Matrix Model of Trust Management in P2P Networks
|
|
- Jocelyn Shona Brown
- 8 years ago
- Views:
Transcription
1 Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet i P2P etworks allows to establish the trust relatioships amog the peers ad decide whether the cosidered trasactio will be realized. It tries to esure safety i the extremely usafe eviromets of P2P etworks. I this paper we focus o the formal descriptio of requiremets of trusted P2P etworks ad we propose the model which is able to measure them. Our model should be adaptable to the previously published methods ad allows to compare them. The fudametals of our model are trust matrices which record the trust relatioships betwee peers. We defie similarity betwee trust matrices for purpose of compariso of differet maagemet systems. O the basis of this similarity we propose the criterio which is able to measure successfuless of trust maagemet. Trust maagemet; P2P Networks; Reputatio; Access cotrol; I. INTRODUCTION Trustworthiess i P2P etwork is a research area that is icreasigly receivig attetio of researchers. I cotrast to a cliet-server model, the umber of peers i the etwork is rapidly chagig ad peers ofte cooperate with other peers, which they ever cooperate with them before. The trust maagemet i P2P etworks allows to establish the trust relatioships amog the peers ad decide whether the cosidered trasactio will be realized. It tries to esure safety i the extremely usafe eviromets. The malicious peers i the P2P etwork have various possibilities to subvert the system due to etwork's ope ad aoymous ature. May papers attemptig to solve buildig trusted P2P etworks have bee published i recet years with varyig degrees of success. Reputatio based methods have prove to be the most effective [1]. Nevertheless, there is a umber of differet approaches which adapt reputatio maagemet to differet P2P eviromets or threat scearios [2]. Previous researchers use the simulatio to prove the potetial beefit of their proposal. The simulatios are orieted towards the ratio of usuccessful trasactio to successful oes. I the most cases, the commuicatio overhead or respose time are also take ito accout. But the idividual simulatio models are differet ad it is ot possible to use their output for a geeral compariso of reputatio maagemet. It is difficult to compare idividual methods because there are o fixed criteria which are able to measure the efficiecy of the reputatio maagemet. We have oly a vague otio of 'trusted P2P etwork'. The reputatio maagemet methods have bee built uder the premise that this otio is well uderstood. For the compariso of differet methods, we eed to determie the criteria of the trusted P2P etwork ad be able to measure them. I this paper we focus o the formal descriptio of requiremets of trusted P2P etworks ad we propose the model for measurig them. Our model should be adaptable to the previously published methods ad allows to compare them. We do ot moitor the ratio of usuccessful to successful trasactio, but we focus o the compariso of a trust value obtaied from reputatio maagemet with true peer's behavior. The paper is orgaized as follows. Sectio 2 briefly overviews the related work. I sectio 3 we preset our model ad itroduce a simple example i sectio 4. Sectio 5 aalyses the results which come from our model. Ad sectio 6 cocludes the paper ad discusses future work. II. RELATED WORK The problem of belief i the P2P etworks has bee itesively studied. The situatio whe oe peer must cooperate with a totally ukow parter imposes may challeges ad ot all have bee solved yet. Sharig experiece amog peers is a coveiet way to esure at least some trustworthiess amog the peers. This system is called reputatio-based trust maagemet. The opposite approach is policy-based trust maagemet which relies o mechaisms such as siged certificates ad trusted certificatio authorities. Ufortuately, such mechaisms is ot applicable i all P2P etwork hece the reputatio-based approach is widely used. Wheever we will talk about trust maagemet i this paper we will have reputatio-based trust maagemet i mid. May reputatio systems with various ideas ad targeted issues have bee published i recet years. Some of them use some kid of cetral etity, like the System TrustMe [3] which eed a bootstrap server or [4] usig a cetral reputatio computatio aget. O the other had, most reputatio systems calculate reputatio i a fully distributed maer [5], [6], [7] ad [8]. There are a wide area of approaches used i reputatio systems, some of them use algorithm similar to pagerak [5],
2 [9] others use fuzzy logic [10], [11], [12], game-theoretic model [13], [14] or ecological etwork [15]. This work does ot focus o a particular trust maagemet system or a particular aproach, but tries to create a model which allows to compare differet systems. Some attempts to compare them have bee made i previous work. Trust maagemet systems i the P2P etworks based o Distributed Hash Tables are aalyzed i [16]. The criteria used for the aalysis are related to a techical backgroud, like Possibility to weight recommedatios or Resposibility for the behavior of recommeded etities. The taxoomy which orgaized existig ideas ad threats i peer-to-peer trust maagemet is preseted i [17] ad the latest results i the area of trusted P2P etworks are criticized i [18]. But objective criteria to compare trust maagemet systems still missig. Curretly, we are ot able to compare differet trust maagemet systems accordig the criteria which express success i the trust maagemet tasks. The attempts to formalize trust ad reasoig about trust have bee made i a vector model [19]. This model use three parameters that cotribute towards defiig trust relatioships: experiece, kowledge ad recommedatio. It also defies a operatio o a trust vector which allows to determie the relative trustworthiess of two trustees. This model is exteded i [20] for esurig privacy. The other approach [21] tries to create a automated verificatio framework for security protocol based o a trust maagemet. It uses the same machiery applied for the formal verificatio of a security protocol. Aother formalism to model the trust gaiig process is based o the temporal logic [22] or the subjective logic [23]. III. MODEL DESCRIPTION A. Basic Defiitio For purpose of the reputatio maagemet we will cosider the P2P etwork as a commuity of odes which provide services for each other. The quality of provided services o various peers ca be diametrically differet ad also the quality of differet services o oe peer ca be differet. Our model must be able to describe differet aspects of peer behavior. First, we eed to have a cotext which the reputatio maagemet lives i. Defiitio 1: Let be the list of all services provided i the P2P etwork. We ca refer to a sigle service as i, where i desigates its positio i the list. Defiitio 2: Let A be the list of all aspects of service behavior which ca be moitored i the P2P etwork. We ca refer to a sigle aspect as a j, where j desigates its positio i the list A. Defiitio 3: The cotext C determies the services ad their aspects which are moitored i P2P etwork. It is a list of pairs ( i,a j), where i ad a j A. We ca refer to a sigle pair as c l, where l desigates its positio i the list C. The idea of services ad aspects gives us a flexible way to deal with the complexity of peer behavior. We are able to disassemble peer behavior to idividual properties ad trace trust for each of them separately. For example, the services ca be share computatio capacity, share files or provide some kid of iformatio. The aspects ca describe peer behavior as a service provider, as a service cosumer or as a feedback source. For example, the provider's aspects ca be: task is computed correctly, task is computed i time, shared files are ot ifected by viruses, ad provided iformatio are truth. The cosumer's aspects ca be: all required tasks are collected, private files are ot distributed to others or requests are distributed uiformly. If we talk about behavior of a feedback source, we ca use the aspect: provided feedbacks are true. The cotext coects services ad aspects. Obviously, a idividual aspect makes sese oly with some services. We illustrate this cocept by a example o the P2P etwork for distributed computig. The peers i this etwork are able to accept tasks from others, compute them ad retur the results to the submitters. The submitters collect the result, if they do ot, the result is discarded. The cotext would be: = ('share computatio capacity') A = ('task is computed correctly', 'task is computed i time', 'all required tasks are collected', 'provided feedbacks are true') C = ((s 1,a 1),(s 1,a 2),(s 1,a 3),(s 1,a 4)) For example, a iterpretatio of the property c 4 is 'provided feedback about share computatio capacity is true'. The ext step is to defie trust relatioship. The trust relatioship betwee a truster (a etity that trusts the other etity) ad a trustee (a etity that is trusted) is a basic cocept i trust maagemet. I our model, we keep trust relatioship for each property separately. This facilitates more detailed access cotrol ad represets the relatios amog trusts of idividual properties. We record the curret trust relatioship i a form of matrices, oe matrix for each property. Defiitio 4: The trust matrix i of dimesio x represets the trust relatioships for the property c i i the P2P etwork with peers. More precisely, the cell i(a,b) represets the trust relatioship of the peer a to the peer b i the property c i. The value of a trust relatioship is a real umber i the rage [-1,1]. The iterpretatio is as follows: If the value is 1, the peer is sure that the remote peer satisfies the property. If the value is -1, the peer is sure that the remote peer does ot satisfy the property. If the value is 0, the peer caot decide whether the remote peer satisfies the property or ot. It is also possible choose the rage [0,1] with eutral value 0.5. Both variats are equivalet, but we choose the rage
3 [-1,1] because the iterpretatio is more atural. The egative values meas distrust ad coversely the positive values meas trust. The exact iterpretatio of other values ca deped o a idividual property. Geerally, the distace from zero ca be uderstood as a degree of certaity. Trust relatioships chage over time depedig o executed trasactios ad their outcomes. Hece, the trust matrices also chage. I our model, we wat to record trust relatioships i time t j, where j {0,1,2,...}. The time slot T j is a iterval [t j-1,t j] for j > 0. The otio j represets all trust matrices i time t j (that is at the ed of the time slot T j). The matrices 0 represet a iitial state. B. Modificatio of trust relatioships A sigle trasactio always ivolves two peers, source ad destiatio. The source is a peer, which cosumes a service (also cosumer), ad destiatio is a peer, which provides a service (also provider). It is a differet otatio tha truster ad trustee itroduced i sectio III.A. The otatio truster ad trustee is take from trust relatioship's poit of view ad the source ad destiatio from trasactio's poit of view. We study how a give trasactio iflueces a trust matrix i this sectio. Defiitio 5: Modificatio vector = (a,b,v 1,...,v m,w 1,..., w m) of dimesio 2m+2, m = C, describes the chages of trust relatioship betwee the truster a ad the trustee b. The values v i for i from 1 to m are real umbers betwee [-1,1] ad declare how much the trust relatioship will be chaged. The values w i are real o-egative umbers ad represets the weight of v i. Defiitio 6: The modificatio vectors a ' are compatible whe = (a,b,...) ad ' = (a,b,...). Hece, they describe trust relatioships betwee the same peers. Defiitio 7: The compositio operatio composes two compatible vectors ad '. The resultig vector is i the form: = a, b, v 1, v 2,.. v m, w 1, w 2,.., w m Where: v i = v i w i v ' i w ' i w i w ' i w i =w i w ' i This operatio is commutative, associative ad a result of composig two modificatio vectors is also a modificatio vector compatible with the operads. The fudametal of this operatio is a weighted average. The ifluece of a sigle trasactio o trust matrices ca be expressed by modificatio vectors. Cumulative effects of all trasactios i a specific time slot ca be expressed by compositio of modificatio vectors origiated from them. C. Access cotrol Oe of the crucial fuctios of trust maagemet is to establish rules decidig which trasactios are allowed. Those rules are based o trust relatioships ad ca be differet for each type of trasactio. I our model, the iput for access cotrol compoet is a trasactio request. Defiitio 8: The trasactio request q cotais four compoets: the specificatio of a trasactio type, the set S of source peers, the set D of possible destiatio peers ad a variable umber of parameters depeded o the trasactio type. A sigle trasactio request ca be composed ito S * D trasactios ad each trasactio ca produce several modificatio vectors. The objective of the access cotrol compoet is to pick up the allowed trasactios ad prepare the modificatio vectors for each trasactio. The trasactio costraits take ito accout the source rules ad the destiatio rules. The source rules limit the possible destiatios for a give source ad the destiatio rules limit the possible sources for a give destiatio. Defiitio 9: The source rule is a formula srule(s,d) that retur true if ad oly if the give trasactio ca be performed betwee peers s ad d. These rules are a part of trasactio specificatio. The destiatio rule drule(d,s) is defied aalogously. I a real etwork, the source rule srule(s,d) is evaluated o the source peer, hece i our model the source rule ca be calculated oly with the rows (s,_) i trust matrices. Likewise, the destiatio rule ca be calculated oly with the rows (d,_) i trust matrices. If oe source or destiatio rules for a give type of trasactio are defied we suppose that all trasactios of this type are allowed. Although, for each type of trasactio at least oe source rule should be defied otherwise the trust maagemet has o effect. Additioally, we allow more source rules to give the source more optios to choose a proper destiatio. The several source rules allows a peer to defie a softer restrictio i case the previous restrictio was too restricted ad smooth out all possible destiatios. We limit the destiatio rules to oe. The destiatio ca oly accept or refuse the request from a give source. We preset a simple algorithm for determiig the allowed trasactio. The source rules are distiguished by a differet priority, the rule with the highest priority is desigated as srule 0 (s,d). Let C r is a umber of defied source rules. For each s i S is created the set D i cotais the peers which are grated i the trasactio with s i. The procedure for determiig D i is as follows: D i = j=0 while D i = j C r do D i ={d D i ; srule j s i, d drule d, s i } j doe The trasactio is performed betwee peer s i ad every peers b, such that b D i.
4 The ext task is a preparatio of modificatio vectors. Each trasactio type has modificatio templates which desigate truster, trustee ad weights. The values v i are obtaied by aother compoet ad will be icluded ito a modificatio vector later. The modificatio template together with the values v i creates a modificatio vector. We clarify this sectio i two examples. We use the same cotext as i the sectio III.A. ad describe two possible trasactios types i the etwork. The first trasactio type is calculate a task ad secod retur a feedback. For each of them we defie access rules ad modificatio vectors. The source rules for the first trasactio ca be: srule 0 s, d = 1 s, d s,d 0 srule 1 s, d = 1 s, d 0 2 s, d 0 srule 2 s, d = 1 s, d 0.1 The destiatio rule ca be: drule d, s = 3 d, s 0 The srule 0 has the highest priority. This rule chooses the best peers available for this trasactio. If oe of this peer is available due to destiatio rules o the remote side, the peer tries the rule with the secod highest priority srule 1. If this rule does ot retur ay usable peers, the peer tries the last desperate rule, which makes possible that the result will be icorrect. The destiatio rule limits sources to the peers which probably collect results, hece the cosumed work will ot be useless. The modificatio template for this trasactio ca be: 1 = s, d,,,,,1,1,0,0 2 = d, s,,,,,0,0,1,0 The first template describes the modificatio of trust relatioship from s to d. We ca see that it modifies oly properties c 1 ad c 2, other properties have weight 0. Similarly, the secod template modifies oly property c 3 of trust relatioships from d to s. The primary modificatio vectors (vectors origiated from trasactios) should have weights i the rage [-1,1]. Provided that the values v i (the evaluatio) are also i the rage [-1,1], the trust relatioships remai i the iterval [-1,1]. I the secod trasactio the peer s requires a feedback o the peer r from the peer d. The peer r is icluded ito the optioal parameters i the trasactio request. The source rules for this trasactio ca be: srule 1 s, d = 4 s, d 0.5 srule 2 s, d = 4 s, d 0 The destiatio rule is: drule d, s = true The modificatio templates ca be: 1 = s, d,,,,,0,0,0,1 2 = s, r,,,,, 4 s,d, 4 s, d, 4 s, d,0 The first template modifies the trust relatioship towards to a feedback source. It evaluates the trasactio itself. The secod vector icorporates the gaied data ito the trust relatioships. The weights of those data are trust values i the property c 4. The proper choice of access rules ad modificatio templates is crucial for effectiveess of whole system. We discuss system efficiecy i sectio V. D. Iteral trasactios The modificatio vectors which we describe i the above sectios do ot take ito accout the values of the previous trust relatioships. Each modificatio vector belogs to the trasactio which passes through the access cotrol. But the trust relatioships chage over time eve if there are o trasactios at all. We itroduce the otio of a iteral trasactio which is proceeded i each time slot ad for each pair of peers. The iteral trasactios provide a historical cotiuum of trust relatioships. The geeral tedecy is to attach greater importace to recet experiece tha the evets i the past. The iteral trasactios allow us to model such behavior. The same way as regular trasactios, the iteral trasactios are described by the modificatio templates. But i this case, the template determies all items icludig the values v i. Geerally, oly oe modificatio template is eeded, but we ca defie more of them. We discuss oe model of iteral trasactios which provides a historical cotiuum of trust relatioships. Eve if there are o trasactios i this time slot, the trust relatioship will chage. No trasactio meas that we lose certaity about peer's behavior, hece the value of trust relatioship approaches to ull. We also use the iformatio from the past to alter curret trust relatioship. Let suppose that we are i the time slot T j, the matrices j-1 represet trust relatioships from the previous time slot T j-1. The modificatio template for a iteral operatio betwee peers s ad d has a format: 1 = s, d, 1 j 1 s, d r 1,.., m j 1 s, d r m, w 1,.., w m This modificatio vector uses trust values from oe previous time slot adjusted by multiplicatio coefficiets r 1, r 2,.., r m i the rage [0,1] which idicate how much of previous trust i the property c i we use i ext time slot. The values w i's represet the weights of past experieces. Optioally, we ca use iformatio from more time slots. This modificatio template use iformatio from k previous time slots: 2 = s, d, v 1,..v m, w 1,.., w m Where: k v i = R i l j l i s, d l=1
5 The multiplicatio vector R i of dimesio k represets the weights of past time slots i the property c i. To illustrate our cocept we use the followig example. We are i the time slot T j ad wat to compute the value v i of the iteral modificatio vector. We use the iformatio from four past time slots (k = 4) ad multiplicatio vector R i = (0.65, 0.17, 0.11, 0.01). The trust relatioships for property c i i the four previous time slots were (0.4, 0.2, 0.3, 0.5). The figure 1 illustrates the situatio. The computed value v i which will be used i the time slot T j is There are two reasoable rules for the multiplicatio vector R: R j > R j+1 for all j = 1 to k-1. This ca be iterpreted as: the ewer iformatio has greater weight tha older oe. R j < 1. This ca be iterpreted as: If there are ay other trasactios, the trust relatioships approach to ull. Figure 1. Example usage of iteral modificatio vectors We demostrated oe possibility to achieve a historical cotiuum i our trust model. But the desig of a iteral trasactio allows us to use a arbitrary model. E. Evaluatio of trasactio The ifluece of each trasactio o the trust relatioship is described by the modificatio vectors defied i sectio III.B. The defiitio of the trasactio cotais the templates of this vector. The templates desigate which peer will be a truster ad a trustee ad the weights (values w i). But the values v i deped o the behavior of the peers which participate o the particular trasactio executio ad must be calculated for each executio separately. I this sectio we focus o the modelig of peer behavior ad calculatio of the values v i. I the trust matrix model we distiguish peers accordig to its ature. There are two basic types of peers: completely hoest peers ad completely dishoest peers. The completely hoest peers always cooperate as a remote peer expects. The completely dishoest peers behave upredictable i all trasactios. The trust maagemet usually deals with completely dishoest peers easily. But there ca be a lot of peer types betwee those two extreme cases. For example, the peer behaves correctly ad icreases its reputatio. Whe it achieves a high reputatio, it starts to cause damage. This behavior is usually called treaso [17]. Aother commo problem is spreadig a false feedback [24]. Geerally, the malicious peers ca cooperate with each other ad implemet a very complicated algorithm to circumvet trust maagemet. The experieces idicate that such type of peers cause most of the problems [25]. The trust matrix model assumes that each peer type has its ow model which describes peer behavior as a participat i a trasactio. The peer model is a otrivial programmig compoet which is able to describe the complexity of the peer behavior. Each peer is associated with oe peer model. The objective of the peer model is to calculate the values v i for the trasactios which are iitiated by the peer which belogs to this peer model. The values v i ca express the evaluatio of the trasactio from oe participat's poit of view or the recommedatio o a remote peer. The peer models are resposible for all values which are used for alterig trust relatioships. They separate peer behavior from trust maagemet model ad allow to simulate differet peer behavior. The iterface betwee peer model ad trust maagemet represets the modificatio templates ad modificatio vectors. F. Trust Model At this momet, we have all prerequisites for costructio the matrix model. As we metioed above, the time axis is divided ito the time slots. We have a set of users' requests assiged to the time slots. Those users' requests do ot correspod exactly with the trasactios i the P2P etwork. For example, the user request dowload specific data ca lead ito several trasactios: fid a peer which maitai data, get refereces to a give peer ad trasfer data from a chose peer. Each of them ca be ispected by the access cotrol compoet ad each of them iflueces the trust matrices. Additioally, sometimes is ecessary to schedule two trasactios ito differet time slots because they are ot idepedet. For example, the result of trasactio get refereces to a give peer affects the decisio i the access compoet for the trasactio trasfer data from a chose peer. Hece, the oe user request ca occupy several time slots. I the matrix model we itroduce the compoet called trasactio preparatio which trasforms users' requests ito trasactio requests. The method of this trasformatio depeds o both the P2P layer ad maagemet system. The matrix model works i iteratios. Each iteratio step takes all trasactio requests belogig to the curret time slot ad trust matrices from the previous time slots ad produces ew trust matrices. Cosequetly, the trasactios which belog to oe time slot are executed cocurretly. It meas that their legitimacy is judged accordig to the same trust matrices ad their effects are projected ito the same trust matrices. We describe the iteratio step i more detail. The user requests are trasformed ito trasactio requests i the trasactio preparatio compoets. These requests are passed ito the access cotrol compoet which choose grated trasactios ad costruct modificatio templates. These templates are completed accordig the peer models (sectio III.E.). The iteral trasactios are also executed i each step. The modificatio vectors from iteral trasactios are merged with the vectors obtaied from the access cotrol compoet.
6 Next, all compatible vectors are composed accordig the compositio operatio. The vectors which origiated from the compositio operatio desigates a ew trust matrix i this way: the value v i of modificatio vector (a,b,v 1,..,v m,w 1,..,w m) correspods to value Φ j i (a,b). Because the iteral trasactio is executed for each pair of peers i the etwork, we have a modificatio vector for each pair of peers ad all cells i a ew trust matrix are defied. The complete schema of proposed matrix model is illustrated i the figure 2. service s 1. If we wat to moitor aother service, we must defie a additioal property. It is also possible to defie a separate service for referece passig ad moitorig differet aspects of this service. We defie two types of trasactios: dowload iformatio about a stock ad dowload iformatio about a peer. We defie the access cotrol rules ad the modificatio templates for each type. Dowload iformatio about a stock : The possible aswers ca be a umerical expressio of the stock price or ukow. We suppose that the request is always directed to the peer which claims that it has required data. Hece, the aswer ukow ca be cosidered as a violatio of property c 2. We use followig modificatio templates ad access cotrol rules: The modificatio template: 1 = s, d,,,,1,1,0 The access cotrol rules: srule 1 s,d = 1 j 1 s, d 0.5 srule 2 s,d = 1 j 1 s, d 0 2 j 1 s, d 0 drule s, d = 2 j 1 d, s 0 The detailed explaatio of the access rule is described i a sectio III.C. The modificatio template directly icorporates the trasactio outcome ito trust relatioship i the properties c 1 ad c 2. Dowload iformatio about a peer : The destiatio's opiio o aother peer r is icluded i the aswer. The source icludes this opiio ito the ow trust relatioships towards the peer r. The source also modifies the trust relatioship i the property c 3 to destiatio. The modificatio templates are: 1 s, d,,,,0,0,1 IV. EXAMPLE USAGE I this sectio we describe a complete example usage of our model. Let imagie the P2P etwork for sharig iformatio about stock prices. Some peers have a direct access to some stock exchages ad aouce this fact to the etwork. Others oly retrasmit the iformatio. There are also peers which spread false data or do ot retrasmit obtaied data. We wat to restrict those peers. The cotext describig this situatio ca be: = 'share iformatio about a stock'. A = 'provided iformatio are correct', 'all aouced data are shared', 'provided feedbacks are true'. C = (s 1,a 1),(s 1,a 2),(s 1,a 3). Figure 2. Trust model schema We otice that the process of obtaiig refereces is a part of service s 1. We expect that the refereces are oly about the 2 s, r,,, The access cotrol rules:, 3 j 1 s, d, 3 j 1 s, d, 3 j 1 s, d srule 1 s,d = 3 j 1 s, d 0.6 srule 2 s,d = 3 j 1 s, d 0 drule 1 s, d = true We eed to establish a iteral trasactio to complete our model. We use simple time history with oly oe past time slot. The modificatio template is: 1 = s, d, 1 j 1 s, d 0.8, 2 j 1 s, d, 3 j 1 s, d 0.9,1,1,1 We ca see that the trust i property c 1 decreases faster tha i property c 3 ad the trust i property c 2 does ot decrease i time. I this example, we choose the weight 1 or 0 for all properties except the processig of refereces. But the proper desig of weights is importat for correct fuctio of the whole system. It is possible to chage weight dyamically based o the actual etwork coditios.
7 We fiish this sectio by demostratio of the processig of oe time slot T j. Let suppose that there are two operatios i this time slot. The first, the peer a requests iformatio about some stock from the peer b. This trasactio is evaluated as (v 1,v 2,0). The value i the property c 3 is 0 because this trasactio does ot give the iformatio about peer's behavior i the property c 3. The secod, the peer a requests iformatio about the peer b from the peer p. The peer p returs referece (r 1,r 2,r 3). The evaluatio of this trasactio will be cosidered i the ext time slot, this is a reaso why we do ot reflect it i this calculatio. The trust relatioships betwee peers a ad b after compositio of all modificatio vectors are: j 1 a, b = 0.8 j 1 1 a, b v 1 j 1 3 a, p r j 1 3 a, p j 2 a, b = j 1 2 a, b v 2 j 1 3 a, p r j 1 3 a, p j 3 a, b = 0.9 j 1 3 a, b j 1 3 a, p r 3 1 j 1 3 a, p The relatioships betwee peers s ad d, differet from a ad b, are chaged oly by the iteral trasactios: 1 j s, d =0.8 1 j 1 s, d 2 j s, d = 2 j 1 s, d 3 j s, d =0.9 3 j 1 s, d This simple example demostrates the possibilities of our model. The model desig is uiversal eough to describe may strategies used i the trust maagemet ad be implemeted i may differet etwork scearios. V. OUTPUT INTERPRETATION The output of our model is a set of trust matrices j, for each property oe trust matrix. The row i j a describe trust relatioships from the peer a to all other peers i the etwork i the time t j ad i the property c i. We defie several operatios over trust matrices which should help us to decide whether the trust maagemet is effective. A. Trust matrix similarity We wat to achieve a state whe the trust relatioships match the true peer behavior. At first, we defie a operatio which allows us to compare two trust matrices. We use this operatio for comparig trust matrices from two differet trust maagemet systems with the same set of trasactio requests ad the same evaluatio compoet. We use a cosie similarity to measure differece betwee two vectors: cos a, b = a b a b Defiitio 10: Let j i ad j i be trust matrices from two differet trust maagemets i the time t j, ad i the property c i. The otatio j i(k) expresses the k'th row i the matrix j i. The similarity vector i property c i is defied as follows: si m i i j, i j = cos i j 1, i j 1,.., cos i j, i j The l'th compoet of this vector represets the similarity of two trust maagemets from the peer l's poit of view. If the l'th compoet is 1, the effect of both trust maagemets for the peer l is idistiguishable. The value -1 implies that these trust maagemets give the peer l the opposite result. Geerally, the egatives values idicate dissimilarity, positive values idicate similarity ad the value 0 idicates idepedece. This vector ca be calculated for each property which is i both systems. Hece, we are able to partially compare two trust maagemets with overlappig property sets. We aggregate this vector ito a sigle value by comparig it with the vector of 1. Defiitio 11: The similarity value i the property c i betwee j i ad j i is defied as follows: i i j, i j =cos sim i i j, i j, 1 This value reflects the similarity of trust maagemets from all peers' poit of view with the same iterpretatio as oe compoet of the similarity vector. Now we are able to compare the output of two differet trust maagemet systems. But we eed to be able to decide which system is better. For purpose of this we defie trust matrices which represet the ideal trust maagemet system. I such system the trust relatioships are established accordig the true peer characteristic. Defiitio 12: The behavior matrix i of dimesio x represets the peer characteristic i the property c i. The cell i(a,b) represets behavior of peer a to peer b i the property c i. The peer behavior is expressed by a real umber i the rage [-1,1]. The iterpretatio is similar to trust matrix, the oly differece is that the trust matrix reflects the expected behavior resulted from the trust maagemet ad the behavior matrix reflects the true peer's ature. There three most importat values are give: 1: The peer a behaves always hoest to peer b. -1: The peer a behaves always dishoest to peer b. 0: There are o iteractios betwee peer a ad b. Because the peer behavior ca be variable i the time, we use otatio i j to express the behavior matrix i the time slot T j. We ca calculate the accuracy of trust maagemet for property c i i the time t j as the similarity value betwee the trust matrix i j ad the behavior matrix i j: i j = i i j, i j The perfect trust maagemet system has this value 1. These values ca be cosidered as oe criterio of successfuless of trust maagemet system.
8 The matrix similarity ca be also used i a sigle trust maagemet to compare matrices from differet time slots. This makes us possible to measure chages i the trust relatioships caused by a sequece of trasactios. B. Trust ad distrust I this sectio we focus o the trust matrix itself. We defie several operatios with a trust matrix which ivestigate trust relatioships from peer poit of view. We are iterested i the amout of trust which the etwork reposes i the peer ad which idividual peers repose i the etwork. I the followig text the p j deotes the j-th peer i the etwork. Defiitio 13: The trust i the property c l which the etwork reposes i the peer a is deoted as TP l(a) ad defied as follows: TP l a = j=1 max l p j, a,0 The TP meas 'trust from the etwork to the peer'. We take ito accout oly positive trust relatioships which represet expected hoest behavior. We ca defie the distrust i the similar way. Defiitio 14: The distrust i the property c l which the etwork reposes i the peer a is deoted as DP l(a) ad defied as follows: DP l a = j=1 mi l p j, a,0 Those values give us a idea of total trust or distrust of oe peer i the etwork. They ca be used for ratig of malicious techiques. If the malicious peers get a high TP value, the trust maagemet failed to stop them. O the cotrary, if the malicious peers get a high DP value, it implies that the trust maagemet succeeds i avoidig their malicious behavior. We otice that for all peers ad all properties it holds TP l(a) + DP l(a) 1. So far we defied trust ad distrust i idividual properties, ow we aggregate these values for the whole peer. We eed a weight vector W=(W 1,..,W C ), which determies the importace of idividual properties. This vector must satisfy the coditio: C W l =1 l=1 The value W l determies the weight of the property c l. Defiitio 15: The trust which the etwork reposes i the peer a is deoted as TP(a) ad defied as follows: C TP a = W l tp l a l=1 Defiitio 16: The distrust which the etwork reposes i the peer a is deoted as DP(a) ad defied as follows: C DP a = W l dp l a l=1 Those two values idicate how the peer persuaded the etwork eighbors of its trustworthiess. The higher TP value meas more trustful peer. We ca also defie those values i a reverse order. Defiitio 17: The trust i the property c l which the peer a reposes i the etwork is deoted as TN l(a) ad defied as follows: TN l a = j=1 max l a, p j,0 Defiitio 18: The distrust i the property c l which the peer a reposes i the etwork is deoted as DN l(a) ad defied as follows: DN l a = j=1 mi l a, p j,0 The TN meas 'trust from peer to etwork' ad DN is 'distrust from peer to etwork'. The values TN(a) a DN(a) are defied aalogously to defiitio 15 respective 16 usig the same weight vector W. These values idicate how the peer believes i the services provided by the etwork eighbors, how trustful is the etwork eviromet from sigle peer's poit of view. The higher TN value meas the higher opportuity to get required service. C. Globality There are other criteria of the trust matrix which are ot directly related with the trust relatioships betwee peers but describe characteristics of the whole trust maagemet. We ca ivestigate how the trust relatioships to the same trustee differ o various trusters. I the best sceario, all these trust relatioships are equal because the peer trustworthiess is absolute. Defiitio 19: The globality of the trust relatioship from the peer a to the peer b i the property c l expresses the differece betwee this trust relatioship ad all trust relatioships i the etwork where the trustee is the peer b. It is expressed by the formula: g l a, b =1 l p j, b l a, b j=1 2 1 If the value g l is 1, the trust relatioship is global i the property c l. It meas that all peers i the etwork have the same trust i the peer b as the peer a. I the matrix terms, all cells i the trust matrix i the colum b are equal. How the value g l
9 decreases, the differece betwee trusts grows. If the value g l is 0, the peer a has a opposite trust relatioship to the peer b tha other peers. This value ca give us a basic idea of the correctess of the trust relatioship. If more peers share the same or similar opiio about a remote peer, it is more likely that this opiio is correct. We ca also defie the globality value for all trust relatioships i the give property. Defiitio 20: The globality of the trust relatioships i the property c l is expressed by the formula: G l =1 1 2 k=1 i=1 j=i 1 l p i, p k l p j, p k 3 If the value G l is 1, the trust maagemet is global i the property c l. It meas that all trust relatioships with the same trustee have the same trust value. I the other words, all peers i the etwork agree o the trustworthiess of the sigle peer. I the matrix terms, the values i the matrix colums are equal. If we suppose that the idetical trustworthiess is based o the same iformatio, the globality gives us a idea about spreadig iformatio i the etwork. The high globality value meas that the iformatio about a sigle trasactio is projected oto the trust relatioships betwee may peers. The global trust maagemet meas that iformatio about all trasactio is distributed to all peers. I the distributed eviromet it is difficult to create global trust maagemet because spreadig iformatio about each trasactio to the all peers fast eough is impossible without excessive traffic. The cetralized trust maagemet is aturally global. All iformatio is stored i oe cetral poit which is resposible for calculatio ad distributio the trust relatioships. VI. CONCLUSION AND FUTURE WORK We have proposed the model of trust maagemet which is adaptable to the previously published methods ad allow us to compare them. The fudametals of our model are trust matrices which record the trust relatioships betwee peers i a specific time. Every chage i those matrices is expressed by a special vector. This vector covers all possible ways how the trust matrix ca be modified: the trasactios outcomes, the recommedatios obtaied from other peers, ad the spotaeous chages caused by time. The cocept of modificatio vectors allows to ivestigate the ifluece of oe trasactio o trust betwee peers. We also separate trust ito properties, each property relates to some aspect of peer behavior. We are able to trace each aspect separately ad examie peer behavior i more detail. The multidimesioal trust is able to better capture the complexity of peer behavior. The trust matrix model allows to defie access rules which work with idividual aspects ad improves the system robustess. The proposed criteria are defied separately for each property hece we are able to judge the effectiveess of the system i each property ad detect the weak poit more easily. Last but ot least we are able to study depedecies betwee properties. We defie the similarity betwee trust matrices. We ca compare trust matrices from differet trust maagemets or the trust matrix from oe trust maagemet ad the trust matrix which describe true pear behavior. The similarity value expresses the ratio of similarity betwee matrices. This value allows to compare the result of two trust maagemets i a term of success i buildig trust relatioships. We also defie the trust, distrust, ad the globality value which should help us better uderstad the processes i the reputatio maagemet. A lot of work remais to be doe. So far we focus oly o the trust maagemet itself. As a result of sectio III.F., there are two other compoets which we are ot able to model yet. The trasactio requests ad their assigmet to the time slots represet users' behavior, i.e. users' requests o services i the etwork. These requests desigate which trasactios will be executed ad ifluece the amout of iformatio available to the trust maagemet. The process of decidig which peer will be asked for recommedatio is also part of this compoet. Hece the schedule of trasactio requests has a great ifluece o the resultig trust matrices ad eed to be described i more detail. Additioally, the proposed matrix model eed to be validated with series of experimets which allow to asses that the proposal is valid ad computable i a reasoable time. I our future work we focus o the previously published reputatio techiques ad measure some characteristic defied i this work. We also cocetrate o the kow malicious techiques ad ivestigate the resistace of the various reputatio techiques to these threats. With the aid of the matrix model we create a survey of most used techiques ad most frequet malicious behavior. This survey should be a iitial poit for creatig the ow trust maagemet. REFERENCES [1] X. Boaire, ad E. Rosas, A Critical Aalysis of Latest Advaces i Buildig Trusted P2P Networks Usig Reputatio Systems, LNCS: Web Iformatio Systems Egieerig WISE 2007 Workshops, Vol. 4832/2007, pp , 2007 [2] K. Aberer, Z. Despotovic, W. Galuba, ad W. Kellerer, The Complex Facets of Reputatio ad Trust, Computatioal Itelligece, Theory ad Applicatios, Part 10, Spriger Berli Heidelberg, pp , 2006 [3] A. Sigh, ad L. Liu, TrustMe: Aoymous maagemet of trust relatioships i decetralized P2P systems, I IEEE Itl. Cof. o Peerto-Peer Computig, pp , 2003 [4] M. Gupta, P. Judge, ad M. Ammar, A reputatio system for peer-topeer etworks, I Proceedigs of the 13th iteratioal workshop o Network ad operatig systems support for digital audio ad video, pp , 2003 [5] S. D. Kamvar, M. T. Schlosser, ad H. Garcia-molia, The EigeTrust Algorithm for Reputatio Maagemet i P2P Networks, I Proceedigs of the Twelfth Iteratioal World Wide Web Coferece, pp , 2003, ACM Press [6] L. Xiog, ad L. Liu, PeerTrust: supportig reputatio-based trust for peer-to-peer electroic commuities, IEEE Trasactios o Kowledge ad Data Egieerig, Vol. 16, pp , 2004
10 [7] X. Liu, ad L. Xiao, hirep: Hierarchical Reputatio Maagemet for Peer-to-Peer Systems, Proceedigs of the 2006 Iteratioal Coferece o Parallel Processig, pp , 2006 [8] J. Gerard, H. Cai, ad J. Wag, Alliatrust: A Trustable Reputatio Maagemet Scheme for Ustructured P2P Systems, LNCS: Advaces i Grid ad Pervasive Computig, Vol. 3947/2006 pp , 2006 [9] A. Cheg, ad E. Friedma, Maipulability of PageRak uder Sybil strategies, I First Workshop o the Ecoomics of Networked Systems (NetEco06), 2006 [10] R. Arighieri, E. Damiai, S. D. C. D. Vimercati, S. Paraboschi, ad P. Samarati, Fuzzy techiques for trust ad reputatio maagemet i aoymous peer-to-peer systems, J. Am. Soc. If. Sci. Techol., vol. 57, pp , February 2006 [11] S. Sog, K. Hwag, R. Zhou, ad Y.-K. Kwok, Trusted P2P trasactios with fuzzy reputatio aggregatio, Iteret Computig, IEEE, vol. 9, pp , Nov.-Dec [12] H. Che, ad Z. Ye, Research of P2P Trust based o Fuzzy Decisiomakig, I 12th Iteratioal Coferece o Computer Supported Cooperative Work i Desig, pp , [13] R. Morselli, J. Katz, ad B. Bhattacharjee, A game-theoretic framework for aalyzig trust-iferece protocols, i Secod Workshop o the Ecoomics of Peer-to-Peer Systems, [14] M. Harish, N. Aadavelu, N. Abalaga, G. S. Mahalakshmi ad T. V. Geetha, Desig ad Aalysis of a Game Theoretic Model for P2P Trust Maagemet, LNCS: Distributed Computig ad Iteret Techology, Vol. 4882/2007, pp , 2007 [15] F. Liu, ad Y. Dig, Ecological Network-Ispired Trust Maagemet Model of P2P Networks, Secod Workshop o Digital Media ad its Applicatio i Museum & Heritages, pp , 2007 [16] N. Fedotova, M. Bertuci, ad L. Veltri, Reputatio Maagemet Techiques i DHT-based Peer-to-Peer Networks, Proceedigs of the Secod Iteratioal Coferece o Iteret ad Web Applicatios ad Services, pp. 4, 2007 [17] S. Marti, ad H. Garcia-molia, Taxoomy of trust: Categorizig p2p reputatio systems, Computer Networks, Vol. 50, pp , 2006 [18] X. boaire, ad E. Rosas, A Critical Aalysis of Latest Advaces i Buildig Trusted P2P Networks Usig Reputatio Systems, LNCS: Web Iformatio Systems Egieerig WISE 2007 Workshops, Vol. 4832/2007, pp , 2007 [19] I. Ray, ad S. Chakraborty, A vector model of trust for developig trustworthy systems, I Europea Symposium o Research i Computer Security, Sophia Atipolis (Frace), pp , 2004 [20] I. Ray, ad S. Chakraborty, p-trust: A New Model of Trust to Allow Fier Cotrol Over Privacy i Peer-to-Peer Framework, JOURNAL OF COMPUTERS, pp , 2007 [21] F. Martielli, ad M. Petrocchi, A Uiform Framework for Security ad Trust Modelig ad Aalysis with Crypto-CCS, Electroic Notes i Theoretical Computer Sciece (ENTCS), Vol. 186, pp , 2007 [22] P. Herrma, Temporal Logic-Based Specificatio ad Verificatio of Trust Models, LNCS: Trust Maagemet, Vol. 3986/2006, pp , 2006 [23] A. Jøsag, R. Hayward, ad S. Pope, Trust etwork aalysis with subjective logic, Proceedigs of the 29th Australasia Computer Sciece Coferece, Vol. 48, pp , 2006 [24] Y. Ji, Z. Gu, J. Gu, ad H. Zhao, A New Reputatio-Based Trust Maagemet Mechaism Agaist False Feedbacks i Peer-to-Peer Systems, LNCS: Web Iformatio Systems Egieerig WISE, Vol. 4831/2007, pp , [25] S. Fumiaki, Estimatio of Trustworthiess for P2P System i Collusive Attack, Iteratioal Joural of Web ad Grid Services, Vol. 4, Issue 1, pp , 2008.
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
More informationTaking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
More informationBaan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
More informationEntropy of bi-capacities
Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationVladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
More informationI. Chi-squared Distributions
1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.
More informationLesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
More information*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
More informationProperties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
More informationCHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
More informationOutput Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
More informationConfidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
More informationINVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
More informationPROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics
More informationHypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
More informationIn nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
More informationChapter 6: Variance, the law of large numbers and the Monte-Carlo method
Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
More informationThe analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
More informationODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
More informationNon-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring
No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy
More informationEngineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
More informationAnalyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
More information(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
More informationADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
More informationYour organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
More informationEvaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
More informationwhere: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return
EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The
More informationInstitute of Actuaries of India Subject CT1 Financial Mathematics
Istitute of Actuaries of Idia Subject CT1 Fiacial Mathematics For 2014 Examiatios Subject CT1 Fiacial Mathematics Core Techical Aim The aim of the Fiacial Mathematics subject is to provide a groudig i
More informationDAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
More informationAsymptotic Growth of Functions
CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll
More information5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
More informationEstimating Probability Distributions by Observing Betting Practices
5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,
More informationHow to read A Mutual Fund shareholder report
Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.
More informationA probabilistic proof of a binomial identity
A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two
More informationA Secure Implementation of Java Inner Classes
A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio
More informationCHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
More informationDetermining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
More informationSystems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised
More informationData Analysis and Statistical Behaviors of Stock Market Fluctuations
44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:
More informationApplication and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode
SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of
More informationDepartment of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
More informationReliability Analysis in HPC clusters
Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab
More informationEnhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)
Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02
More informationDesigning Incentives for Online Question and Answer Forums
Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied
More informationAutomatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
More informationLesson 15 ANOVA (analysis of variance)
Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi
More informationCREATIVE MARKETING PROJECT 2016
CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members
More informationA Method for Trust Quantificationin Cloud Computing Environments
A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology
More informationAmendments to employer debt Regulations
March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios
More informationConfiguring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis
Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More information.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
More information1 Correlation and Regression Analysis
1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio
More informationDynamic House Allocation
Dyamic House Allocatio Sujit Gujar 1 ad James Zou 2 ad David C. Parkes 3 Abstract. We study a dyamic variat o the house allocatio problem. Each aget ows a distict object (a house) ad is able to trade its
More informationWeek 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable
Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5
More informationChatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com
SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial
More informationStudy on the application of the software phase-locked loop in tracking and filtering of pulse signal
Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College
More informationTHE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction
THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,
More informationMTO-MTS Production Systems in Supply Chains
NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost
More informationExample 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).
BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly
More informationDomain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
More informationCase Study. Normal and t Distributions. Density Plot. Normal Distributions
Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca
More informationSoving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
More informationCenter, Spread, and Shape in Inference: Claims, Caveats, and Insights
Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the
More informationA guide to School Employees' Well-Being
A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to
More informationOnline Banking. Internet of Things
Olie Bakig & The Iteret of Thigs Our icreasigly iteretcoected future will mea better bakig ad added security resposibilities for all of us. FROM DESKTOPS TO SMARTWATCHS Just a few years ago, Americas coducted
More informationhp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation
HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics
More informationSubject CT5 Contingencies Core Technical Syllabus
Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value
More informationHCL Dynamic Spiking Protocol
ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7
More informationChapter 5: Inner Product Spaces
Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples
More informationDomain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
More informationFirewall Modules and Modular Firewalls
Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi acharya@cs.utexas.edu Aditya Joshi Uiversity of Texas at Austi adityaj@cs.utexas.edu M. G. Gouda Natioal Sciece Foudatio
More informationClass Meeting # 16: The Fourier Transform on R n
MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,
More informationPresent Values, Investment Returns and Discount Rates
Preset Values, Ivestmet Returs ad Discout Rates Dimitry Midli, ASA, MAAA, PhD Presidet CDI Advisors LLC dmidli@cdiadvisors.com May 2, 203 Copyright 20, CDI Advisors LLC The cocept of preset value lies
More informationChapter 5 Unit 1. IET 350 Engineering Economics. Learning Objectives Chapter 5. Learning Objectives Unit 1. Annual Amount and Gradient Functions
Chapter 5 Uit Aual Amout ad Gradiet Fuctios IET 350 Egieerig Ecoomics Learig Objectives Chapter 5 Upo completio of this chapter you should uderstad: Calculatig future values from aual amouts. Calculatig
More informationInternational Journal on Emerging Technologies 1(2): 48-56(2010) ISSN : 0975-8364
e t Iteratioal Joural o Emergig Techologies (): 48-56(00) ISSN : 0975-864 Dyamic load balacig i distributed ad high performace parallel eterprise computig by embeddig MPI ad ope MP Sadip S. Chauha, Sadip
More informationTradigms of Astundithi and Toyota
Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore
More informationPUBLIC RELATIONS PROJECT 2016
PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig
More informationSTUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia
STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah
More informationHow To Solve The Homewor Problem Beautifully
Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log
More information5: Introduction to Estimation
5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample
More informationDiscrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13
EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may
More informationPSYCHOLOGICAL STATISTICS
UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics
More informationAssessment of the Board
Audit Committee Istitute Sposored by KPMG Assessmet of the Board Whe usig a facilitator, care eeds to be take if the idividual is i some way coflicted due to the closeess of their relatioship with the
More information0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5
Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.
More informationMalicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur
More informationDomain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues
Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio
More informationResearch Method (I) --Knowledge on Sampling (Simple Random Sampling)
Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact
More informationMeasures of Spread and Boxplots Discrete Math, Section 9.4
Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,
More informationConvention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
More informationVolatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina
Overcomig the Crisis: Ecoomic ad Fiacial Developmets i Asia ad Europe Edited by Štefa Bojec, Josef C. Brada, ad Masaaki Kuboiwa http://www.hippocampus.si/isbn/978-961-6832-32-8/cotets.pdf Volatility of
More informationInvesting in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY?
Ivestig i Stocks Ivestig i Stocks Busiesses sell shares of stock to ivestors as a way to raise moey to fiace expasio, pay off debt ad provide operatig capital. Ecoomic coditios: Employmet, iflatio, ivetory
More informationResearch Article Sign Data Derivative Recovery
Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov
More informationDomain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
More informationRisk Factors Assessment for Software Development Project Based on Fuzzy Decision Making
Factors Assessmet for Software Developmet Proect Based o Fuzzy Decisio Makig Shih-Tog Lu ad Shih-Heg Yu Abstract This study ivestigates ad idetifies the assessmet factors i software developmet proect risk
More informationEvaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System
Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,
More informationThe Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks
The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu
More informationINDEPENDENT BUSINESS PLAN EVENT 2016
INDEPENDENT BUSINESS PLAN EVENT 2016 The Idepedet Busiess Pla Evet ivolves the developmet of a comprehesive proposal to start a ew busiess. Ay type of busiess may be used. The Idepedet Busiess Pla Evet
More informationTrustDavis: A Non-Exploitable Online Reputation System
TrustDavis: A No-Exploitable Olie Reputatio System Dimitri do B. DeFigueiredo Uiversity of Califoria Davis Departmet of Computer Sciece Davis USA defigueiredo@ucdavis.edu Earl T. Barr Uiversity of Califoria
More information