Trust dynamics for collaborative global computing

Colin English, Sotirios Terzis, Waleed Wagealla, Helen Lowe, Paddy Nixon, Andrew McGettrick

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

7 Citations (Scopus)
15 Downloads (Pure)

Abstract

Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of these collaborations is a major concern, and requires novel approaches suited to this new environment to be developed. Trust management appears to be a promising approach. Due to the dynamic nature of these collaborations, dynamism in the formation, evolution and exploitation of trust is essential. In this paper, we explore the properties of trust dynamics in this context. Trust is formed and evolves according to personal experience and recommendations. The properties of trust dynamics are expressed through a formal model of trust. Specific examples, based on an e-purse application scenario are used to demonstrate these properties.
Original languageEnglish
Title of host publicationProceedings of the Twelfth IEEE International Workshops on Enabling Technologies
Subtitle of host publicationInfrastructure for Collaborative Enterprises (WET ICE 2003)
EditorsGabriele Kotsis, Sumitra Mitra Reddy
Place of PublicationUnited States
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1-6
Number of pages6
ISBN (Print)0796519636
DOIs
Publication statusPublished - 2003
Externally publishedYes
Event12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2003) - Johannes Kepler University of Linz, Linz, Austria
Duration: 9 Jun 200311 Jun 2003

Conference

Conference12th IEEE International Workshops on Enabling Technologies
Abbreviated titleWET ICE 2003
Country/TerritoryAustria
CityLinz
Period9/06/0311/06/03

Fingerprint

Dive into the research topics of 'Trust dynamics for collaborative global computing'. Together they form a unique fingerprint.

Cite this