Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
How Do We Safely Orient for Aspects?
 
Conquering the Business-Application Life Cycle
 
FLINT for bug-free, secure, and reliable software....
 
TRUST 2: Proliferation of COTS in Critical Infrast...
 
TRUST: Team for Research in Ubiquitous Secure Tech...
 
Bring us Your Metadata, Your Tired, Your Poor, You...
 
Building Blue Relationships and Partnerships
 
Secure Overlays on Insecure Internets: It Could Ha...
 
All Your BIOS Are Still Mine
 
CyLab's Angle on Sustainable Computing and Trustwo...

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-04-26

 

Trust Points and Trust Issues

ACM News Service: A Trust Analysis Methodology for Pervasive Computing Systems.  In analyzing the trustworthiness of software, I notice that there are trust surfaces and trust points—places where there is an (usually-tacit) assumption of trust in some service or resource being relied upon.  While I am struggling to formuate something crisp in this area, this approach comes to my attention.

The ACM TechNews blurb summarizes an approach to trust analysis that identifies a grouping of trust-issue categories:

  • Subjective Trust
    – personal responsibility
    – reasoning
    – usability
    – harm
  • System
    – audit trail
    – authorization
    – identification
    – availability
    – reliability
  • Data
    – source vs. interpretation
    – accuracy

The work of Lo Presti, Butler, Leuschel, and Booth is a chapter in a Springer Lecture Notes publication, Trusting Agents for Trusting Electronic Societies.  A PDF of the chapter is available as an EPrint of the University of Southampton.  There are valuable references and consideration of trust metrics in a five-stage Trust Analysis Methodology.  I’m not sure the methodology works in the context of my TROSTing effort, but the overall model and consideration of the categories of trust is extremely valuable to build on.

The book also has an interesting article by José M. Vidal on distributed recommenders and there are contributions by Leon van der Torre .  The AgentLink effort has some material on trust related to agent technology.

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $