Trust as a Unifying Basis for Social Computing
Munindar P . Singh
North Carolina State University
August 2011
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 1 / 23
Trust as a Unifying Basis for Social Computing Munindar P . Singh - - PowerPoint PPT Presentation
Trust as a Unifying Basis for Social Computing Munindar P . Singh North Carolina State University August 2011 singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 1 / 23 Abstractions for Social Computing Today, social computing
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 1 / 23
◮ In an ad hoc manner, in specific applications ◮ Via statistical models of networks ◮ Without regard to the nature of the relationships
◮ Trust ◮ Commitments ◮ Other normative relationships, as needed
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 2 / 23
◮ For a purpose ◮ In a context
◮ Embedded into each specific application ◮ Not reusable
◮ Casual (acquaintanceship or friendship) ◮ Familial ◮ Communal ◮ Organizational ◮ Practical (task-specific)
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 3 / 23
◮ Components ◮ Connectors
◮ Constraints on components and connectors ◮ Patterns on components and connectors singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 4 / 23
◮ Components: power elements, i.e., sources and sinks ◮ Connectors: conductors
◮ Constraints: no short circuits; (on contents) Kirchhoff’s laws; . . . ◮ Patterns: star; hierarchical separated by circuit breakers; . . .
◮ Current is what flows over a conductor ◮ Current drawn, voltage expected, impedance offered is how we
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 5 / 23
◮ Components: individuals ◮ Connectors: social relationships
◮ Constraints: reciprocal (Facebook), . . . ◮ Patterns: clique; group; . . .
◮ Claim: Trust is what flows over a relationship ◮ Can we characterize relationships in a reusable manner, even
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 6 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 7 / 23
◮ Roles ◮ Social interactions ◮ Their effects on social states ◮ Any additional constraints
◮ Communicating ◮ Maintaining social state ◮ Computing trust on behalf of a participant singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 8 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 9 / 23
◮ TAlice,Bob(raise alert, send warning) ◮ Ttruster,trustee(⊤, consequent): unconditional trust
◮ TAlice,Bob(raise alert, send warning) ∧ raise alert
◮ send warning ⇒ ¬TAlice,Bob(raise alert, send warning) ◮ send warning ⇒ ¬TAlice,Bob(⊤, send warning)
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 10 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 11 / 23
◮ u → ¬T(r, u)
◮ T(r ∧ s, u) ∧ r → T(s, u)
◮ T(r, u ∧ v) ∧ ¬u → T(r, u) singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 12 / 23
◮ T(r, u)→¬T(r, ¬u)
◮ From r ⊢ u infer ¬T(r, u)
◮ From T(r, u), s ⊢ r, s ⊢ u infer T(s, u) singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 13 / 23
◮ T(r, u) ∧ T(s, u) → T(r ∨ s, u)
◮ T(r, u) ∧ T(r, v) → T(r, u ∧ v)
◮ From T(r, u), u ⊢ s, T(s, v) infer T(r, v) singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 14 / 23
◮ Cx,y(r, u) → Ty,x(r, u)
◮ Tx,y(r, u) → Cy,x(r, u)
◮ Tx,y(true, u) → Ru
◮ Tx,y(s, v) → R(s→(Cy,x(s, v)Uv))
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 15 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 16 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 17 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 18 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 19 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 20 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 21 / 23
◮ How can trust fit into an overall system architecture?
◮ What are suitable patterns for different types of social applications?
◮ Computation paths can be used as a basis for judging probabilities
◮ Already available: Montague-Scott models ◮ Planned: Kripke models assuming some postulates
◮ Graphical or textual singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 22 / 23
singh@ncsu.edu (NCSU) Trust for Social Computing August 2011 23 / 23