Abstract
In this paper we describe a decision process framework allowing an agent to decide what information it should reveal to its neighbours within a communication graph in order to maximise its utility. We assume that these neighbours can pass information onto others within the graph, and that the communicating agent gains and loses utility based on the information which can be inferred by specific agents following the original communicative act. To this end, we construct an initial model of information propagation and describe an optimal decision procedure for the agent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chakraborty, S., Raghavan, K.R., Srivastava, M.B., Bisdikian, C., Kaplan, L.M.: Balancing value and risk in information sharing through obfuscation. In: Proceedings of the 15th Int’l Conf. on Information Fusion, FUSION 2012 (2012)
Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)
Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems 12(2), 183–198 (2006)
Castelfranchi, C., Falcone, R.: Trust theory: A socio-cognitive and computational model. Wiley Series in Agent Technology (2010)
Urbano, J., Rocha, A., Oliveira, E.: A socio-cognitive perspective of trust. In: Ossowski, S. (ed.) Agreement Technologies. Law, Governance and Technology Series, vol. 8, pp. 419–429. Springer Netherlands (2013)
Burnett, C., Norman, T.J., Sycara, K.: Trust decision-making in multi-agent systems. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence, IJCAI 2011, pp. 115–120. AAAI Press (2011)
Mardziel, P., Magill, S., Hicks, M., Srivatsa, M.: Dynamic enforcement of knowledge-based security policies. In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp. 114–128 (2011)
Wang, X., Williams, M.A.: Risk, uncertainty and possible worlds. In: Privacy, Security, Risk and Trust (passat). In: IEEE Third International Conference on Social Computing (SOCIALCOM), pp. 1278–1283 (2011)
Kaplan, S., Garrick, B.J.: On the quantitative definition of risk. Risk Analysis 1(1), 11–27 (1981)
Tan, Y.-H., Thoen, W.: Formal aspects of a generic model of trust for electronic commerce. Decision Support Systems 33(3), 233–246 (2002)
Das, T.K., Teng, B.-S.: The Risk-Based View of Trust: A Conceptual Framework. Journal of Business and Psychology 19(1), 85–116 (2004)
Caminada, M.W.: Truth, lies and bullshit; distinguishing classes of dishonesty. In: Social Simulation Workshop (SS@IJCAI), 39–50 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bisdikian, C., Tang, Y., Cerutti, F., Oren, N. (2013). A Framework for Using Trust to Assess Risk in Information Sharing. In: Chesñevar, C.I., Onaindia, E., Ossowski, S., Vouros, G. (eds) Agreement Technologies. Lecture Notes in Computer Science(), vol 8068. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39860-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-39860-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39859-9
Online ISBN: 978-3-642-39860-5
eBook Packages: Computer ScienceComputer Science (R0)