119,164 research outputs found
Trustworthiness and Quality of Context Information
Context-aware service platforms use context information to customize their services to the current users’ situation. Due to technical limitations in sensors and context reasoning algorithms, context information does not always represent accurately the reality, and Quality of Context (QoC) models have been proposed to quantify this inaccuracy. The problems we have identified with existing QoC models is that they do not follow a standard terminology and none of them clearly differentiate quality attributes related to instances of context information (e.g. accuracy and precision) from trustworthiness, which is a quality attribute related to the context information provider. In this paper we propose a QoC model and management architecture that supports the management of QoC trustworthiness and also contributes to the terminology alignment of existing QoC models.\ud
In our QoC model, trustworthiness is a measurement of the reliability of a context information provider to provide context information about a specific entity according to a certain quality level. This trustworthiness value is used in our QoC management architecture to support context-aware service providers in the selection of trustworthy context\ud
providers. As a proof of concept to demonstrate the feasibility of our work we show a prototype implementation of our QoC model and management architecture
Inadequacy of Modal Logic in Quantum Settings
We test the principles of classical modal logic in fully quantum settings.
Modal logic models our reasoning in multi-agent problems, and allows us to
solve puzzles like the muddy children paradox. The Frauchiger-Renner thought
experiment highlighted fundamental problems in applying classical reasoning
when quantum agents are involved; we take it as a guiding example to test the
axioms of classical modal logic. In doing so, we find a problem in the original
formulation of the Frauchiger-Renner theorem: a missing assumption about
unitarity of evolution is necessary to derive a contradiction and prove the
theorem. Adding this assumption clarifies how different interpretations of
quantum theory fit in, i.e., which properties they violate. Finally, we show
how most of the axioms of classical modal logic break down in quantum settings,
and attempt to generalize them. Namely, we introduce constructions of trust and
context, which highlight the importance of an exact structure of trust
relations between agents. We propose a challenge to the community: to find
conditions for the validity of trust relations, strong enough to exorcise the
paradox and weak enough to still recover classical logic.Comment: In Proceedings QPL 2018, arXiv:1901.0947
Recommended from our members
Web Service Trust: Towards A Dynamic Assessment Framework
Trust in software services is a key prerequisite for the success and wide adoption of services-oriented computing (SOC) in an open Internet world. However, trust is poorly assessed by existing methods and technologies, especially in dynamically composed and deployed SOC systems. In this paper, we discuss current methods for assessing trust in service-oriented computing and identify gaps of current platforms, in particular with regards to runtime trust assessment. To address these gaps, we propose a model of runtime trust assessment of software services and introduce a framework for realizing the model. A key characteristic of our approach is the support that it offers for customizable assessment of trust based on evidence collected during the operation of software services and its ability to combine this evidence with subjective assessments coming from service clients
Reputation-based trust evaluations through diversity
Non peer reviewedPostprin
Secure Cloud-Edge Deployments, with Trust
Assessing the security level of IoT applications to be deployed to
heterogeneous Cloud-Edge infrastructures operated by different providers is a
non-trivial task. In this article, we present a methodology that permits to
express security requirements for IoT applications, as well as infrastructure
security capabilities, in a simple and declarative manner, and to automatically
obtain an explainable assessment of the security level of the possible
application deployments. The methodology also considers the impact of trust
relations among different stakeholders using or managing Cloud-Edge
infrastructures. A lifelike example is used to showcase the prototyped
implementation of the methodology
- …