Seminar: Trends in Enterprise Interoperability - Trust Management for Networked : Schedule and tasks
Pre-task to be completed before Tue 9.9.2014
- Read the following article: Sini Ruohomaa, Lea Kutvonen, Trust management survey. Proceedings on Trust Management, Springer 2005, pp. 77-92.
-
Briefly respond to the following questions (and bring your answers into class on 9.9., on paper, printed in large font, short statements suitable for pasting on the walls)
- Definition of trust or trust decision?
- Differentiation between terms trust, reputation, and recommendation system?
Session I on Tue 9.9. 2014
- Learning to know a bit each other
- Introduction to the trust management topic and discussing the pre-task outcomes and extending from it
-
Getting organised on the seminar working ways: requirements on presentations, papers, schedule, writing and presenting styles, potential topics, ...
-
topic to be agreed in personal meeting resulting into a "workplan"or "abstract"
- working method is intended to be self-directed in the sence that your own interest have an effect on the storyline and selection of articles
- you are expected to give intermediate progress reports and develop the topic in collaboration with the advisor
- Grading is strongly related to the higher level of discussion in Blooms taxonomy (see the slides), which requires a level of independence in the selection of materials but assistance is available in order to make the reading around and search process quicker by adding suggested readings after having seen the initial direction you take.
- the abstract needs to include the self-designed title, definition of the trust concept in use and the relationship of the research question to this trust concept, overall storyline intentions
- 45 min presentation
- 12 pages paper, 1 column style, layed out like MSc thesis
- everyone takes equally part in all post-presentation discussion (part of grading)
-
after presentation, anonymous or signed feedback pages to be written and given directly to the presenter
- what was successful in the paper? in the presentation?
- what and how could be improved?
- what kind of general (positive) message was carried over by the paper as a whole (writing style, including depth of analysis, clarity of the scope, addressing of the research methodologies in projects reported, and understandability of the language and figures)? by the presentation? (understandability of the spoken language, structure of the presentation, visibility and understandability of the slides, confidence)
-
topic to be agreed in personal meeting resulting into a "workplan"or "abstract"
- link to seminar materials directory
Setting-up topics meetings
- each group memeber has a private goalsetting meeting in which the topic is selected, and initial articles as starting point agreed upon
- writing of an abstract / workplan
- having that abstract accepted and published for the group
-
if the domain of service-oriented computing and service ecosystems is new to you, these papers will give you a shared vocabulary with the rest of the group:
- Michael P. Papazoglou, Paolo Travers, Schahram Dustdar, Frank Leyman, Service-Oriented Computing: State of the Art and Research Challenges. Computer, Nov 2007.
- Lea Kutvonen, Janne Metso, Sini Ruohomaa, From trading to eCommunity management: Responding to social and contractual challenges. Information Systems Frontiers (2007) 9:181-194.
- pitkä versio Luis M. Camarinha-Matos and Hamideh Afsarmanesh: Virtual Enterprise Modeling and Support Infrastructures: Applying Multi-agent System Approaches. Multi-Agent Systems and Applications. LNCS2086. Springer, 2001. tai lyhyempi versio
- Ricardo J. Rabelo, Sergio Gusmeroli: The Ecolead Collaborative Business Infrastructure for Networked Organizations. (pooled local copy). Pervasive Collaborative Networks IFIP The International Federation for Information Processing Volume 283, 2008, pp 451-462.
Session II 16.9.2014
- introduction round on topics (by students themselves, based on the preceeding private meetings)
-
How do you find suitable forums of publications and project groups to follow in order to start following a new research theme?
- discussion on suitable tools for different purposes; how to estimate the article, researcher or forum quality
-
some trust-related forums, list started
- http://www.ifiptm.org/
- http://trust.sce.ntu.edu.sg/~ifiptm14/
- http://www.greenorbs.org/TrustCom2014/index.htm
- http://www.informatik.uni-trier.de/~Ley/db/conf/itrust/index.html
- http://pst2014.ryerson.ca/
- http://www.dexa.org/trustbus2014
- http://www.journaloftrustmanagement.com/
- http://airccse.org/journal/ijsptm/
- list to be continued
-
some researchers of interest from the local point of view, list started
- SP Marsh, T Grandison, A Josang, P Herrmann, Seigneur J.M , S Ruohomaa, G Ehud, Agreement technologies/trust, http://ctr.som.surrey.ac.uk/resources/#publications,
- list to be continued
-
Week starting on 15.9
- the rest of the topics fixed, personal meetings round completed
- see working method above, in Session I and II texts
Abstracts deadline
- Week starting on 22.9 abstracts sent in by email; feedback during the same week; no group meeting
- see working method above, in Session I and II texts
- no meeting on Tue 23.9 due to overlapping unit meeting for staff and students
Independent working time
- Tue 30.9 no meeting with group, available for advise and discussion in D221
- Tue 7.10no meeting with group, available for advise and discussion in D221
- on both days the normal classroom C220 is available for peer collaboration for those who wish to proceed in that manner
Papers completed, peer review
-
14.10 no meeting, papers go through peer review: dl 13.10, self-organised distribution to peer reviewers, exchange of comments
- when all topics have been agreed on, a split into 2-3 peer review groups will be published right here
- in the beginning of the week, send your paper to the peer group + advisor
- as responses to the paper, send your review comments to author + advisor only
- your advisor will give you comments and requirements as well
-
when reviewing the papers, consider the following
- clarity of the research question stated and the suitablity of the text structure for outlining the solutions presented
- appropriateness and sufficiency of analytical, synthetising, evaluating material, including discussion of the original research work research method usage (Bloom taxonomy in-depth elements)
- clarity and technical correctness of presentation
- Peer review groups and seminar work rough topics
-
Group "trust on information":
- Klaus Zaerens: Trust Based Situation Awareness in High Security Cloud Environment
- Dawit Asena: TRAVOS system - trust based reputation when informaiton sources are inaccurate
- Heikki Havukainen: Sultan trust management tool
-
Group "trust management systems"
- Liisa Lado-Villar: Trusting private information to others
- Anne Hankosalo: trust management systems approach to authorization and access control in presense of delegation (attorney)
- Anusuya Bashyam: Comparison of TrustCom and ECOLEAD (or Pilarcos) trust management systems
-
Google drive drop area for sharing papers and comments within the group
- link provided by email on 13.10 around 4 pm.
- In the directory, there are three areas: i) manuscripts ii) reviews and iii) final papers.
- In the manuscripts and final paper areas, name your manuscript and final paper with your last name and an abbreviation of your specific theme. Share pdf files!
- In the reviews area, name your feedback with receiving author name + your name. Supervisor comments (that comment also the review statements) are emailed to the address you used at the seminar registration. Use pdf or text fomats.
Final papers
- After review comments have been received, you have at least a week to improve your paper. The final paper is sent by email to the whole group + advisor a week before the presentation, so everyone is able to read it before the presentation.
- In some cases the paper is agreed to get another fixing round after the presentation. In that case you have two weeks to resubmit the paper.
- Use the same google drive domain as explained above for peer reviews.
Presentations - initial draft - with this draft, final papers due Tue 28.10.
- 4.11 Zaerens
- 11.11 Heikki Havukainen
- 18.11 Anne Hankosalo
- 25.11 Dawit Asena
- 2.12 Liisa Lado-Villar
- 9.12 Anusuya Bashyam (presentation cancelled)
For topic selection
Other suggested approaches
Each of you read the same article to start with and picked up very different aspects of trust and trust management as the key features. Interesting - and extremely relevant for the present times of trust management research and development trends. We will continue this discussion, and enhance it by picking background papers reflecting these different interpretations. Above you see some already spoken for approaches (background articles agreed on personally), and below you can find some additional approaches that match the definitions or guiding principles you took up in the initial discussion on the first session.
-
Trust decisions based on objecive weighting of risks and benefits (one of these as starting point at a time, they each take a different path)
- Wilson, Michael, et al. "The TrustCoM approach to enforcing agreements between interoperating enterprises." Enterprise Interoperability. Springer London, 2007. 365-375.
- Blaze, M., Feigenbaum, J. and Lacy, J., Decentralized trust management. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 1996, IEEE, pages 164–173, URL http://ieeexplore.ieee.org/iel3/3742/10940/00502679.pdf.
- Staab, E. and Engel, T. (2009). "Tuning Evidence-Based Trust Models". 2009 International Conference on Computational Science and Engineering. In: Proceedings of the 2009 IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT'09), Vancouver, Canada, pp. 92-99, IEEE. pp. 92–99. ISBN 978-1-4244-5334-4.
-
Attack types
-
Douceur, J. R., The sybil attack. Electronic Proceedings of the 1st International Workshop on Peer-to-Peer systems (IPTPS’02),
Cambridge, MA, USA, March 2002, page 101, URL http://www.cs.rice.edu/Conferences/IPTPS02/101.pdf
-
Douceur, J. R., The sybil attack. Electronic Proceedings of the 1st International Workshop on Peer-to-Peer systems (IPTPS’02),
-
Trust decisions as externally conducted services
- SS Msanjila, H Afsarrnanesh, Assessment and Creation of Trust in VBEs. Network-Centric Collaboration and Supporting Frameworks(2006): 161-172.
-
Agreement technologies utilising trust concepts
- PIERO BONATTI , EUGENIO OLIVEIRA , JORDI SABATER-MIR , CARLES SIERRA and F R A N C E S C A T O N I , On the integration of trust with negotiation,argumentation and semantics. The Knowledge Engineering Review, Vol. 29:1, 31–50. & Cambridge University Press, 2013 doi:10.1017/S0269888913000064.First published online 21 March 2013.
-
Reaching trust relationship as a result of negotiations
- eg. Winsborough, William H., Kent E. Seamons, and Vicki E. Jones. "Automated trust negotiation." DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings. Vol. 1. IEEE, 2000.
-
Reputation-based trust
-
Devising a trust model for multi-agent interactions using confidence and reputation
SD Ramchurn, NR Jennings, C Sierra, L GodoApplied Artificial Intelligence 18 (9-10), 833-852
-
Devising a trust model for multi-agent interactions using confidence and reputation
-
Contracts and reputation-based trust architecture
-
Wilson, Michael, et al. "The TrustCoM approach to enforcing agreements between interoperating enterprises." Enterprise Interoperability. Springer London, 2007. 365-375.
-
-
Usage schenarios for trust management systems and testing them (multiple topic areas)
-
The agent reputation and trust (ART) testbed, August
2011. http://megatron.iiia.csic.es/art-testbed/index.
html -
Blaze, M., Feigenbaum, J. and Lacy, J., Decentralized trust
management. Proceedings of the IEEE Symposium on Security
and Privacy, Oakland, California, May 1996, IEEE, pages 164–
173, URL http://ieeexplore.ieee.org/iel3/3742/10940/
00502679.pdf.
-
-
Sultan
- PolicyMaker (Blaze, M., Feigenbaum, J. and Lacy, J., Decentralized trust management. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 1996, IEEE, pages 164–173, URL http://ieeexplore.ieee.org/iel3/3742/10940/00502679.pdf.)
- Sultan: Tyrone Grandison and Morris Sloman, Trust Management Tools for Internet Applications -- uudem
-
Delegation
- Blaze, Matt, John Ioannidis, and Angelos D. Keromytis. "Experience with the keynote trust management system: Applications and future directions." Trust Management. Springer Berlin Heidelberg, 2003. 284-300.
Some surveys (and common readings)
- McKnight D.H., Chervany N.L. (2002). Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model. In: Proceedings of the 34th Hawaii International Conference on System Sciences.
- Mui L., Halberstadt A, Mohtashemi M. (2002). Notions of Reputation in Multi-Agent Systems: a Review. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-02), Bologna, Italy, pp. 280-287.
-
Isaac Pinyol · Jordi Sabater-Mir, Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev (2013) 40:1–25
DOI 10.1007/s10462-011-9277-z. -
J Sabater, C Sierra Review on computational trust and reputation models Artificial Intelligence Review 24 (1), 33-60
-
Grandison, Tyrone, and Morris Sloman. "A survey of trust in internet applications." Communications Surveys & Tutorials, IEEE 3.4 (2000): 2-16.
-
Cho, Jin-Hee, Ananthram Swami, and Ray Chen. "A survey on trust management for mobile ad hoc networks." Communications Surveys & Tutorials, IEEE 13.4 (2011): 562-583.