Page 169 - Proceedings of the 2017 ITU Kaleidoscope
P. 169

Challenges for a data-driven society




           [2]  U. Jayasinghe, N. B. Truong, G. M. Lee, and T.-W. Um,   [19]  Y. Wang, and J. Vassileva, “Bayesian Network-Based Trust
               “RpR: A  Trust Computation  Model for Social Internet of   Model,” in  IEEE International Conference on Web
               Things,” in  2016  Intl IEEE Conference on  Smart World   Intelligence,(WI'03). 2003, pp. 372.
               Congress, Toulouse, France, 2016.              [20]  W. Li,  W. Meng, L.-F. Kwok, and H. Horace, “Enhancing
           [3]  N. B. Truong, G. M. Lee, and T.-W. Um, “A Reputation and   collaborative intrusion detection networks against insider
               Knowledge Based Trust Service Platform  for Trustworthy   attacks using supervised intrusion sensitivity-based trust
               Social Internet of Things,” in Innovations in Clouds, Internet   management model,”  Journal  of Network and Computer
               and Networks (ICIN), Paris, France., 2016.         Applications, vol. 77, pp. 135-145, 2017.
           [4]  N. B. Truong, H. Lee, B. Askwith, and G. M. Lee, “Toward a   [21]  A. Bolster, and A. Marshall,  “Analytical  metric  weight
               Trust Evaluation Mechanism in the Social Internet of Things,”   generation for multi-domain trust in autonomous underwater
               Sensors, vol. 17, no. 6, pp. 1346, 2017.           MANETs,” in IEEE Third Underwater Communications and
           [5]  Y. Wang, Y.-C. Lu, I.-R. Chen, J.-H. Cho, A. Swami, and C.-  Networking Conference (UComms), Lerici, Italy, 2016, pp. 1-
               T. Lu, “LogitTrust: A Logit Regression-based Trust Model for   5.
               Mobile Ad Hoc Networks,” in Proceedings of the 6th ASE   [22]  Y. W. Lee, D. M. Strong, B.  K. Kahn, and R. Y. Wang,
               International Conference on Privacy, Security, Risk and Trust   “AIMQ: a methodology for information quality assessment,”
               Cambridge, MA, 2014, pp. 1-10.                     Information & management, vol. 40, no. 2, pp. 133-146, 2002.
           [6]  I. R. Chen,  F. Bao, and J.  Guo, “Trust-based Service   [23]  L. L. Pipino, Y. W. Lee, and  R. Y. Wang, “Data quality
               Management for Social Internet  of Things Systems,”  IEEE   assessment,”  Commun. ACM, vol.  45, no.  4, pp.  211-218,
               Transactions on Dependable and Secure Computing, vol. PP,   2002.
               no. 99, pp. 1-1, 2015.                         [24]  B. Heinrich, M. Kaiser, and M. Klier, “How to measure data
           [7]  U. Jayasinghe, G. M. Lee, T.-W. Um, and Q. Shi, “Machine-  quality? A metric-based approach,” ICIS 2007 Proceedings, p.
               Learning-based Trust Computational  Model for  Social IoT   108,  2007.
               Services,” IEEE TRANSACTIONS ON KNOWLEDGE AND   [25]  N. Askham, D. Cook, M. Doyle, H. Fereday, M. Gibson, U.
               DATA ENGINEERING, Under Review, 2017.              Landbeck, R. Lee, C. Maynard, G.  Palmer, and J.
           [8]  ITU-T SG13. “Future networks, with focus  on IMT-2020,   Schwarzenbach, The six primary dimensions for data quality
               cloud computing and trusted network infrastructures,” https://   assessment, Technical report, DAMA UK Working  Group,
               www.itu.int/en/ITU-T/studygroups/2017-2020/13/Pages/defa   2013.
               ult.aspx.                                      [26]  S. Mazilu, M. Teler, and C.  Dobre, “Securing vehicular
           [9]  ITU-T Y.3052, “Overview of trust provisioning for   networks based on data-trust computation,” pp. 51-58.
               information and communication technology infrastructures   [27]  M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux,
               and services,” March 2017, https://www.itu.int/ITU-T/recom   “On data-centric  trust establishment in ephemeral ad  hoc
               mendations/rec.aspx?rec=13252.                     networks. ” pp. 1238-1246.
           [10]  S. P. Marsh, “Formalising trust as a computational concept,”   [28]  P. Borzymek, M. Sydow, and A. Wierzbicki, “Enriching trust
               Ph.D. dissertation, Dept. Computing Science and    prediction model in social network with user rating similarity.
               Mathematics, University of Stirling, Stirling, Scotland, UK.,   ”in International Conference on Computational Aspects of
               1994.                                              Social Networks, CASON'09, , pp. 40-47, 2009.
           [11]  A. Josang, and R. Ismail, “The beta reputation system.” in   [29]  N. Korovaiko, and A. Thomo, “Trust prediction from user-
               Proceedings of the 15th bled electronic commerce conference,   item ratings,” Social Netw. Analys. Mining, vol. 3, no. 3, pp.
               vol. 5, pp. 2502-2511, 2002.                       749-759, 2013.
           [12]  L. Xiong, and L. Liu, “Peertrust: Supporting reputation-based   [30]  R. Xiang, J. Neville, and M. Rogati, “Modeling relationship
               trust for peer-to-peer electronic communities,”  IEEE   strength in online social networks.” in proceedings of the 19th
               transactions on Knowledge and Data Engineering, vol. 16, no.   international conference on World wide web, pp. 981-990,
               7, pp. 843-857, 2004.                              2010.
           [13]  X. Liu, A. Datta, K. Rzadca, and E.-P. Lim, “StereoTrust: a   [31]  C. Castelfranchi, and R. Falcone, “Principles of trust for MAS:
               group based personalized trust model,” in Proceedings of the   Cognitive anatomy, social importance, and quantification,” in
               18th ACM conference on Information  and knowledge   Multi Agent  Systems, 1998.  Proceedings. International
               management, Hong Kong, China, 2009, pp. 7-16.      Conference on, 1998, pp. 72-79.
           [14]  L. Atzori, A. Iera, and G. Morabito, “From “smart objects” to   [32]  P. R. Benson, “ISO 8000 Data  Quality:  The Fundamentals
               "social objects": The next evolutionary step of the internet of   Part 1,” Real-World Decision Support (RWDS) Journal 3, no.
               things,” IEEE Communications Magazine, vol. 52, no. 1, pp.   4, 2009.
               97-105, 2014.                                  [33]  Y. Koren, “Factorization meets the  neighborhood: a
           [15]  S. Nepal, W. Sherchan, and C. Paris, “Strust: A trust model   multifaceted collaborative filtering model,” in Proceedings of
               for social networks,” in IEEE 10th International Conference   the 14th ACM SIGKDD international conference on
               on  Trust,  Security and Privacy in Computing and   Knowledge discovery and data mining, Las Vegas, Nevada,
               Communications (TrustCom), 2011, pp. 841-846.      USA, 2008, pp. 426-434.
           [16]  Y. Hu, D. Wang, H. Zhong, and F. Wu, “SocialTrust: Enabling   [34] Y.-x. Yuan, “Step-sizes for the  gradient method,”  AMS IP
               long-term social cooperation  in  peer-to-peer services,”   Studies in Advanced Mathematics, vol. 42, no. 2, pp. 785,
               Springer Peer-to-Peer Networking and Applications, vol. 7,   2008.
               no. 4, pp. 525-538, 2014.                      [35]  A. Jian, G. Xiaolin, Y. Jianwei, S. Yu, and H. Xin, “Mobile
           [17]  M. Nitti, R. Girau, L. Atzori, A. Lera, and G. Morabito, “A   crowd sensing for internet of things: A credible crowdsourcing
               Subjective Model for Trustworthiness Evaluation in the Social   model in mobile-sense service,” in  Multimedia Big Data
               Internet of Things,” in  IEEE International Symposium on   (BigMM), 2015 IEEE International Conference on, 2015, pp.
               Personal Indoor and Mobile Radio Communications, PIMRC,   92-99.
               Australia, 2013, pp. 18-23.                    [36]  Twin Oaks Computing Inc. “CoreDX Distributed Publish-
           [18]  Z. Liang, and W. Shi, “Enforcing cooperative resource sharing   Subscribe System,” [Online] Available: http://www. twinoak
               in untrusted P2P computing environments,” Mob. Netw. Appl.,   scomputing.com/coredx/develop.
               vol. 10, no. 6, pp. 971-983, 2005.




                                                          – 153 –
   164   165   166   167   168   169   170   171   172   173   174