60,129 research outputs found
A heuristic algorithm for trust-oriented service provider selection in complex social networks
In a service-oriented online social network consisting of service providers and consumers, a service consumer can search trustworthy service providers via the social network. This requires the evaluation of the trustworthiness of a service provider along a certain social trust path from the service consumer to the service provider. However, there are usually many social trust paths between participants in social networks. Thus, a challenging problem is which social trust path is the optimal one that can yield the most trustworthy evaluation result In this paper, we first present a novel complex social network structure and a new concept, Quality of Trust (QoT). We then model the optimal social trust path selection with multiple end-to-end QoT constraints as a Multi-Constrained Optimal Path (MCOP) selection problem which is NP-Complete. For solving this challenging problem, we propose an efficient heuristic algorithm, H_OSTP. The results of our experiments conducted on a large real dataset of online social networks illustrate that our proposed algorithm significantly outperforms existing approaches.8 page(s
A flexible architecture for privacy-aware trust management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
Decentralized systems are a subset of distributed systems where multiple
authorities control different components and no authority is fully trusted by
all. This implies that any component in a decentralized system is potentially
adversarial. We revise fifteen years of research on decentralization and
privacy, and provide an overview of key systems, as well as key insights for
designers of future systems. We show that decentralized designs can enhance
privacy, integrity, and availability but also require careful trade-offs in
terms of system complexity, properties provided, and degree of
decentralization. These trade-offs need to be understood and navigated by
designers. We argue that a combination of insights from cryptography,
distributed systems, and mechanism design, aligned with the development of
adequate incentives, are necessary to build scalable and successful
privacy-preserving decentralized systems
Just-in-Time Memoryless Trust for Crowdsourced IoT Services
We propose just-in-time memoryless trust for crowdsourced IoT services. We
leverage the characteristics of the IoT service environment to evaluate their
trustworthiness. A novel framework is devised to assess a service's trust
without relying on previous knowledge, i.e., memoryless trust. The framework
exploits service-session-related data to offer a trust value valid only during
the current session, i.e., just-in-time trust. Several experiments are
conducted to assess the efficiency of the proposed framework.Comment: 8 pages, Accepted and to appear in 2020 IEEE International Conference
on Web Services (ICWS). Content may change prior to final publicatio
Current Advancements of and Future Developments for Fourth Party Logistics in a Digital Future
This paper aims to analyze the potential future of the 4PL concept based on expert opinions with special regard to the influence of digitalization coming with a disruptive trans-formation of supply chains. Service arrangements, provider capabilities and benefits resulting from a 4PL partnership are compared in current and future configurations. The research follows an explorative mixed methods approach with semi structured interviews followed by an expert panel. This builds a basis for an online survey questionnaire to inquire on important future aspects for the 4PL concept by a sample of respondents from multinational companies. Our results show a clear trend away from simply organizing transportation and logistics activities towards the provision of an IT platform as well as further value-added service activities such as planning, analytics and monitoring. Along with this, IT capabilities appear to be an important differentiator for 4PL providers in the future. Moreover, relationships between 4PL providers and their clients become closer and more strategic, which leads to a customer valuing not only direct cost reductions but rather improvements resulting from optimized operations through superior analysis and planning functions
- âŠ