12.12.2012 Views

Lecture Notes in Computer Science 5185

Lecture Notes in Computer Science 5185

Lecture Notes in Computer Science 5185

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A Map of Trust between Trad<strong>in</strong>g Partners 15<br />

offers to purchase another case of apples for the same cost. α may then believe that β<br />

may have struck a deal with β ′ over the possibility of a cheap case of apples.<br />

This aspect of trust is the mirror image of trust that is built by an agent “do<strong>in</strong>g the<br />

right th<strong>in</strong>g” — here we measure the extent to which an agent does not do the wrong<br />

th<strong>in</strong>g. As human experience shows, validat<strong>in</strong>g respect for confidentiality is a tricky<br />

bus<strong>in</strong>ess. In a sense this is the ‘dark side’ of trust. One proactive ploy is to start a false<br />

rumour and to observe how it spreads. The follow<strong>in</strong>g reactive approach builds on the<br />

apples example above.<br />

An agent will know when it passes confidential <strong>in</strong>formation to another, and it is reasonable<br />

to assume that the significance of the act of pass<strong>in</strong>g it on decreases <strong>in</strong> time. In<br />

this simple model we do not attempt to value the <strong>in</strong>formation passed as <strong>in</strong> Section 3.3.<br />

We simply note the amount of confidential <strong>in</strong>formation passed and observe any <strong>in</strong>dications<br />

of a breach of confidence.<br />

If α sends utterance u to β “<strong>in</strong> confidence”, then u is categorised as f as described<br />

<strong>in</strong> Section 3.4. Ct i measures the amount of confidential <strong>in</strong>formation that α passes to<br />

βi <strong>in</strong> a similar way to the <strong>in</strong>timacy measure It i described <strong>in</strong> Section 3.4: Ct i( f ,c) = ρ ×<br />

C t−1<br />

i( f ,c) +(1− ρ) × Δ(u,c), foranycwhere ρ is the discount rate; if no <strong>in</strong>formation is<br />

passed at time t then: Ct i( f ,c) = ρ ×Ct−1<br />

i( f ,c) . Ct i represents the time-discounted amount of<br />

confidential <strong>in</strong>formation passed <strong>in</strong> the various categories.<br />

α constructs a companion framework to Ct i , Lti is as estimate of the amount of <strong>in</strong>formation<br />

leaked by βi represented <strong>in</strong> G. Hav<strong>in</strong>g confided u <strong>in</strong> βi, α designs update functions<br />

JL u for the Lt i as described <strong>in</strong> Section 3.1. In the absence of evidence imported by the<br />

JL u functions, each value <strong>in</strong> Lti decays by: Lt i( f ,c) = ξ×Lt−1<br />

i( f ,c) ,whereξis <strong>in</strong> [0,1] and probably<br />

close to 1. The JL u functions scan every observable utterance, u′ , from each agent<br />

β ′ for evidence of leak<strong>in</strong>g the <strong>in</strong>formation u, JL u (u ′ )=P(β ′ knows u | u ′ is observed).<br />

As previously: Lt i( f ,c) = ξ × Lt−1<br />

i( f ,c) +(1− ξ) × JL u (u′ ) × Δ(u,c) for any c.<br />

This simple model estimates Ct i the amount of confidential <strong>in</strong>formation passed, and<br />

Lt i the amount of presumed leaked, confidential <strong>in</strong>formation represented over G. The<br />

‘magic’ is <strong>in</strong> the specification of the JL u functions. A more exotic model would estimate<br />

“who trusts who more than who with what <strong>in</strong>formation” — this is what we have elsewhere<br />

referred to as a trust network [17]. The feasibility of modell<strong>in</strong>g a trust network<br />

depends substantially on how much detail each agent can observe <strong>in</strong> the <strong>in</strong>teractions<br />

between other agents.<br />

5 Summary Measures<br />

[17] describes measures of: trust (<strong>in</strong> the execution of contracts), honour (validity of argumentation),<br />

and reliability (of <strong>in</strong>formation). The execution of contracts, soundness of<br />

argumentation and correctness of <strong>in</strong>formation are all represented as conditional probabilities<br />

P(ϕ ′ |ϕ) where ϕ is an expectation of what may occur, and ϕ ′ is the subsequent<br />

observation of what does occur.<br />

These summary measures are all abstracted us<strong>in</strong>g the ontology; for example, “What<br />

is my trust of John for the supply of red w<strong>in</strong>e?”. These measures are also used to summarise<br />

the <strong>in</strong>formation <strong>in</strong> some of the categories <strong>in</strong> the illocutionary framework. For

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!