Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website http://www.gpo.gov/fdsys; (3) the federal government Internet portal USA.gov; or (4) a web search conducted using a commercial search engine such as http://www.google.com.
Accession Number ADA582624
Title Towards a Theory of Trust in Networks of Humans and Computers.
Publication Date Sep 2011
Media Count 24p
Personal Author J. M. Wing V. Gligor
Abstract We argue that a general theory of trust in networks of humans and computers must be build on both a theory of behavioral trust and a theory of computational trust. This argument is motivated by increased participation of people in social networking, crowdsourcing human computation, and socio- economic protocols, e.g., protocols modeled by trust and gift-exchange games, norms-establishing con- tracts, and scams. User participation in these protocols relies primarily on trust, since online verification of protocol compliance is often impractical; e.g., verification can lead to undecidable problems, co-NP complete test procedures, and user inconvenience. Trust is captured by participant preferences (i.e., risk and betrayal aversion) and beliefs in the trustworthiness of other protocol participants. Both preferences and beliefs can be enhanced whenever protocol non-compliance leads to punishment of untrustworthy participants; i.e., it seems natural that betrayal aversion can be decreased and belief in trustworthiness increased by properly defined punishment. We argue that a general theory of trust should focus on the establishment of new trust relations where none were possible before. This focus would help create new economic opportunities by increasing the pool of usable services removing cooperation barriers among users, and at the very least, taking advantage of network effects.' Hence a new theory of trust would also help focus security research in areas that promote trust-enhancement infrastructures in human and computer networks. Finally, we argue that a general theory of trust should mirror, to the largest possible extent human expectations and mental models of trust without relying on false methaphors and analogies with the physical world.
Keywords Behavior
Behavioral trust
Computational trust
Computations
Computers
Humans
Networks


 
Source Agency Non Paid ADAS
NTIS Subject Category 57C - Botany
57Z - Zoology
49 - Electrotechnology
62A - Computer Hardware
Corporate Author Carnegie-Mellon Univ., Pittsburgh, PA. CYLAB.
Document Type Technical report
Title Note Conference paper.
NTIS Issue Number 1401
Contract Number DAAD19-02-1-0389 W911NF-07-1-0287

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader