Page 169 - Proceedings of the 2017 ITU Kaleidoscope
P. 169
Challenges for a data-driven society
[2] U. Jayasinghe, N. B. Truong, G. M. Lee, and T.-W. Um, [19] Y. Wang, and J. Vassileva, “Bayesian Network-Based Trust
“RpR: A Trust Computation Model for Social Internet of Model,” in IEEE International Conference on Web
Things,” in 2016 Intl IEEE Conference on Smart World Intelligence,(WI'03). 2003, pp. 372.
Congress, Toulouse, France, 2016. [20] W. Li, W. Meng, L.-F. Kwok, and H. Horace, “Enhancing
[3] N. B. Truong, G. M. Lee, and T.-W. Um, “A Reputation and collaborative intrusion detection networks against insider
Knowledge Based Trust Service Platform for Trustworthy attacks using supervised intrusion sensitivity-based trust
Social Internet of Things,” in Innovations in Clouds, Internet management model,” Journal of Network and Computer
and Networks (ICIN), Paris, France., 2016. Applications, vol. 77, pp. 135-145, 2017.
[4] N. B. Truong, H. Lee, B. Askwith, and G. M. Lee, “Toward a [21] A. Bolster, and A. Marshall, “Analytical metric weight
Trust Evaluation Mechanism in the Social Internet of Things,” generation for multi-domain trust in autonomous underwater
Sensors, vol. 17, no. 6, pp. 1346, 2017. MANETs,” in IEEE Third Underwater Communications and
[5] Y. Wang, Y.-C. Lu, I.-R. Chen, J.-H. Cho, A. Swami, and C.- Networking Conference (UComms), Lerici, Italy, 2016, pp. 1-
T. Lu, “LogitTrust: A Logit Regression-based Trust Model for 5.
Mobile Ad Hoc Networks,” in Proceedings of the 6th ASE [22] Y. W. Lee, D. M. Strong, B. K. Kahn, and R. Y. Wang,
International Conference on Privacy, Security, Risk and Trust “AIMQ: a methodology for information quality assessment,”
Cambridge, MA, 2014, pp. 1-10. Information & management, vol. 40, no. 2, pp. 133-146, 2002.
[6] I. R. Chen, F. Bao, and J. Guo, “Trust-based Service [23] L. L. Pipino, Y. W. Lee, and R. Y. Wang, “Data quality
Management for Social Internet of Things Systems,” IEEE assessment,” Commun. ACM, vol. 45, no. 4, pp. 211-218,
Transactions on Dependable and Secure Computing, vol. PP, 2002.
no. 99, pp. 1-1, 2015. [24] B. Heinrich, M. Kaiser, and M. Klier, “How to measure data
[7] U. Jayasinghe, G. M. Lee, T.-W. Um, and Q. Shi, “Machine- quality? A metric-based approach,” ICIS 2007 Proceedings, p.
Learning-based Trust Computational Model for Social IoT 108, 2007.
Services,” IEEE TRANSACTIONS ON KNOWLEDGE AND [25] N. Askham, D. Cook, M. Doyle, H. Fereday, M. Gibson, U.
DATA ENGINEERING, Under Review, 2017. Landbeck, R. Lee, C. Maynard, G. Palmer, and J.
[8] ITU-T SG13. “Future networks, with focus on IMT-2020, Schwarzenbach, The six primary dimensions for data quality
cloud computing and trusted network infrastructures,” https:// assessment, Technical report, DAMA UK Working Group,
www.itu.int/en/ITU-T/studygroups/2017-2020/13/Pages/defa 2013.
ult.aspx. [26] S. Mazilu, M. Teler, and C. Dobre, “Securing vehicular
[9] ITU-T Y.3052, “Overview of trust provisioning for networks based on data-trust computation,” pp. 51-58.
information and communication technology infrastructures [27] M. Raya, P. Papadimitratos, V. D. Gligor, and J.-P. Hubaux,
and services,” March 2017, https://www.itu.int/ITU-T/recom “On data-centric trust establishment in ephemeral ad hoc
mendations/rec.aspx?rec=13252. networks. ” pp. 1238-1246.
[10] S. P. Marsh, “Formalising trust as a computational concept,” [28] P. Borzymek, M. Sydow, and A. Wierzbicki, “Enriching trust
Ph.D. dissertation, Dept. Computing Science and prediction model in social network with user rating similarity.
Mathematics, University of Stirling, Stirling, Scotland, UK., ”in International Conference on Computational Aspects of
1994. Social Networks, CASON'09, , pp. 40-47, 2009.
[11] A. Josang, and R. Ismail, “The beta reputation system.” in [29] N. Korovaiko, and A. Thomo, “Trust prediction from user-
Proceedings of the 15th bled electronic commerce conference, item ratings,” Social Netw. Analys. Mining, vol. 3, no. 3, pp.
vol. 5, pp. 2502-2511, 2002. 749-759, 2013.
[12] L. Xiong, and L. Liu, “Peertrust: Supporting reputation-based [30] R. Xiang, J. Neville, and M. Rogati, “Modeling relationship
trust for peer-to-peer electronic communities,” IEEE strength in online social networks.” in proceedings of the 19th
transactions on Knowledge and Data Engineering, vol. 16, no. international conference on World wide web, pp. 981-990,
7, pp. 843-857, 2004. 2010.
[13] X. Liu, A. Datta, K. Rzadca, and E.-P. Lim, “StereoTrust: a [31] C. Castelfranchi, and R. Falcone, “Principles of trust for MAS:
group based personalized trust model,” in Proceedings of the Cognitive anatomy, social importance, and quantification,” in
18th ACM conference on Information and knowledge Multi Agent Systems, 1998. Proceedings. International
management, Hong Kong, China, 2009, pp. 7-16. Conference on, 1998, pp. 72-79.
[14] L. Atzori, A. Iera, and G. Morabito, “From “smart objects” to [32] P. R. Benson, “ISO 8000 Data Quality: The Fundamentals
"social objects": The next evolutionary step of the internet of Part 1,” Real-World Decision Support (RWDS) Journal 3, no.
things,” IEEE Communications Magazine, vol. 52, no. 1, pp. 4, 2009.
97-105, 2014. [33] Y. Koren, “Factorization meets the neighborhood: a
[15] S. Nepal, W. Sherchan, and C. Paris, “Strust: A trust model multifaceted collaborative filtering model,” in Proceedings of
for social networks,” in IEEE 10th International Conference the 14th ACM SIGKDD international conference on
on Trust, Security and Privacy in Computing and Knowledge discovery and data mining, Las Vegas, Nevada,
Communications (TrustCom), 2011, pp. 841-846. USA, 2008, pp. 426-434.
[16] Y. Hu, D. Wang, H. Zhong, and F. Wu, “SocialTrust: Enabling [34] Y.-x. Yuan, “Step-sizes for the gradient method,” AMS IP
long-term social cooperation in peer-to-peer services,” Studies in Advanced Mathematics, vol. 42, no. 2, pp. 785,
Springer Peer-to-Peer Networking and Applications, vol. 7, 2008.
no. 4, pp. 525-538, 2014. [35] A. Jian, G. Xiaolin, Y. Jianwei, S. Yu, and H. Xin, “Mobile
[17] M. Nitti, R. Girau, L. Atzori, A. Lera, and G. Morabito, “A crowd sensing for internet of things: A credible crowdsourcing
Subjective Model for Trustworthiness Evaluation in the Social model in mobile-sense service,” in Multimedia Big Data
Internet of Things,” in IEEE International Symposium on (BigMM), 2015 IEEE International Conference on, 2015, pp.
Personal Indoor and Mobile Radio Communications, PIMRC, 92-99.
Australia, 2013, pp. 18-23. [36] Twin Oaks Computing Inc. “CoreDX Distributed Publish-
[18] Z. Liang, and W. Shi, “Enforcing cooperative resource sharing Subscribe System,” [Online] Available: http://www. twinoak
in untrusted P2P computing environments,” Mob. Netw. Appl., scomputing.com/coredx/develop.
vol. 10, no. 6, pp. 971-983, 2005.
– 153 –