Exploring Computational Trust, Regret, and Forgiveness Searching

Trust Areas
Steve Marsh
Carleton University, November 25th, 2009
[email protected]
“You can't trust any bugger further than you can throw him, and
there's nothing you can do about it, so let's have a drink”
Terry Pratchett
QuickTime™ and a
BMP decompressor
are needed to see t his picture.
© stephen marsh, 2009
QuickTime™ and a
BMP decompressor
are needed to see this picture.
Outline
Caveats…
Why
What (including talk of many things)
What Next
Caveats
Point, not tell…
Why?
Why?
The need for assurance
Why?
The wisdom of crowds
Why?
The aggregation of data
Why?
Squeezing the tomatoes
Agents
Services and Grid
What?
What?
Authentication and Security
Reputation Systems
Trust Management Systems
Trusted Computing
Regret Management
Trust Reasoning
Grids
Agents
HCI, Persuasion
Trust Management
Trust Management
Umbrella
Trust Management
Background
Trust Management
Currently
Trust Management
Rule or Reputation…
Authentication and
Security
Proving you are who you say you are
Proving you’re an okay person
Getting access to resources
Sending private messages (and receiving same)
Getting assurance
Gaining confidence
Sharing secrets
Authentication and
Security
PKI
Authentication and
Security
WoT
Authentication and
Security
PGP
Authentication and
Security
Trusted Computing
No, wait…
Trusted Computing
(deserves its own slides…)
Authentication and
Security
Policies and Negotiation
Reputation
Management
Reputation
Management
Principles
Reputation
Management
Whuffie
Reputation
Management
Practice
Reputation
Management
PageRank
Reputation
Management
SlashDot
Reputation
Management
eBay
Reputation
Management
Quis custodiet ipsos custodes?
Reputation
Management
P2P
Reputation
Management
Referral networks and “if you liked this…”
Reputation
Management
The Strength of Weak Ties
Reputation
Management
Transitivity
Regret Management
Persuasion
(HCI)
(Some of )
This should not work!
Problems
Deceit
Cheap pseudonyms
Expectations
Fraud
Attacks
Problems
Deceit
Cheap pseudonyms
Expectations
Fraud
Attacks
Resources