Reputation-Based Trust Management (extended abstract)

Similar documents
ÇÙØÐ Ò È Ý Ð ÓÒ Ø ÓÒ Ò ÓÙ Æ ÙÐ ÄÓÛ¹ Ò ØÝ Ð Ñ Ø À ¹ Ò ØÝ Ð Ñ Ø Ü ÑÔÐ ÜØ ÒØ ÓÒ ØÓÛ Ö ÐÑ Ö Ö Ñ ÒØ Ò

Ö Ò ÁÅ ÔØ Ö Ê ÕÙ Ö ÔØ Ö ½¼ ½ Ò ½ º ÄÏÀ ØÓ ÖØ Ð ÁÒØ ÐÐ Ò ÁÒØÖÓ ÙØ ÓÒ ¹ ËÔÖ Ò ¾¼½ Ë º ÓÙ ÖÝ Ë Ù¹Û ¹Ö µ ÖØ ¼¾µ ¾¹ º º ÓÙ ÖÝ ½ ÁÒ ØÖÙØÓÖ³ ÒÓØ ÖÙ ÖÝ ½ ¾¼½

ÁÒ ÙØ Ú ¹ ÙØ Ú ËÝ Ø Ñ Ñ Ø Ñ Ø Ð ÐÓ Ò Ø Ø Ø Ð Ð ÖÒ Ò Ô Ö Ô Ø Ú Æ ÓÐ ÓØ Å Ð Ë Ø ÇÐ Ú Ö Ì ÝØ Ù ÍÒ Ú Ö Ø È Ö ¹ËÙ ÆÊË ÁÆÊÁ ÈÖÓ ¾¼¼

x = x 1x 2 x (p-1)x x = 3 x = 3 x = 3 x = 3 0 x 1 x 2 x... (p-1)x

arxiv: v25 [math.ca] 21 Nov 2008

ÐÓ Û µ ÅÄ Ó Ò ººº Ð Ò Ö Ó Ü = (,..., Ü Ò ) ººº ÒØ Ó ÛÓÖ Ý = (Ý ½,..., Ý Ò ) ººº Ö Ú ÛÓÖ ¹ ÓÒ Ø ÒØ ÐÓ Û µ Å Ü ÑÙÑ Ä Ð ÓÓ Åĵ Ó Ö Ø Ø ÔÓ Ð Ó Ö Ñ Ò Ñ Þ Ø

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò

ÅÓØ Ú Ø ÓÒ Å ÕÙ Ð ØÝ Ó Ø Ó ØÖ Ò Ô Ö ÒØ ÁÒ Ø ÓÒ Ú ÐÓÔÑ ÒØ ØÖ Ò ÖÖ Û ÓÖ Ò Ð ÙØ ÓÖ Ö Ñ Ò ÐÓÒ Ú ÐÓÔÑ ÒØ ØÓÖÝ Å ÒÝ Ù ØÓÑ Ö»Ù ØÓÑ Ö Ù ÓÑÔÓÒ ÒØ Ó Ñ ÒÝ ÔÖÓ Ø

ÅÓØ Ú Ø ÓÒ Ø Ú Øݹ ØÖ Ú Ð Ñ Ò ÑÓ Ð Ò Ô Ö ÓÒ Ð Þ ÖÚ ÓÒ Ñ ÖØÔ ÓÒ ¾» ¾

ÇÙØÐ Ò ÖÓÙÒ Ü ÑÔÐ ÔÖÓ Ö Ñ ÒÓ Ñ Ø Ó Ü ÑÔÐ ÒÓ Ì ÓÖÝ ÓÒÐÙ ÓÒ ¾

ÇÚ ÖÚ Û ½ ÁÒØÖÓ ÙØ ÓÒ ¾ Ý ¾¼½¾ Ò Ö Ð Þ Ö ÐØÝ ÅÓ Ð ÓÖ ÓÑ Ø Ý ¾

ÁÒØÖÓ ÙØ ÓÒ ËØ Ø Ø Ð Ò ÐÝ ÓÖ Ö Ø Ø Ô ÖØ Ù¹ Ð ÖÐÝ ÓÖ ÔÖÓ Ð ØÝ ÑÓ Ð Ù Ø ÒÓ¹ Ñ Ð ÈÓ ÓÒ Ò ÑÙÐØ ÒÓÑ Ð Ý ÒÓÛ Ú ÖÝ Û ÐÐ ÙÒ Ö ØÓÓ Û Ø Û ÐØ Ó Ù Ø Ð Ó Ø¹ Û Ö º

Control X Switch X=1, SW ON X=0, SW OFF F(X)=X F un tion Implementation N. Mekhiel

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance

Communications Network Design: lecture 18 p.1/21

Question A n um b er divided b y giv es the remainder. What is the remainder 5 if this n um b er is divided b y? answer 3

ÓÖØÖ Ò ÓÖØÖ Ò = ÜØ Ò ÓÒ ØÓ Ø ÆËÁ ÇÊÌÊ Æ Ø Ò Ö º Ê ÔÓÒ Ð ØÝ Ñ Ö Ò Æ Ø ÓÒ Ð ËØ Ò Ö ÁÒ Ø ØÙØ ÆËÁ  µ ÁÒØ ÖÒ Ø ÓÒ Ð ÇÖ Ò Þ Ø ÓÒ ÓÖ ËØ Ò Ö Þ Ø ÓÒ ÁËÇ»Á ÂÌ

ÁÒØÖÓ ÙØ ÓÒ Ö ÔØ Ú ËØ Ø Ø ÁÒ Ö ÒØ Ð ËØ Ø Ø ÀÝÔÓØ Ø Ø Ò ¹ Ô Ú ÐÙ Ø ÖÑ Ò Ø ÓÒ Ó ÑÔÐ Þ ËÙÑÑ ÖÝ Ä ÖÒ Ò Ó¹ Ø ÖÑ Æ ÙÝ Ò Ì ÌÙ Î Ò ½ Æ ÙÝ Ò ÉÙ Ò Î Ò ¾ ½ ÍÒ Ú

Communications Network Design: lecture 21 p.1/47

¾ ÓÖÔÙ Ôк ÓÖÔÓÖ µ ÓÖÔÙ ÓÐÐ Ø ÓÒ Ó Ø ÜØ µ ÓÖ ÙØØ Ö Ò ½¼ Ø ÒÝ ½¼ Ö ÓÒ Ð ½¼ ½¾ ÙÖÖ ÒØ Ð Ð Ñ Ø ÓÖ ÙÒ ÒÒÓØ Ø Ø Ì ÑÓ Ø Ú ÐÙ Ð ÓÖÔÓÖ Ö Ø Ó Ø Ø ÓÙÖ Ò ØÙÖ ÐÐÝ

Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ Ö ÕÙ ÒØ Ø ÄÇË Ì Ð ÓÖ Ø Ñ ÓÖ Ò Ò Ö ÕÙ

ÁÒØÖÓ ÙØ ÓÒ Î Ø Ð Ø Ö ØÙÖ ÓÒ ÑÔ Ø Ó Ù ØÑ ÒØ Ò Ø Ð Ø ÓÒ ÔÓÐ ÓÒ ÔÓÚ ÖØÝ ÙØ Ù Ø Û ÓÒ Ø ÑÔ Ø Ó Ô Ñ ÖÓ ÓÒÓÑ ÔÓÐ º ØØ Ö ÒÓÛÐ ÓÙØ ÔÖÓ¹ÔÓÓÖ Ñ ÖÓ ÔÓÐ Ò Ø Ñ ÒØ

ÙÖ ¾ Ë Ð Ø ÔÔÐ Ø ÓÒ ¾ ¾

Communications Network Design: lecture 19 p.1/32

A Formal Architecture for the 3APL Agent Programming Language

Ä ÖÒ Ò ÖÓÑ Ø Ö Ëº Ù¹ÅÓ Ø Ð ÓÖÒ ÁÒ Ø ØÙØ Ó Ì ÒÓÐÓ Ý Ä ØÙÖ ½ Ì Ä ÖÒ Ò ÈÖÓ Ð Ñ ËÔÓÒ ÓÖ Ý ÐØ ³ ÈÖÓÚÓ Ø Ç ² Ë Ú ÓÒ Ò ÁËÌ ÌÙ Ý ÔÖ Ð ¾¼½¾

ÓÙÖ ÓÒØ ÒØ Ï Ý Ó Û Ù Ø ÙÒØ ÓÒ Ð ØÝ ÔÖÓÚ Ý Ø Å Ò Ñ ÒØ ËÝ Ø Ñ Ø ÅÓ Ð Ê Ð Ø ÓÒ Ð Æ ØÛÓÖ ÇÇ ÀÓÛ Ó Û Ù ÅË Ê Ð Ø ÓÒ Ð ÑÓ Ð ÓÙÒ Ø ÓÒ Ð ÕÙ ÖÝ Ð Ò Ù ËÉÄ ÔÔÐ Ø

ÓÙÖ ËØ ÁÒ ØÖÙØÓÖ ÓÒØ Ø ËÐ Ñ Ø ÙÐÐ Ö ÐÓÙ Ð Ø ÓÒ ÓÙÖ Û Ø ÇÒ ÍÏ¹Ä ÖÒ Ò ÓÒ ÓÙÖ Û Ø Î ÖÝ Ø Ö ÓÑ ØÓ Ð Ø ÒÓØ Ë ÁÒØÖÓ ØÓ Å Ñص ÇÚ ÖÚ Û Ó Ë ÄÄ ¾¼½ ¾» ¾

Workshop on Statistics of Networks, June 2010 p.1/38

ÌÖ Ò Ò ÆÙÑ Ö ÓÖ È ÔÓ Ø Ö ÓÖ ÖÖÓÖ ÓÒØÖÓл ÔØ Ú Ñ Ò ³ ÁØ Ö Ø Ú Ô Ö ÐРе ÓÐÙØ ÓÒ ØÖ Ø ³ ÇÔ Ö ØÓÖ¹ ÔÐ ØØ Ò ÓÖ ÓÙÔÐ ÔÖÓ Ð Ñ ³ Ê ÙØ ÓÒ Ó ÒÙÑ Ö Ð ÓÑÔÐ Ü ØÝ


È Ö Ø ² ÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÓÖ Ñ È Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö ÒÓÛ ÓÙØ Ø ÔÖ Ú ÓÙ ÑÓÚ Ó ÓÔÔÓÒ ÒØ º º º Ð ¹ËØ Û ÖØ Ñ º ÁÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö Ó ÒÓØ ÒÓÛ ÓÙØ Û

Ã Ô ÐÐ Ø ÙÒ Ð ÕÙ Ô Ò ÙÖ ÓÑ Ú ÒØ Ö Ø ÓÒ Ò ÓÑÔ Ø Ø ÓÒ Ä ÙÖ Å ËËÁÇ ÄÈÌÅ ÍÒ Ú Ö Ø È Ö ÎÁ ¾½ ÒÓÚ Ñ Ö ¾¼½

function KB-AGENT( percept) returns an action static: KB, a knowledge base t, a counter, initially 0, indicating time

Breeze. Stench PIT. Breeze. Breeze PIT. Stench. Gold. Breeze. Stench PIT START

ÇÙØÐ Ò Ó Ø Ø Ð ÅÓØ Ú Ø ÓÒ = ¾ ÙÔ Ö ÝÑÑ ØÖ Ò ¹Å ÐÐ ÕÙ ÒØÙÑ Ñ Ò ÆÙÑ Ö Ð Ð ÓÖ Ø Ñ Ò ÒÙÑ Ö Ð Ö ÙÐØ Ü Ø ÓÐÙØ ÓÒ ÙÖØ Ö Ô Ö Ô Ø Ú

A B. Ø ÓÒ Left Right Suck NoOp

ÙÖ Ë½ Ø Ò ØÖ ÙØ ÓÒ Ò Ø ÓÒØ Ø ÓÖ Ø Ò Ø Ö Ù º ¾

Degradation

ÇÙØÐ Ò ÁÒØÖÓ ÙØ ÓÒ Ï Ø Ñ Ø Ñ Ø ËÓÑ Ø ÒÓ Ö Ô Ú Ò ÒÓØ Ö ÓÖ ÓØØ Ò ØÖ Ó ÙÑ Ò ØÝ Ð Ö Ò ØÙ Ý Ñ ÖÓÖ Ä Ø Ò Ö Ø Ø Ø ÑÓÒ ÖÓÑ ÓÖÑ Ö Ð Ö Ò Ï Ø Ñ Ø Ñ Ø Ê ÄÄ Á Ô ÓÔ

Ó Ú ÐÙ Ö ÒÚÓÐÚ Ò ÖØ Ò Ô ÖØ Ó Ø ÔÖÓ Ö Ñµ Ò ØÓ ÐÔ Ø Ø ÔÖÓ Ö ÑÑ Ö Ñ Ø º ÁÒ Ø Ø ÐÐÝ ØÝÔ Ð Ò Ù Ø ØÝÔ Ö ÒÓØ Ò ÓÑ Ø Ò Ø Ø Ø Ô ÖØ Ò ÓÑÔÙØ Ø ÓÒ ÙØ Ö Ø Ö ÓÑ Ø Ò

Ë Ò ÓÖ Æ ØÛÓÖ Å ÈÖÓØÓÓÐ ÂÙ Î Ð ÓÒ Ò Ä ÓÖ ØÓÖÝ ÓÖ Ì ÓÖ Ø Ð ÓÑÔÙØ Ö Ë Ò À Ð Ò ÍÒ Ú Ö ØÝ Ó Ì ÒÓÐÓ Ý ¾ º º¾¼¼ ÂÙ Î Ð ÓÒ Ò Ë Ò ÓÖ Æ ØÛÓÖ Å ÈÖÓØÓÓÐ

Ë ÑÙÐ Ø ÓÒ ÙÖ ØÝ Ò Ø ÔÔÐ Ô ÐÙÐÙ ËØ Ô Ò Ð ÙÒ ËØ Ú ÃÖ Ñ Ö ÇÐ Ú Ö È Ö Ö ÓÖÑ ÖÝÔØ ½»¼»¾¼¼

Lazy Semiring Neighbours

ÇÙØÐ Ò Ó Ø Ð ÅÓØ Ú Ø ÓÒ ÔÓÐÝÒÓÑ Ð Ú ÓÒ ÒÓ Ò ÓÖ ÝÐ Ó ÙØÓÑÓÖÔ Ñ µ ÑÓ ÙÐ ÕÙ ¹ÝÐ µ ØÖÙ¹ ØÙÖ ÖĐÓ Ò Ö ÓÖ ÑÓ ÙÐ Ú ÐÙ Ø ÓÒ Ó ÖÓÑ ÓÖ Ö ÓÑ Ò Ò¹ ÐÙ Ò ÓÔÔ Ó µ Ü Ñ

Chapter 9. Trapezoidal Maps. 9.1 The Trapezoidal Map

ÇÙØÐ Ò ½ ¾ ØÖ ÙØ ÓÒ ² Ì Ò ÐÝ Ó Ö ÕÙ Ò ÔÔÐ Ø ÓÒ Ó Ø χ ¾ ËØ Ø Ø ÐÙÐ Ø Ò Ô Ú ÐÙ Ò ³ Ü Ø Ø Ø Ì ÓÒÚ ÒØ ÓÒ Ð Ú º Ø Ñ Ô ÓÔغµ È Ö ÓÒ Ò ËÔ ÖÑ Ò ÓÖÖ Ð Ø ÓÒ Ù Ò

ÇÙØÐ Ò ÇÙØÐ Ò ÈÙÖÔÓ Ó Ø ÈÖÓ Ø È ÖØ Ð ÌÖ Ò ÔÓÖØ È ÖØ Ð ÁÒØ Ö Ø ÓÒ È ÖØ Ð ÔÓ Ø ÓÒ Ê ÙÐØ ËÙÑÑ ÖÝ ¾ Ôк¹Å Ø º Ò Ö ØÞ Ë Ð ¹ Ò Ì Ö È ÖØÝ ËÓ Ð Ò Ó ÅÓØÓÖ Î Ð

Accounts(Anum, CId, BranchId, Balance) update Accounts set Balance = Balance * 1.05 where BranchId = 12345

"unphysical region" pp e + e : FF modulus

R p [%] [%], R p Photon energy [ev]

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain

ÝØ Ð Ö Ø ÓÒ Ó ÝÒ Ñ ØÖ ÑÙÐ Ø ÓÒ Ó Ø Ú Ñ Ò Ð Ö Ø ÓÒ ÖÓÑ ØÖ ÓÙÒØ Ð Ð Ô Ö Ô Ø Ú Ø Ñ Ø ÓÒ Ó Ô Ø ÓÛ Ø ÛÓÖ Ø Ñ Ø ÓÒ Ó Ñ ÖÓ¹ ÑÙÐ Ø Ú ÓÖ ¾» ¾¾

ÇÙØÐ Ò

ELA. Electronic Journal of Linear Algebra ISSN A publication of the International Linear Algebra Society Volume 13, pp , July 2005

ËÙÑÑ ÖÝ Ì Ó Ì Ó Ö Ä Ì ½ Ø ÏÊÅÁËË ÃÖ ÓÛ ÈÓÐ ¾¼¼ ¾» ½

ÓÖ Ö ÛÓÖ Ò Ô Ö Ó ØÝ Ò Ø ÛÓÖ ÓÖ Ö Ø ÔÖÓÔ Ö ÔÖ Ü ÕÙ Ð ØÓ Ù Üº ÓÖ Ü ÑÔÐ ÓÖ Ö º Á ÛÓÖ ÒÓØ ÓÖ Ö Û Ý Ø ÙÒ ÓÖ Ö ÓÖ ÓÖ Ö¹ Ö º ÓÖ Ü ÑÔÐ ½¼ Ò = ½¼¼ ¼ Ö ÙÒ ÓÖ Ö

1 The Multinomial logit

ÌÖ Ò Ò ÆÙÑ Ö ÓÖ È ÔÓ Ø Ö ÓÖ ÖÖÓÖ ÓÒØÖÓл ÔØ Ú Ñ Ò ³ ÁØ Ö Ø Ú Ô Ö ÐРе ÓÐÙØ ÓÒ ØÖ Ø ³ ÇÔ Ö ØÓÖ¹ ÔÐ ØØ Ò ÓÖ ÓÙÔÐ ÔÖÓ Ð Ñ ³ Ñ ÁÑÔÖÓÚ Ñ ÒØ Ó Æ ÒÝ Ú ½º ÇÔ

Accounts(Anum, CId, BranchId, Balance) update Accounts set Balance = Balance * 1.05 where BranchId = 12345

ØÖ Ø Ê Ù Ð ØÖ Ø ØÖ Ø Ø Ö Ñ Ò ØÓÖ Û Ø Ò ØÖÙØÙÖ Ö ÙÐØ Ó Ø Ñ ÒÙ ØÙÖ Ò ØÓÖݺ Ç Ø Ò ÐÐ ÐÓ Ò ØÖ Ø Ö Ñ Ò Û Ò Ø Ö ÒÓ ÔÔÐ ÐÓ Ò Ù Ò Ø ÔÔÐ ÐÓ Ò Ò Ø ØÖÙØÙÖ ³ ÜÔ Ø

dis.08 dis.09 dis.10 dis.11

½ ÁÒØÖÓ ÙØ ÓÒ Ê ÒØ Ö ÙÐØ Ò ÑÔÐ Ñ ÒØ Ø ÓÒ Ó Ø ÔÐ ÒÒ Ö ½ Ú Ö Ø Ò¹ Ø Ö Ø ÓÖ Ù Ø Ð ÔÔÐ Ð ØÝ Ó Ø ÔÐ ÒÒ Ò ÔÔÖÓ ØÓ Ñ ÒÝ Ö Ð ÛÓÖÐ ÔÖÓ Ð Ñ º ÍÒ ÓÖØÙÒ Ø ÐÝ Ø ÔÖ

Ì ÓÑÔÙØ Ð Ñ Ò ÓÒ Ó ÌÖ Ó ÁÒ Ò Ø À Ø ÊÙ ÐÐ Å ÐÐ Ö ÂÙÐÝ ¾ ¾¼¼ Ì Ö Ø ÓÙÖ Ø ÓÒ Ó Ø ÖØ Ð ÔÔ Ö ÔØ Ö Ó È º º Ø Ø Ø ÍÒ Ú Ö ØÝ Ó Ó ÙÒ Ö Ø ÙÔ ÖÚ ÓÒ Ó ÊÓ ÖØ Áº ËÓ

Ð Ö Ø ÓÒ Á Ì ÖØ Ò Ö È ØÖÙ Ö Ð Ö Ø Ø Ø Ø» ÖØ Ø ÓÒ Û Á Ö Ý Ù ¹ Ñ Ø ÓÖ Ø Ö È ÐÓ ÓÔ ÓØÓÖ Ø Ø ÍÒ Ú Ö ØÝ Ó ÈÖ ØÓÖ ÑÝ ÓÛÒ ÛÓÖ Ò ÒÓØ ÔÖ Ú ÓÙ ÐÝ Ò Ù Ñ ØØ Ý Ñ Ó


ÇÙØÐ Ò ½ Ï Ø ØÓ ØÙ Ý ÓÙØ ÐØ ² ÙÖ ¾ ÓÐÓ Ð ÅÓ Ð ÐÓÓ Ø Ø ÓÖ Ø À Ö Ö Ð ÅÓ Ð Ò Ú Ù Ð Æ ÖÓÙÔ ÐÓÛ Ò ÐÝ ØÓÓÐ ØÓ ØÙ Ý ÑÓÚ Ñ ÒØ Ù ÓÒ Å Ö Ð Ë ÖÚ Ð Ó À ÐØ ² ÍÖ ÈÁ

Cover Page. The handle holds various files of this Leiden University dissertation.

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ

ν = fraction of red marbles

M 1 M 2 M 3 M 1 M 1 M 1 M 2 M 3 M 3

ÇÖ Ò Þ Ø ÓÒ ÄÙ Ù Ó Ø ÓÒ ÍÒ Ú Ö ØÝ Ó ÞÓÖ ÇÖ Ò Þ Ò ÓÑÑ ØØ Ð ÖÚ Ð Ó ÁË Ä ÈÓÖØ٠е Ò È ÙÐ ÖÖÓ ÍÒ Ú Ö ØÝ Ó ÞÓÖ ÈÓÖØ٠е ÖÐÓ Ë ÒØÓ ÁË ÈÓÖØ٠е ÂÓÖ ÆÙÒÓ Ë ÐÚ

0.12. localization 0.9 L=11 L=12 L= inverse participation ratio Energy

Ò Ø ÓÒ ÃÒÓØ ÃÒÓØ Ò Ê Ñ Ø Ö ÑÓÚ Ö ÒØ Ð Ñ Ò Ó Ë ½ ÒØÓ Ê Ö ÐÐ ÒÓØ º Ì ØÛÓ ÒÓØ Ã ½ Ò Ã ¾ Ö Ö Ö ØÓ Ø Ñ ÓÒ Ò ÑÓÚ ÒØÓ Ø ÓØ Ö º º Ø Ö Ö ÒØ Ð µ Ñ ÐÝ Ó ÒÓØ Ô Ö

The Enigma machine. 1 Expert teams 25 mins. 2 Mixing the teams 30 mins. 3 Coding and decoding messages 1 period

Î Ö Ð X C = {x 1, x 2,...,x 6 }

ÜÔÓÒ ÒØ Ð Ò Ø ÔÖÓ Ð Ñ Þ Ø Ò ÐÓ Ò Ù Ø Ð Ò Ö ÓÖ Ò ØÓ ÃÓÖ º Ì ÒØ Ð Ö ÓÒ Û Ý ØÖ Ø ÓÒ Ö Ù ÓÑÔÐ Ü ØÝ Ø Ø Ø ØÓØ Ð ÓÑÔÐ Ü ØÝ Ø ÙÑ Ó Ø ÓÑÔÐ Ü Ø Ó Ø ÑÙÐØ ÔÐ Ö Ò

Ð Ò ØÓ ØØ Ö Ò ÔÔÖÓÜ Ñ Ð ØÝ Ö ÙÐغ Ì ÓÙÖ Ô Ö Ñ ØÓÛ Ö Ø Ø Ö Ò ÔÔÖÓÜ Ñ Ð ØÝ Ö ÙÐØ Ò Ô Ö Ý Ø Ô Ô Ö Ó È Ô Ñ ØÖ ÓÙ Ò Î ÑÔ Ð ÓÒ ÌÖ Ú Ð Ò Ë Ð Ñ Ò ÔÖÓ Ð Ñ µ Ø

Outflow plane U=V=W=0. 2.5m. 1.95m U=V=W= m (0,0,H) 0.1m. 0.1m y. 0.41m 0.15m. 0.45m U=V=W= m Inflow plane

ÝÓÒ ÀÝÔ ÖØÖ Ï Ø ÓÑÔÓ Ø ÓÒ Å Ø Ó Ï Ø ÓÙØ ÓÑÔÓ Ø ÓÒ ÀÙ Ò Ò Î ØÓÖ ÐÑ Ù Ô ÖØ Ñ ÒØ Ì ÒÓÐÓ ÍÒ Ú Ö Ø Ø ÈÓÑÔ Ù Ö Ö ÐÓÒ ËÔ Ò Ù º Ò Ú ØÓÖº ÐÑ Ù ÙÔ º Ù ØÖ Øº Ì Ò

ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖ

Ë Ø Ó ÒÙÑ Ö Ò Ø Ö Ö ÔÖ ÒØ Ø ÓÒ ÁÒ Ø ÓÙÖ Û Û ÐÐ ÒØ Ö Ø Ò Ø Ó ÒÙÑ Ö º ÁÒ ÓÑÔÙØ Ö Ò Û Ö ÓÒ ÖÒ Ý Ø ÕÙ Ø ÓÒ ÓÛ Ó Û Ú Ù Ø Ø ÓÙÖ ÔÓ Ð Ì Û Ý ÒÙÑ Ö Ø ÓÒ Ý Ø Ñ

½º¾ Ò Ø ÓÒ Ì Ò Ó Ø ÓÚ ÕÙ Ø ÓÒ Ò ÓÖÑ Ð Þ Ý Ø ÓÐÐÓÛ Ò Ò Ø ÓÒº Ò Ø ÓÒ ½ È Ù Ó Ê Ò ÓÑ ÙÒØ ÓÒ Ñ Ðݵ Ñ ÐÝ ¾ ¼ ½ ¾Æ ÐÐ Ñ ÐÝ Ó Ð µ Ä µµ È Ù Ó Ê Ò ÓÑ ÙÒØ ÓÒ ¾

ÁÒØÖÓ ÙØ ÓÒ ÇÖ Ò Ø ÓÒ Ð Ù ÌÓÔ ÇÚ ÖÚ Û Ä ØÙÖ Ü Ö ÓÑÔÙØ Ö ÓÓ Ü Ñ Ï Ý Ñ Ø Ñ Ø ÅÓ Ð Ò Ø Ë Ø ÌÛÓ Ü ÑÔÐ

Proof a n d Com p uta tion in Coq Maxime Dénès, Benjamin Grégoire, Chantal Keller, Pierre Yves Strub, Laurent Théry Map 16 p.1

Communications Network Design: lecture 07 p.1/44

ishares Core Composite Bond ETF

ÁÐÐÙ ØÖ Ø ÓÒÚ Ö Ò Ó ÙÒ ÖØ ÒØÝ Ø Ñ Ø Ý ØÛÓ Ü ÑÔÐ ½º ÐÙÓÒ ØÖ ÙØ ÓÒ Ø Q.½ Î ¾º ÒÐÙ Ú Ø Ö Ø Ó dσ dp T ½. Ì Îµ/ dp dσ T ½. ¼ Ì Îµ Ì ØÛÓ Ü ÑÔÐ Ö ÐÓ ÐÝ ÓÒÒ Ø

½½ º º À Æ Æ º º Í Æ ÒÓØ ÔÓ Ø Ú Ñ ¹ Ò Ø ÙÒÐ Ø ÓÐÐÓÛ Ò ØÖÙ Ø Ö ÓÒ Ù ÔÖÓ Ð Ñ È ½ Û Ø Ò Ð ÐÐ ÓÒ ØÖ ÒØ Û Ó ÓÖÑ Ù Ø ØÓ Ñ Ò ¾Ê Ò µ ½ ¾ Ì Ì Ø Ì Ù ÔÖÓ Ð Ñ Ø Ð

ÁÒØÖÓ ÙØ ÓÒ Ì Ñ Ñ Ö Ó Ú Ò Ô ÓÖ Ù Ô µ Ú Ø Ñ Ò Ö Ð ØÙÖ ÓÒ Ø Ö Ó Ø Ô ØØ ÖÒº ÀÓÛ Ú Ö Ò Ú Ù Ð Ò Ñ Ð Ø ÓÛÒ Ø ÒØ Ñ Ö Ò º Ì Ô ØØ ÖÒ Ö ÒÓØ Ø ÖÑ Ò Ò Ø ÐÐݺ Ì Ý

ß ¾ ß ËÌÊ Ì ÌÓ Ò Ò Ø ØÓ Ø Ù Ó Ð Ñ ÒØ ÖÙÔØ ÓÒ Ò Ö ÓÒ Ø ÙÒ Û Ó ÖÚ Ð Ñ ÒØ Ø Ø ÖÙÔØ Ò Ø Ú Ö ÓÒ ÆÇ º Ì Ó ÖÚ Ø ÓÒ ÓÒ Ø Ó À«ÐØ Ö Ö Ñ Ø Ø Ö Û Ú Ð Ò Ø Ð Ò ÒØ Ö

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø

pronoun word noun noun noun phrase phrase phrase

λ = λ = 1.0 w Ø w = C (w) + λ N wì w

Proceedings of the International Meteor Conference

ÇÙØÐ Ò ÁÒØÖÓ ÙØ ÓÒ º º ÓÙ ÖÝ ¾ ÁÒ ØÖÙØÓÖ³ ÒÓØ Å Ò Ñ Ü Ð ÓÖ Ø Ñ ÐÔ Ø ÔÖÙÒ Ò

edges added to S contracted edges



Transcription:

Reputation-Based Trust Management (extended abstract) Vitaly Shmatikov and Carolyn Talcott Computer Science Laboratory, SRI International, Menlo Park, CA 94025 USA shmat,clt @csl.sri.com Abstract. We propose a formal model for reputation-based trust management. In contrast to conventional, credential-based trust management, in reputation-based trust management an agent s past behavior is used to decide whether to grant him access to a protected resource. We use an event semantics inspired by the actor model, and assume that each principal has only partial knowledge of the events that have occurred. Licenses are used to formalize restrictions on agents behavior. If an agent fulfills the obligations imposed by a license and does not misuse the license by performing a forbidden action, then his reputation improves. This approach enables precise formal modeling of scenarios involving reputations, such as financial transactions based on credit histories and information sharing between untrusted agents. 1 Introduction Reputation is a fundamental concept in many situations that involve interaction between mutually distrusting parties. Before issuing a credit card, the bank usually checks the applicant s credit history, which includes independently certified evidence that the applicant has fulfilled his prior financial obligations. On ebay, the seller s reputation, i.e., the evidence that past buyers were satisfied with this seller s behavior, is considered an asset of great value. Many solutions for the free-rider problem [AH00] in peer-topeer file sharing networks (the problem of users downloading a large number of files without contributing anything in return) rely on the evidence of past contributions when granting access to popular files [GJM02]. We propose a formal model that gives a precise semantics to the notion of reputation and uses it in reasoning about trust. Our approach extends an event-based semantics inspired by the actor model of distributed computation [BH77,Cli81] to incorporate incomplete knowledge. Resource owners are assumed to have only partial knowledge of the event history. When deciding whether whether to trust a particular agent or not, they rely on the evidence of his past behavior supplied by trusted agents. By contrast, trust in conventional trust management [BFL96] is based on access control credentials. Inspired by license-based digital rights languages [GWW01,PW02], we use licenses to formalize both good and bad behavior. Each license restricts the behavior of the agent who accepts it by specifying the agent s obligations (what the agent must do) as well as the forbidden actions (what the agent must not do). If an agent fulfills all obligations associated with the license and avoids any of the forbidden actions, the

Trust creation of new trust Agent s view of the world (events reported by trusted agents) Reputation of other agents (compliance or misuse of licenses) Fig. 1. Reputation-based trust management license issuer creates a signed statement that the agent has complied with the license. Another resource owner may decide to grant a new license on the basis of this evidence, even though he has not personally observed the licensee s good behavior. To illustrate by example, consider a consumer applying for an auto loan. The lender requests the consumer s credit history from a credit reporting bureau, and uses the information to decide whether to grant the loan and at what terms. The lender s trust in the consumer is not based on the consumer s credentials and, in contrast to conventional trust management, the credit bureau is not vouching for the consumer s creditworthiness (i.e., there is no delegation of trust). The bank trusts the credit bureau to accurately report the evidence, i.e., a summary of past events, such as the fact that the consumer had signed up for a credit card and fulfilled his obligations by making timely payments. We provide sample rules and policies that an agent may use for building reputationbased trust. Our approach is summarized in figure 1. The proposed framework does not currently support delegation, but we expect that it will be a fairly simple extension of the basic approach. We also present two case studies, using our framework to formalize reputation-based trust in an anonymized peer-to-peer file distribution system and a multi-player game scenario, respectively. The former demonstrates how reputation is created from the evidence of license fulfillment, while the latter illustrates the use of licenses in an environment with multiple untrusted agents. 2 Model The following list of sorts represents the fundamental concepts of our framework: È Principals Events Actions Ê Resources Ä Licenses À Histories Ë Statements  Justifications (proofs) 2.1 Principals Principals or agents are individual entities (people, organizations, software agents) operating independently of each other. A principal uses his own observations and statements of those he trusts to construct a partial view of the event history and assign reputations to other principals based on the information contained in this view. 2.2 Actions and events An action is an atomic interaction between two principals or a principal and a resource. For example, action Ù È Ê Ä models a principal using a resource under

a license. Action Ý È Ë Â models issuing a signed statement. For each action, ØÓÖ È specifies the principal who is performing the action. Function Ó ÖÚ Ö ¾ È specifies the principals who are the immediate observers of the action and thus know that the corresponding event has occurred. An event is an action occurrence. Function Ø maps events to associated actions. A history is a partially ordered set of events labelled by actions, where is a discrete partial order. We say that ¼ if ¼ and the partial order of is the restriction of that of ¼. We write for the rollback of a history to the events preceding, i.e., ÔÓ Ø ¼ ¾ ¼. Axioms ØÖÙ Ø Ô Ô ¼ µ model trust relationships that are used in constructing each principal s partial view of the event history. Let ÓÙÖ µ ÓÓÐ hold iff has occurred. We define a principal s view of a history as the projection Ú Û À È À of onto events that he has directly observed, or learned about from those he trusts: Ú Û Ôµ ÔÓ Ø ¾ Ô ¾ Ó ÖÚ Ö Ø µµ Ô ¼ µ ØÖÙ Ø Ô Ô ¼ µ ¼ ¾ s.t. Ø ¼ µ Ý Ô ¼ ÓÙÖ µµµ This assumes that a principal observes all signed statements issued by his friends, e.g., via broadcast or a central repository of signed statements. 2.3 Resources A resource is an item of value (e.g., program, website, database, credential) that principals may wish to access or use. A resource has an ÓÛÒ Ö Ê È, where is the special principal indicating that no one owns the resource, and Ø ØÙ Ê ÔÙ Ð Ð Ò ÔÖÓØ Ø. For simplicity, ÓÛÒ Ö and Ø ØÙ do not depend on history. We envision a future extension of the framework in which the owner and/or status of a resource may change over time, and ÓÛÒ Ö and Ø ØÙ have a history argument. The owner specifies how the resource may be used by defining the predicate Ù Ç À Ê È Ä ÓÓÐ. Here Ù Ç Ö Ô Ðµ is interpreted as given event history, principal Ô is allowed to use the resource Ö on the basis of license Ð. If Ø ØÙ Öµ ÔÙ Ð, then there are no restrictions on the use of the resource: Ô Ð Ù Ç Ö Ô Ðµ. If Ø ØÙ Öµ Ð Ò and Ù Ç Ö Ô Ðµ, then Ù Ô Ö Ðµ is possible, but constitutes a misuse of the license (see section 3). If Ø ØÙ Öµ ÔÖÓØ Ø and Ù Ç Ö Ô Ðµ, then Ù Ô Ö Ðµ is assumed to be impossible (e.g., to model cryptographic protection). There are two kinds of misuse in our model: an action forbidden by the license, and an action permitted by the license but forbidden by the resource itself. The latter is only meaningful if the resource is Ð Ò. We do not treat a failed attempt to use a protected resource without a proper license as a misuse. 3 Licenses We use a license language inspired by [GWW01,PW02] to define the permissible behavior of principals. Licenses are very important in our framework since compliance with past licenses is the basis of a principal s reputation. Each license defines i) obligations, and ii) permitted actions. A license has one each of Ù Ö Ä È, Ð Ò

Ä È (the principal to whom obligations and permissions apply), and Ù Ø Ä Ê. We do not currently model license revocation. There are several special actions associated with licenses: Ó«Ö Ðµ models offering a license, ÔØ Ô Ðµ models principal Ô accepting license Ð. Special predicate Ó Ø Ðµ Ä ÓÓÐ Ø µ Ù Ô Ö Ðµ for some Ô and Ö. Licenses are assumed to have a unique id, so that each license is offered and accepted at most once in a given history. License Ð is valid in a history if it has been offered and accepted: Ú Ð Ä Ò Ðµ ½ ¾ ¾ s.t. ½ ¾ Ø ½ µ Ó«Ö Ðµ Ø ¾ µ ÔØ Ð Ò Ðµ е If ¼, then Ú Ð Ä Ò Ðµ µ Ú Ð Ä Ò ¼ е. We define ÔØ Ò Ðµ to be the first event of the form ÔØ Ð Ò Ðµ е following the offer. Define a projection of onto events associated with some license as Ð Ú ÒØ Ðµ ÔÓ Ø ¾ Ó Ø Ðµ Ú Ð Ä Ò Ðµ Permissions and obligations. Licenses permit use of resources and entail obligations such as payments or issuance of future licenses. For example, a web hosting license may state that, if the server has accepted the license and the history contains an event in which some user paid $100 to the server, the latter is obligated to issue a license permitting the user to use the service for a month. Given a history, the set of actions permitted by a license is specified via the predicate Ô ÖÑ Ø À Ä ÓÓÐ, defined by the license issuer. When a license is used to access a resource, the access policy, as defined by Ù Ç, may check Ô ÖÑ Ø associated with the license (as in the example of section 5), or else Ô ÖÑ Ø may invoke the resource s Ù Ç to check whether a particular use is permitted or not (as in section 6). The license issuer may impose obligations on the licensee by defining the predicate Ú ÓÐ Ø À Ä ÓÓÐ. Given history, Ú ÓÐ Ø Ðµ iff does not contain fulfillment of every obligation imposed by the license. For example, if license Ð models taking a loan, Ú ÓÐ Ø Ðµ if contains a timestamp event corresponding to the repayment deadline, but does not contain a preceding repayment event. We say that a principal fulfilled the license if, up to date, he has performed all obligations specified by the license. If a principal has fulfilled the license up to date and there are no future obligations, we say that the license is completely fulfilled. ÙÐ ÐРе Ú Ð Ä Ò Ðµ Ú ÓÐ Ø Ðµ ÙÐ ÐРе ¼ ÙÐ ÐÐ ¼ е Permissions associated with a license are independent of the obligations. A license circumscribes the licensee s behavior from above (Ô ÖÑ Ø restricts the set of actions he may do) as well from from below (Ú ÓÐ Ø specifies what he must do). A license may be violated passively by not doing something (e.g., not repaying a loan), or actively misused by doing something forbidden (e.g., overdrawing a credit line), or both.

Ñ Ù Ð µ Ñ Ù Ðµ Ô ÖÑ Ø Ð µ Ø µ Ù Ô Ö Ðµ Ù Ç Ö Ô Ðµ for some Ö Ô ¾ s.t. Ñ Ù Ð µ The issuer is free to define any Ú ÓÐ Ø and Ô ÖÑ Ø he wishes. Our framework per se does not enforce any consistency checks on these predicates, so it s up to the licensee to decide whether the restrictions encoded in the license are acceptable. 4 Reputations Fulfillment and misuse provide us with a semantics for good and bad behavior. We interpret reputation of a principal as a judgment about his or her behavior made by another principal. Since such judgments are based on the judge s partial view of the event history, new evidence may cause the judgment to change. In particular, passive violations (e.g., absence of a promised payment) may be rectified by presenting the evidence (e.g., signed bank statement) that the event fulfilling the obligation has occurred. We call evidence of good behavior credit, and evidence of bad behavior demerit. There are two forms of credit: partial (all obligations to date have been fulfilled) and full (all obligations to date have been fulfilled and there will be no future obligations), and two forms of demerit: passive (absence of evidence that an obligation has been fulfilled; can be rectified by additional evidence) and active (evidence of misuse; usually cannot be rectified unless Ô ÖÑ Ø is nonmonotonic). We wish to emphasize the distinction between events (observed behavior) and judgments (a principal s evaluation of another principal s behavior). We assume that each principal has an internal logic for reasoning about good and bad behavior. Given a particular event history and license Ð, let Ð Ð Ú ÒØ Ú Û Ôµµ be the part of that is associated with license Ð and known to principal Ô. For example, Ô may use the following internal reasoning rules to derive credit and demerit judgments: ÙÐ ÐРРе Ô ÖØ Ð Ö Ø Ð Ò Ðµ е Ú ÓÐ Ø Ð Ðµ Ô Ú Ñ Ö Ø Ð Ò Ðµ е ÙÐ ÐРРе ÙÐÐ Ö Ø Ð Ò Ðµ е Ñ Ù Ð Ðµ Ø Ú Ñ Ö Ø Ð Ò Ðµ е Once a judgment is derived, the principal may announce it by performing a Ý action. This models issuing a signed statement containing the judgment, which then becomes part of its subject s reputation. Other principals may use this judgment in their own internal reasoning when deciding whether to offer a license. Our framework does not restrict how issuers policies are formulated. Below is a sample policy in which principal Ô offers a license to Ô ¼ if the reputation of Ô ¼ includes evidence of at least Ñ fulfilled licenses and no evidence of misuse. Given history, we overload Ý Ô ¼¼ µ

and use it as a shorthand for ¾ Ú Û Ôµ s.t. Ø µ Ý Ô ¼¼ µ. ØÖÙ Ø Ô Ô ½ µ ØÖÙ Ø Ô Ô Ñ µ (where Ô½ ÔÑ are not necessarily all distinct) Ý Ô ½ Ô ÖØ Ð Ö Ø Ô ¼ Ð ½ µµ Ý Ô Ñ Ô ÖØ Ð Ö Ø Ô ¼ Ð Ñ µµ (where н ÐÑ are all distinct) Ô ¼¼ s.t. ØÖÙ Ø Ô Ô ¼¼ µ Ð Ð ¼ s.t. Ð ¼ ¾ Ð ½ Ð Ñ Ý Ô ¼¼ Ø Ú Ñ Ö Ø Ô ¼ еµ Ý Ô ¼¼ Ô Ú Ñ Ö Ø Ô ¼ Ð ¼ µµ Ó«Ö Ðµ where Ù Ö Ðµ Ô Ð Ò Ðµ Ô ¼ 5 Example: Peer-to-Peer File Distribution System In this case study, we use our framework to encode a reputation policy for a peer-topeer file distribution system, roughly similar to Gnutella or Freenet [CSWH00], implemented on top of a network of anonymizers, e.g., an onion routing network [SGR97]. Consider a single file server. It consists of two resources, ÙÐ (upload) and Ð (download), where ÙÐ and Ð are unique names. Ø ØÙ Ùе ÔÙ Ð Ø Ø٠е Ð Ò Ù Ç Ð Ô Ðµ Ú Ð Ä Ò Ú Û ÓÛÒ Ö Ðµµ е Ù Ö Ðµ ÓÛÒ Ö Ðµ Ð Ò Ðµ Ô Ô ÖÑ Ø Ú Û ÓÛÒ Ö Ðµµ Ð µ where is a fresh event s.t. Ø µ Ù Ô Ð Ðµ, is extended with Informally, these axioms state that anybody can upload (since ÙÐ is a public resource), but downloads, modeled as uses of the Ð resource, are only permitted with a license issued by the server s owner. Moreover, Ù Ç checks whether, given the current event history as known to the server owner, the use is permitted by the license. A sample license for the download resource can be defined as follows: let Ô Ð Ò Ðµ ÒÍ ÓÙÒØ ¼ ¾ s.t. Ø ¼ µ Ù Ô ÙРе Ò ÓÙÒØ ¼ ¾ s.t. Ø ¼ µ Ù Ô Ð Ðµ in Ô ÖÑ Ø Ð µ Ø µ Ù Ô Ð Ðµ Ò ÒÍ Ô ¼ Ð ¼ ØÖÙ Ø Ù Ö Ðµ Ô ¼ µ Ý Ô ¼ Ô ÖØ Ð Ö Ø Ô Ð ¼ µµ Ð ¼ е Ú ÓÐ Ø Ðµ Ò ÒÍ ¾ By accepting this license, the licensee promises to upload at least once for every 2 downloads. If he fails to do this, however, he is not prevented from further downloads as long as the event history contains at least 1 upload for every 3 downloads. This means that Ô ÖÑ Ø allows some violating actions (i.e., obligations accepted by the licensee may be left unfulfilled to a limited extent). For example, if 2 uploads and 4 downloads have occurred, the 5th download will be allowed ( ¾ ), even though it s a violation of the obligation ¾ ¾), but the 6th download will not be allowed.

Also, Ô ÖÑ Ø allows unlimited downloads if the licensee has a reputation from some principal Ô ¼, trusted by the server owner, in the form of credit for compliance with another license. The licensee can thus gain access to Ð in two ways: by maintaining the proper ratio of uploads to downloads, or relying on the previously acquired reputation. Credit for compliance with the license is issued according to the following rule: ÓÙÒØ ¾ Ú Û Ù Ö Ðµµ s.t. Ø µ Ù Ð Ò Ðµ ÙРе ÙÐ ÐÐ Ú Û Ù Ö Ðµµ е Ñ Ù Ú Û Ù Ö Ðµµ е Ý Ù Ö Ðµ Ô ÖØ Ð Ö Ø Ð Ò Ðµ еµ Even though a principal with an existing reputation from a trusted source is permitted unlimited uses of the Ð resource, he cannot increase his reputation by doing so, i.e., reputation cannot be amplified by using it repeatedly. Only if the licensee complies with the license the hard way, with 1 upload for every 2 downloads and at least 5 uploads, will the license be fulfilled, and the server owner issue a new credit judgment which the licensee may then use as part of his reputation to access some other resource. We also model the scenario in which upload and download requests arrive to the file server via a chain of anonymizers. To this end, we introduce transitive trust rules for passing reputation back down the chain. Reputation is anonymized. When a user receives credit, it will not be possible to establish what was uploaded, i.e., evidence of license fulfillment cannot be linked to any particular use of the ÙÐ resource. We assume that each anonymizer has two secret internal tables, Ò Ñ ÌÖ Ò Ð Ø and Ð Ò ÌÖ Ò Ð Ø. The Ò Ñ ÌÖ Ò Ð Ø table is set up when the anonymizer chain is initialized. It contains name translations between user pseudonyms so that the user can use different names on each link of the chain, preventing an outside observer from relating requests that arrive to and leave from each anonymizer. If the user is known on the outgoing link as Ô, then Ò Ñ ÌÖ Ò Ð Ø Ô returns the user s pseudonym on the incoming link. We also assume that all anonymizers trust each other. Ô ØÖÙ Ø ÒÓÒÝÑ Þ Ö Ôµ Ý Ô Ô ÖØ Ð Ö Ø Ô ½ еµ Ð ¼ s.t. Ð Ò ÌÖ Ò Ð Ø Ð Ð ¼ Ò Ñ ÌÖ Ò Ð Ø Ô ½ Ô ¾ let Ð ¼ fresh license id in Ð Ò ÌÖ Ò Ð Ø Ð Ò ÌÖ Ò Ð Ø Ð Ð ¼ Ý ÒÓÒÝÑ Þ Ö Ô ÖØ Ð Ö Ø Ô ¾ Ð ¼ µµ If the anonymizer trusts some principal Ô, and Ô has issued credit to a user known as Ô ½ for complying with license Ð, the anonymizer first checks that he has not already issued credit for the same license (i.e., the Ð Ò ÌÖ Ò Ð Ø table does not already contain Ð). He then looks up a different pseudonym Ô ¾, under which the user is known to the preceding anonymizer in the chain, creates a fresh license id (which contains no details about the actual license for which the user received credit), and issues a credit judgment to the (pseudonymous) user for complying with the newly created license. 6 Example: Untrusted Allies We model an online role-playing game (inspired by Clan Lord [Cla]), in which characters belong to clans that are competing in a search for valuable items. One clan can

impede another by setting traps. Maps of regions that must be traversed help make the search safer and faster. A player may also be an independent agent. A clan leader wants to avoid traps and might use a strategy of trading information to discover where traps have been placed and sending scout groups to disable them. When a trap is found and successfully disabled, the scout group leader reports this to the clan leader. An independent agent wants map information to aid his own search or to trade. The agent may discover traps or learn about them by hanging out with other clans. How can the clan leader and an independent agent build trust in order to interact for mutual benefit? We abstract access to map data to a simple Ù action. The clan leader issues singleuse licenses for the clan s map in exchange for confirmed good information about traps. Accepting the license obliges the agent to provide information whether or not he accesses the map. Confirmation is in the form of the scout group leader saying that good information was received from the licensee, that is, the trap was found and disabled. The clan leader trusts the scout group leader to report receipt of good information, and for simplicity we omit consideration of bad information. We use the following notation: ( Ð ÒÄ Ö) the clan leader (Á ) the independent agent player (ËÓÙØ) the scout group leader (Å Ô) the clan s map We let range over histories, and ÅÄ over single-use licenses for Á s access to Å Ô, and posit the following axioms: ÓÛÒ Ö Å Ôµ Ð ÒÄ Ö ØÖÙ Ø Ð ÒÄ Ö ËÓÙص Ù Ö Åĵ Ð ÒÄ Ö Ù Ø Åĵ Å Ô Ð Ò Åĵ Á A license may expire after it has been accepted. We write ÜÔ Ö Ä Ò Ðµ to represent the fact that license Ð has expired in history. A single-use license expires after one use. It may also timeout. We let the action ÜÔ Ö Ä be the underlying action of a license timeout event. Then we have ÜÔ Ö Ä Ò Åĵ Ú Ð Ä Ò Åĵ ¾ µ Ø µ Ù Á Å Ô Åĵ Ø µ ÜÔ Ö Åĵµ Note that if ¼, then ÜÔ Ö Ä Ò Åĵ µ ÜÔ Ö Ä Ò ¼ Åĵ. For clan map licenses, we define Ù Ç and Ô ÖÑ Ø as follows: Ù Ç Å Ô Ô Åĵ Ú Ð Ä Ò Åĵ ÜÔ Ö Ä Ò Åĵµ Ô Ð Ò Åĵ ¾ µ Ø µ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµµ Ô ÖÑ Ø ÅÄ µ Ø µ Ù Á Å Ô Åĵ Ù Ç Å Ô Á Åĵ Recall that if Ú Ð Ä Ò Ðµ, then ÔØ Ò Ðµ is the (first) event in following the offer of Ð with action ÔØ Ð Ò Ðµ е. The Ú ÓÐ Ø property is then

defined as follows: Ú ÓÐ Ø Åĵ Ú Ð Ä Ò Åĵ ÜÔ Ö Ä Ò Åĵ ¾ µ Ø µ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµµµ Ù ¾ µ ÔØ Ò Åĵ Ù Ø Ù µ Ù Á Å Ô Åĵ ¾ µ Ù Ø µ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµµµ The above definitions allow information to be provided before the license is accepted, or even offered. A use of ÅÄ out of scope (i.e., before the acceptance event for the license) is not a violation, since it is not associated with a valid license. It is, however, a misuse. We illustrate the definitions by presenting some simple histories and their properties. We consider several cases, depending on whether the map is licensed ( Ø ØÙ Å Ôµ Ð Ò ) or protected ( Ø ØÙ Å Ôµ ÔÖÓØ Ø ). In each example we consider the history prior to and/or including expiration. We write for a history extended by the ÜÔ Ö Åĵ event. ½ Ó«Ö Åĵ ÔØ Á Åĵ ¾ Ó«Ö Åĵ ÔØ Á Åĵ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµ Ó«Ö Åĵ ÔØ Á Åĵ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµ Ù Á Å Ô Åĵ Ó«Ö Åĵ ÔØ Á Åĵ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµ Ù Á Å Ô Åĵ Ù Á Å Ô Åĵ Ó«Ö Åĵ ÔØ Á Åĵ Ù Á Å Ô Åĵ Ó«Ö Åĵ ÔØ Á Åĵ Ù Á Å Ô Åĵ Ý ËÓÙØ ÓÓ ÁÒ Ó Åĵµ, and are only possible if Å Ô is not ÔÖÓØ Ø. Ù Ç Å Ô Á Åĵ is ØÖÙ only for ¾ and Ð otherwise. Ú ÓÐ Ø Åĵ is ØÖÙ for ½,,,,,, and, and Ð otherwise. The second Ù event of and the Ù events of, and are misuses according to the policy defined by Ù Ç. For simplicity, the above scenario focuses on a setting with one clan leader, one scout group, and one independent agent. The clan map license model can be used as a starting point for modeling how the clan leader and the independent agent might build mutual [dis]trust and use this reputation-based trust to develop simple strategies for deciding when to trade information. For example, since the clan leader trusts the scout group leader to reliably report when good/bad information has been given, such reports could be used to give credit/demerits. Furthermore, if the agent violates a license agreement, the clan leader gives the agent some demerits. Conversely, the agent gives credit to the clan leader if the map data access received as part of a license agreement is accurate, and gives demerit if the clan leader fails to hold up his end of the bargain. (Examples of trust building rules are given in section 5 for a different scenario.)

Extending the axiomatization of clan map licenses to multiple clans, scout groups, and independent agents is straightforward. Pairwise trust building rules could then be extended by rules that take into account multi-party interactions, as well as relative trustworthiness of different agents. 7 Conclusion We have presented a formal model for reputation-based trust management that allows mutually distrusting agents to develop a basis for interaction even in the absence of a central credential authority. The model can be applied in the context of peer-to-peer applications, online games, or military simulation, among others. We have started with a very simple model and there are several elaborations that can be considered, including: treating temporal aspects in more detail; mechanisms for allowing reputation (good or bad) to degrade over time; and refining the rules for giving credit based on the reputation of the information source. We plan to develop a set of standard high-level policies for creating new trust judgments on the basis of reputation. Another direction of future work is to introduce economic notions such as cost-benefit ratios and their relation to reputation and trust. Acknowledgements. The authors thank the anonymous reviewers for helpful comments and Tim McCarthy for suggesting the game application. The work was supported by ONR grant N00014-01-1-0837. References [AH00] E. Adar and B. Huberman. Free riding on Gnutella. First Monday, 5(10), 2000. [BFL96] M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. IEEE Symposium on Security and Privacy, pages 164 173, 1996. [BH77] Henry G. Baker and Carl Hewitt. Laws for communicating parallel processes. In IFIP Congress, pages 987 992. IFIP, August 1977. [Cla] Clan Lord. http://www.clanlord.com/. [Cli81] W. D. Clinger. Foundations of Actor Semantics. PhD thesis, MIT, 1981. MIT Artificial Intelligence Laboratory AI-TR-633. [CSWH00] I. Clarke, O. Sandberg, B. Wiley, and T.W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proc. International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 46 66. Springer-Verlag, 2000. [GJM02] P. Golle, S. Jarecki, and I. Mironov. Cryptographic primitives enforcing communication and storage complexity. In Proc. Financial Cryptography, 2002. [GWW01] C. Gunter, S. Weeks, and A. Wright. Models and languages for digital rights. In Proc. Hawaii International Conference on Systems Sciences, 2001. [PW02] R. Pucella and V. Weissman. A logic for reasoning about digital rights. In Proc. 15th IEEE Computer Security Foundations Workshop, pages 282 294, 2002. [SGR97] P. Syverson, D. Goldschlag, and M. Reed. Anonymous connections and onion routing. In Proc. IEEE Symposium on Security and Privacy, pages 44 54, 1997.