Privacy of trust in similarity estimation through secure computations

被引:0
|
作者
Carbo, J [1 ]
Molina, JM [1 ]
Davila, J [1 ]
机构
[1] Univ Carlos III, Complex Adapt Syst Lab, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current e-commerce applications provide its a binary definition of trust depending on whether some requirements are satisfied or not. However trust can be seen as a more general and subjective concept tightly linked to reputation. The subjectivity of the evaluations of certain behaviours justifies this kind of trust. We intend agents to manage subjective trust as humans do, in a vague and abstract way, as a fuzzy concept. In this paper we extend our previous works about the introduction of newcomers into an already running agent system. Because of the economical and strategic value of the trust-related information exchanged in such e-commercial scenarios, the access to this information should be restricted to certain group of close agents. Agents were grouped in cooperative clusters according to similarity of the opinions about others. Specifically this paper evaluates the privacy of these opinions while similarity can be easily estimated The results of this evaluation will justify the use of secure computations in the introduction of newcomers.
引用
收藏
页码:498 / 502
页数:5
相关论文
共 50 条
  • [1] Secure Estimation With Privacy Protection
    Liang, Shi
    Lam, James
    Lin, Hong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (08) : 4947 - 4961
  • [2] Secure knowledge management: Confidentiality, trust, and privacy
    Bertino, Elisa
    Khan, Latifur R.
    Sandhu, Ravi
    Thuraisingham, Bhavani
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03): : 429 - 438
  • [3] Incentive Alignment Through Secure Computations
    Haagensen, Frederik
    Debois, Soren
    [J]. BUSINESS PROCESS MANAGEMENT (BPM 2022), 2022, 13420 : 343 - 360
  • [4] Secure Similarity Queries: Enabling Precision Medicine with Privacy
    Liu, Jinfei
    Xiong, Li
    [J]. BIOMEDICAL DATA MANAGEMENT AND GRAPH ONLINE QUERYING, 2016, 9579 : 61 - 70
  • [5] Optimal Accuracy-Privacy Trade-Off for Secure Computations
    Ah-Fat, Patrick
    Huth, Michael
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (05) : 3165 - 3182
  • [6] Efficient, Verifiable, Secure, and Privacy-Friendly Computations for the Smart Grid
    Borges, Fabio
    Volk, Florian
    Muehlhaeuser, Max
    [J]. 2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [7] Efficient, Verifiable, Secure, and Privacy-Friendly Computations for the Smart Grid
    Borges, Fabio
    Volk, Florian
    Muhlhauser, Max
    [J]. 2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [8] Secure Computations Through Checking Suits of Playing Cards
    Miyahara, Daiki
    Mizuki, Takaaki
    [J]. FRONTIERS OF ALGORITHMIC WISDOM, IJTCS-FAW 2022, 2022, 13461 : 110 - 128
  • [9] Building online trust through privacy practices
    Thomas W. Lauer
    Xiaodong Deng
    [J]. International Journal of Information Security, 2007, 6 : 323 - 331
  • [10] Building online trust through privacy practices
    Lauer, Thomas W.
    Deng, Xiaodong
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (05) : 323 - 331