] N.Rowe, "Designing good deceptions in defense of information
systems", Computer Security Applications Conference, Tucson, AZ,
2004.
[15] R.Slayton and J.Arthur, "Public administration for a democratic society:
Instilling public trust through greater collaboration with agents", In
Malkia, M., Savolainen, R., and Anttiroiko, A.-V. (Eds.), Etransformation
in governance: new directions for organization (pp. 110-
130). Hershey, PA: Idea Group, 2003.
[16] R.Smith," Authentication: from passwords to public keys", Reading,
MA: Addison-Wesley Professional, 2001.
[17] P.Sztompka, "Trust", Cambridge, UK: Cambridge University Press,
1999.
[18] A. Theoharis, "A culture of secrecy: the organization versus the people's
right to know", Lawrence, KS: University Press of Kansas, 1998.
[19] P.Wayner, "Disappearing cryptography: information hiding:
steganography and watermarking", San Francisco: Morgan Kaufmann,
2002.
[20] H.Yu, D.Kundur, and C.Y.Lin, " Spies, thieves, and lies: the battle for
multimedia in the virtualera", IEEE Multimedia, 8 (3), 8-12, 2001.
[21] A. Whitten and J. Tygar, "Usability of Security: A Case Study",
Computer Science Technical Report CMU-CS-98-155, Carnegie Mellon
University, 1998.
[22] A. Whitten and J. Tygar, "Why Johnny Can't Encrypt:A Usability
Evaluation of PGP 5.0.", In Proceedings of the 8th USENIX Security
Symposium, Washington,D.C., August 1999.
[23] M. Zurko and R. Simon, "User-Centered Security", In C. Meadows,
editor, Proc. of the 1996 New Security Paradigms Workshop. ACM,
1996.