• Title/Summary/Keyword: Trust Propagation

Search Result 8, Processing Time 0.026 seconds

A Study on Transitivity and Composability of Trust in Social Network (소셜네트워크에서 신뢰의 전이성과 결합성에 관한 연구)

  • Song, Hee-Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.41-53
    • /
    • 2011
  • Trust prediction between users in social network based on the trust propagation assumes properties of transitivity and composability of trust propagation. But it has been hard to find studies which test on how those properties have been operated in real social network. This study aims to validate if the longer the distance of trust paths and the less the numbers of trust paths, the higher prediction error occurs using two real social network data set. As a result, the longer the distance of trust paths, we can find higher prediction error when predicting level of trust between source and target users. But we can not find decreasing trend of prediction error though the possible number of trust paths between source and target users increases.

Is Trust Transitive and Composable in Social Networks?

  • Song, Hee Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.191-205
    • /
    • 2013
  • Recently, the topic of predicting interpersonal trust in online social networks is receiving considerable attention, because trust plays a critical role in controlling the spread of distorted information and vicious rumors, as well as reducing uncertainties and risk from unreliable users in social networks. Several trust prediction models have been developed on the basis of transitivity and composability properties of trust; however, it is hard to find empirical studies on whether and how transitivity and composability properties of trust are operated in real online social networks. This study aims to predict interpersonal trust between two unknown users in social networks and verify the proposition on whether and how transitivity and composability of trust are operated in social networks. For this purpose, we chose three social network sites called FilmTrust, Advogato, and Epinion, which contain explicit trust information by their users, and we empirically investigated the proposition. Experimental results showed that trust can be propagated farther and farther along the trust link; however, when path distance becomes distant, the accuracy of trust prediction lowers because noise is activated in the process of trust propagation. Also, the composability property of trust is operated as we expected in real social networks. However, contrary to our expectations, when the path is synthesized more during the trust prediction, the reliability of predicted trust did not tend to increase gradually.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.

A Multi-Agent framework for Distributed Collaborative Filtering (분산 환경에서의 협력적 여과를 위한 멀티 에이전트 프레임워크)

  • Ji, Ae-Ttie;Yeon, Cheol;Lee, Seung-Hun;Jo, Geun-Sik;Kim, Heung-Nam
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.119-140
    • /
    • 2007
  • Recommender systems enable a user to decide which information is interesting and valuable in our world of information overload. As the recent studies of distributed computing environment have been progressing actively, recommender systems, most of which were centralized, have changed toward a peer-to-peer approach. Collaborative Filtering (CF), one of the most successful technologies in recommender systems, presents several limitations, namely sparsity, scalability, cold start, and the shilling problem, in spite of its popularity. The move from centralized systems to distributed approaches can partially improve the issues; distrust of recommendation and abuses of personal information. However, distributed systems can be vulnerable to attackers, who may inject biased profiles to force systems to adapt their objectives. In this paper, we consider both effective CF in P2P environment in order to improve overall performance of system and efficient solution of the problems related to abuses of personal data and attacks of malicious users. To deal with these issues, we propose a multi-agent framework for a distributed CF focusing on the trust relationships between individuals, i.e. web of trust. We employ an agent-based approach to improve the efficiency of distributed computing and propagate trust information among users with effect. The experimental evaluation shows that the proposed method brings significant improvement in terms of the distributed computing of similarity model building and the robustness of system against malicious attacks. Finally, we are planning to study trust propagation mechanisms by taking trust decay problem into consideration.

  • PDF

Strategic Use of SNS in PR for Improving Trust in Government Policy (정부정책의 신뢰도 제고를 위한 SNS활용 PR 전략)

  • Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.103-116
    • /
    • 2013
  • Meanwhile, the governmental organization has been familiar with construction and method of one-way communication focused on public relation. As a result, it is true that there are few customers who have interest in, understand, and actively participate in public policy of the government.However, by propagation of smart phone terminal, public relation of government policy is diversified such as SNS, application manufacture, etc. It paved the way for actively increasing customers' comprehension of relevant information and participation as well. With that background in mind, this research tried to search pattern and feature of SNS strategy through domestic and American examples for improving trustof government policy and find common ground in order to seek for solution to help government office conduct a PR campaign more efficiently through SNS.

Implementing a Verified Efficient RUP Checker

  • Oe, Duckki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1176-1179
    • /
    • 2012
  • To ensure the correctness of high performance satisfiability (SAT) solvers, several proof formats have been proposed. SAT solvers can report a formula being unsatisfiable with a proof, which can be independently verified by a trusted proof checker. Among the proof formats accepted at the SAT competition, the Reverse Unit Propagation (RUP) format is considered the most popular. However, the official proof checker was not efficient and failed to check many of the proofs at the competition. This inefficiency is one of the drawbacks of SAT proof checking. In this paper, I introduce a work-in-progress project, vercheck to implement an efficient RUP checker using modern SAT solving techniques. Even though my implementation is larger and more complex, the level of trust is preserved by statically verifying the correctness of the code. The vercheck program is written in GURU, a dependently typed functional programming language with a low-level resource management feature.

Prediction of the Dependence of Phase Velocity on Porosity in Cancellous Bone

  • Lee, Kang-Il;Choi, Min-Joo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.2E
    • /
    • pp.45-50
    • /
    • 2008
  • In recent years, quantitative ultrasound (QUS) technologies have played a growing role in the diagnosis of osteoporosis. Most of the commercial bone somometers measure speed of sound (SOS) and/or broadband ultrasonic attenuation (EUA) at peripheral skeletal sites. However, the QUS parameters are purely empirical measures that have not yet been firmly linked to physical parameters such as bone strength or porosity. In the present study, the theoretical models for wave propagation in cancellous bone, such as the Biot model, the stratified model, and the modified Biot-Attenborough (MBA) model, were applied to predict the dependence of phase velocity on porosity in cancellous bone. The optimum values for the input parameters of the three models in cancellous bone were determined by comparing the predictions with the previously published measurements in human cancellous bone in vitro. This modeling effort is relevant to the use of QUS in the diagnosis of osteoporosis because SOS is negatively correlated to the fracture risk of bone, and also advances our understanding of the relationship between phase velocity and porosity in cancellous bone.

A Study for strategic cooperaton of enterprise security and business (기업보안과 비즈니스의 전략적 협력에 관한 연구)

  • Ryu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.103-130
    • /
    • 2011
  • This study is the research of enterprise security for raising the profitability and stability of Korean companies in global business environment and strategic cooperation of business. As the scientific technology gets complicated as day goes by and new competitors appear regardless the border in the modern business environment, the situation happens frequently which the huge company hands over their market to the new one armed with the innovative thinking overnight. To survive such new environment, the answer is the change of paradigm regarding business management method at the new point of view. With the low level of security risk management of Korean companies which stick to old habit, the security management which helps the companies secure profits is not affordable. The global village where the population of 7 billions live in 21st century is facing up to the rapid ecological adaptation. The rapid change of climatic environment creates the hundreds of thousands of sufferers in a moment, and we have been watching the millions of livestock are buried alive due to new contagious disease everyday. Such change encourages the humans in global village to change the basic way of living. The business ecosystem which is the basic root for economic life cannot be an exception. To survive the business environment of 21st century, the security risk management at management level is required and the reporting line of companies should be established newly for raising business competing power through security risk management. The companies should bear in mind that they can be disappeared into our old memories overnight if they are not sensitive to the changing environment. Out of new risks for the modern companies, the field especially Korean companies are dealing easily is the security risk. Not like past, the security risk which's size is much more massive and its propagation velocity is very fast is the one of important business risks which the management should take care. Out of security risks which influence on the modern companies significantly, the brand of companies, protection of their reputation, continuity of production and operation and keeping customer's trust are prior to the others. This study offered the suggestion regarding enterprise security and the strategic cooperation of business to deal with such security risk effectively.

  • PDF