Abstract We introduce a trust evaluation method applicable in a decentralized set-ting, in which no universally trusted authority exists. The method makes simulta-neous use of logic and probability theory. The result of the qualitative part of the method are logical arguments for and against the reliability of an entity. The quan-titative part returns the probability that the reliability of an entity can be deduced under the given assumptions and pieces of evidence, as well a corresponding prob-ability for the counter-hypothesis. Our method is a true generalization of existing methods, in particular the Credential Networks. It relies on digital signatures for authenticating messages and accounts for many-to-many relationships between en-tit...
In this work, we provide a logical characterization of trust, which is based on a modal logic expres...
Researchers have done much around how to measure trust degrees or levels by local and global style i...
The evaluation of the trustworthiness of complex systems is a challenge in current IT research. We c...
50 pagesBefore using a digital system, it is necessary to evaluate it according to different paramet...
In this thesis a Model of Trust based on Bayesian Networks is introduced. The model determines the t...
International audienceWhen users need to perform a digital activity, they evaluate available systems...
In traditional security systems, for each task, we either trust an agent or we don\u27t. If we trust...
Trust is an approach to managing the uncertainty about au-tonomous entities and the information they...
We propose generic declarative definitions of individual and collective trust relations between inte...
Emerging digital environments and infrastructures, such as distributed security services and distrib...
. Authentication in open networks usually requires participation of trusted entities. Many protocols...
Trust should be substantially based on evidence. Further, a key challenge for multiagent systems is ...
The aim of this paper is two folds. Firstly, some of the well known methods of trust modeling and tr...
AbstractThe purpose of this paper is to show how probabilistic argumentation is applicable to modern...
Computational trust is the digital counterpart of the human notion of trust as applied in social sys...
In this work, we provide a logical characterization of trust, which is based on a modal logic expres...
Researchers have done much around how to measure trust degrees or levels by local and global style i...
The evaluation of the trustworthiness of complex systems is a challenge in current IT research. We c...
50 pagesBefore using a digital system, it is necessary to evaluate it according to different paramet...
In this thesis a Model of Trust based on Bayesian Networks is introduced. The model determines the t...
International audienceWhen users need to perform a digital activity, they evaluate available systems...
In traditional security systems, for each task, we either trust an agent or we don\u27t. If we trust...
Trust is an approach to managing the uncertainty about au-tonomous entities and the information they...
We propose generic declarative definitions of individual and collective trust relations between inte...
Emerging digital environments and infrastructures, such as distributed security services and distrib...
. Authentication in open networks usually requires participation of trusted entities. Many protocols...
Trust should be substantially based on evidence. Further, a key challenge for multiagent systems is ...
The aim of this paper is two folds. Firstly, some of the well known methods of trust modeling and tr...
AbstractThe purpose of this paper is to show how probabilistic argumentation is applicable to modern...
Computational trust is the digital counterpart of the human notion of trust as applied in social sys...
In this work, we provide a logical characterization of trust, which is based on a modal logic expres...
Researchers have done much around how to measure trust degrees or levels by local and global style i...
The evaluation of the trustworthiness of complex systems is a challenge in current IT research. We c...