Trust Theory


Book Description

This book provides an introduction, discussion, and formal-based modelling of trust theory and its applications in agent-based systems This book gives an accessible explanation of the importance of trust in human interaction and, in general, in autonomous cognitive agents including autonomous technologies. The authors explain the concepts of trust, and describe a principled, general theory of trust grounded on cognitive, cultural, institutional, technical, and normative solutions. This provides a strong base for the author’s discussion of role of trust in agent-based systems supporting human-computer interaction and distributed and virtual organizations or markets (multi-agent systems). Key Features: Provides an accessible introduction to trust, and its importance and applications in agent-based systems Proposes a principled, general theory of trust grounding on cognitive, cultural, institutional, technical, and normative solutions. Offers a clear, intuitive approach, and systematic integration of relevant issues Explains the dynamics of trust, and the relationship between trust and security Offers operational definitions and models directly applicable both in technical and experimental domains Includes a critical examination of trust models in economics, philosophy, psychology, sociology, and AI This book will be a valuable reference for researchers and advanced students focused on information and communication technologies (computer science, artificial intelligence, organizational sciences, and knowledge management etc.), as well as Web-site and robotics designers, and for scholars working on human, social, and cultural aspects of technology. Professionals of ecommerce systems and peer-to-peer systems will also find this text of interest.




Trust in E-Services: Technologies, Practices and Challenges


Book Description

"This book provides an overall view of trust for e-services including definitions, constructs, and relationships with other research topics such as security, privacy, reputation and risk. It offers contributions from real-life experience and practice on how to build a trust environment for e-government services"--Provided by publisher.




Trust Management


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.




Trusting Agents for Trusting Electronic Societies


Book Description

Based on two international workshops on trust in agent societies, held at AAMAS 2003 and AAMAS 2004, this book draws together carefully revised papers on trust, reputation, and security in agent society. Besides workshop papers, several contributions from leading researchers in this interdisciplinary field were solicited to complete coverage of all relevant topics. The 13 papers presented take into account issues from multiagent systems, artificial intelligence, cognitive science, game theory, and social and organizational science. Theoretical topics are addressed as well as applications in human-computer interaction and e-commerce.




Theory and Practice of Cryptography Solutions for Secure Information Systems


Book Description

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.




Theory Is Forever


Book Description

This commemorative book celebrates the 70th birthday of Arto Kustaa Salomaa, one of the most influential researchers in theoretical computer science. The 24 invited papers by leading researchers in the area address a broad variety of topics in theoretical computer science and impressively reflect the breadth and the depth of Arto Salomaa's scientific work.




Trust Management


Book Description

This book constitutes the refereed proceedings of the Second International Conference on Trust Management, iTrust 2004, held in Oxford, UK, in March/April 2004. The 21 revised full papers and 6 revised short papers presented together with 3 invited contributions were carefully reviewed and selected from 48 submissions. Besides technical topics in distributed and open systems, issues from law, social sciences, business, and philosophy are addressed in order to develop a deeper and more fundamental understanding of the issues and challenges in the area of trust management in dynamic open systems.




Research and Practical Issues of Enterprise Information Systems


Book Description

The idea for this conference came from a meeting of the IFIP (International Federation for Information Processing) Technical Committee for Information Systems (TC8) in Guimares, Portugal in June 2005. Our goal is to build an IFIP forum among the different Information Systems Communities of TC8 dealing with the increasing important area of Enterprise Information Systems. In this particular meeting the committee members intensively discussed the innovative and unique characteristics of Enterprise Information Systems as scientific sub-discipline. Hence, in this meeting it was decided by the TC8 members that the IFIP TC8 First International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2006) would be held in April 2006 in Vienna, Austria. Dr. Li Xu (USA) and Dr. A Min Tjoa (IFIP TC8) were assigned to propose a concept for this conference in order to establish an IFIP platform for EIS researchers and practitioners in the field to share experience, and discussing opportunities and challenges. We are very pleased therefore to have this conference organised by the help of the Austrian Computer Society (OCG). OCG supports the idea of this conference due to the urgent need of research and dissemination of new techniques in this key area. We received 180 papers from more than 30 countries for CONFENIS and the Program Committee eventually selected xx papers or extended abstracts, making an acceptance rate of xx% of submitted papers. Each paper was thoroughly reviewed by at least two qualified reviewers.




Trust Management


Book Description

This volume constitutes the proceedings of the 3rd International Conference on Trust Management, held in Paris, France, during 23–26 May 2005. The conf- ence follows successful International Conferences in Crete in 2003 and Oxford in 2004. All conferences were organized by iTrust, which is a working group funded as a thematic network by the Future and Emerging Technologies (FET) unit of the Information Society Technologies (IST) program of the European Union. The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of trust as a means of increasing security, building con?dence and facilitating collaboration in dynamic open s- tems. The notion of trust has been studied independently by di?erent academic disciplines, which has helped us to identify and understand di?erent aspects of trust. Theaimofthisconferencewastoprovideacommonforum,bringingtogether researchers from di?erent academic branches, such as the technology-oriented disciplines, law, social sciences and philosophy, in order to develop a deeper and more fundamental understanding of the issues and challenges in the area of trust management in dynamic open systems. The response to this conference was excellent; from the 71 papers submitted to the conference, we selected 21 full papers and 4 short papers for presentation. The program also included two keynote addresses, given by Steve Marsh from National Research Centre Canada, Institute for Information Technology, and Steve Kimbrough from the University of Pennsylvania; an industrial panel; 7 technology demonstrations; and a full day of tutorials.