Trust Areas Steve Marsh Carleton University, November 25th, 2009 [email protected] “You can't trust any bugger further than you can throw him, and there's nothing you can do about it, so let's have a drink” Terry Pratchett QuickTime™ and a BMP decompressor are needed to see t his picture. © stephen marsh, 2009 QuickTime™ and a BMP decompressor are needed to see this picture. Outline Caveats… Why What (including talk of many things) What Next Caveats Point, not tell… Why? Why? The need for assurance Why? The wisdom of crowds Why? The aggregation of data Why? Squeezing the tomatoes Agents Services and Grid What? What? Authentication and Security Reputation Systems Trust Management Systems Trusted Computing Regret Management Trust Reasoning Grids Agents HCI, Persuasion Trust Management Trust Management Umbrella Trust Management Background Trust Management Currently Trust Management Rule or Reputation… Authentication and Security Proving you are who you say you are Proving you’re an okay person Getting access to resources Sending private messages (and receiving same) Getting assurance Gaining confidence Sharing secrets Authentication and Security PKI Authentication and Security WoT Authentication and Security PGP Authentication and Security Trusted Computing No, wait… Trusted Computing (deserves its own slides…) Authentication and Security Policies and Negotiation Reputation Management Reputation Management Principles Reputation Management Whuffie Reputation Management Practice Reputation Management PageRank Reputation Management SlashDot Reputation Management eBay Reputation Management Quis custodiet ipsos custodes? Reputation Management P2P Reputation Management Referral networks and “if you liked this…” Reputation Management The Strength of Weak Ties Reputation Management Transitivity Regret Management Persuasion (HCI) (Some of ) This should not work! Problems Deceit Cheap pseudonyms Expectations Fraud Attacks Problems Deceit Cheap pseudonyms Expectations Fraud Attacks Resources
© Copyright 2026 Paperzz