iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://link.springer.com/doi/10.1007/978-3-642-16576-4_5
Trustworthy Organic Computing Systems: Challenges and Perspectives | SpringerLink
Skip to main content

Trustworthy Organic Computing Systems: Challenges and Perspectives

  • Conference paper
Autonomic and Trusted Computing (ATC 2010)

Abstract

Organic Computing (OC) systems differ from classical software systems as the topology and the participating components of the system are not predefined and therefore are subject to unforeseeable change during the systems’ runtime. Thus, completely new challenges to the verification and validation of such systems as well as for interactions between system components and, of course, between the system and the user arise. These challenges can be subsumed by the terms trustworthiness or trust.

This paper proposes – after exploring the notions and principles of trust in the literature – a definition of trust which encompasses all aspects that define the trustworthiness of an Organic Computing system. It then outlines the different research challenges that have to be tackled in order to provide an understanding of trust in OC-systems and gives perspectives on how this endeavour can be taken on. Current research initiatives in the area of trust in computing systems are reviewed and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proc. of the 33rd Hawaii International Conference on System Sciences, vol. 6, pp. 1–25 (2000)

    Google Scholar 

  2. Abrams, M.D., Joyce, M.V.: Trusted system concepts. Computers & Security 14(1), 45–56 (1995)

    Article  Google Scholar 

  3. Abran, A., Khelifi, A., Suryn, W., Seffah, A.: Usability meanings and interpretations in ISO standards. Software Quality Journal 11(4), 325–338 (2003)

    Article  Google Scholar 

  4. Avižienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing, 11–33 (2004)

    Google Scholar 

  5. Azzedin, F., Maheswaran, M.: Evolving and managing trust in grid computing systems. In: Proc. of the IEEE Canadian Conference on Electrical & Computer Engineering, pp. 1424–1429. IEEE, Los Alamitos (2002)

    Google Scholar 

  6. Balser, M., Reif, W.: Interactive verification of concurrent systems using symbolic execution. In: Proc. of 7th International Workshop of Implementation of Logics, IWIL 2008 (2008)

    Google Scholar 

  7. Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Boella, G., Pigozzi, G., van der Torre, L.: Normative systems in computer science - ten guidelines for normative multiagent systems. In: Normative Multi-Agent Systems. Dagstuhl Seminar Proceedings, vol. (09121), Dagstuhl (2009)

    Google Scholar 

  9. Boon, S.D., Holmes, J.G.: The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. Cooperation and Prosocial Behaviour, 190–211 (1991)

    Google Scholar 

  10. Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Progress on the state explosion problem in model checking. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 176–194. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Coleman, J.S.: Foundations of social theory. Belknap Press (1994)

    Google Scholar 

  12. Corritore, C.L., Kracher, B., Wiedenbeck, S.: On-line trust: concepts, evolving themes, a model. International Journal of Human-Computer Studies 58(6), 737–758 (2003)

    Article  Google Scholar 

  13. Deutsch, M.: Trust and suspicion. The Journal of Conflict Resolution 2(4), 265–279 (1958)

    Article  Google Scholar 

  14. Deutsch, M.: Cooperation and trust: Some theoretical notes. In: Nebraska Symposium on Motivation, vol. 10, pp. 275–319. University of Nebraska Press (1962)

    Google Scholar 

  15. Dunlop, D.D.: An investigation of functional correctness issues. PhD thesis, University of Maryland (1982)

    Google Scholar 

  16. Dunn, J.: The concept of trust in the politics of John Locke. Philosophy in History: Essays on the Historiography of Philosophy, 279–301 (1984)

    Google Scholar 

  17. Gambetta, D.: Can we trust trust. Trust: Making and Breaking Cooperative Relations, 213–237 (2000)

    Google Scholar 

  18. Glass, A., McGuinness, D.L., Wolverton, M.: Toward establishing trust in adaptive agents. In: IUI 2008: Proc. of the 13th International Conference on Intelligent User Interfaces, pp. 227–236. ACM, New York (2008)

    Google Scholar 

  19. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4), 2–16 (2000)

    Article  Google Scholar 

  20. Hasselbring, W., Reussner, R.: Toward trustworthy software systems. Computer 39(4), 91 (2006)

    Article  Google Scholar 

  21. Hofstede, G.J., Jonker, C.M., Verwaart, T.: A Multi-agent Model of Deceit and Trust in Intercultural Trade. In: Nguyen, N.T., Kowalczyk, R., Chen, S.-M. (eds.) ICCCI 2009. LNCS, vol. 5796, pp. 205–216. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. IEEE. IEEE Standard 610.12-1990: Glossary of Software Engineering Terminology

    Google Scholar 

  23. Jones, S., Morris, P.: TRUST-EC: Requirements for Trust and Confidence in E-Commerce: Report of the Workshop held in Luxembourg, April 8–9 (1999)

    Google Scholar 

  24. Kini, A., Choobineh, J.: Trust in electronic commerce: definition and theoretical considerations. In: Proc. of the Hawaii International Conference on System Sciences, vol. 31, pp. 51–61 (1998)

    Google Scholar 

  25. Kramer, R.M., Brewer, M.B., Hanna, B.A.: Collective trust and collective action. Trust in organizations: Frontiers of theory and research, 357–389 (1996)

    Google Scholar 

  26. Luck, M., McBurney, P., Shehory, O., Willmott, S.: Agentlink Roadmap. Agenlink. org. (2005)

    Google Scholar 

  27. Luhmann, N.: Trust and power. Wiley, Chichester (1979)

    Google Scholar 

  28. Luhmann, N.: Familiarity, confidence, trust: Problems and alternatives. Trust: Making and Breaking Cooperative Relations, 94–107 (2000)

    Google Scholar 

  29. Lutz, R.R.: Software engineering for safety: a roadmap. In: Proc. of the Conference on The Future of Software Engineering, pp. 213–226. ACM, New York (2000)

    Google Scholar 

  30. Marsh, S., Meech, J.: Trust in design. In: Proc. of the Conference on Human Factors in Computing Systems, pp. 45–46. ACM, New York (2000)

    Google Scholar 

  31. McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. The Academy of Management Review 23(3), 473–490 (1998)

    Google Scholar 

  32. Moebius, N., Reif, W., Stenzel, K.: Modeling Security-Critical Applications with UML in the SecureMDD Approach. International Journal On Advances in Software 1, 59–79 (2009)

    Google Scholar 

  33. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proc. of the 35th Hawaii International Conference on System Sciences, pp. 188–196 (2002)

    Google Scholar 

  34. Müller-Schloer, C.: Organic computing: on the feasibility of controlled emergence. In: CODES+ISSS, pp. 2–5 (2004)

    Google Scholar 

  35. Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy computing. Whitepaper, Microsoft Corporation (2002)

    Google Scholar 

  36. Musa, J.D., Iannino, A., Okumoto, K.: Software reliability: measurement, prediction, application. McGraw-Hill, Inc., New York (1987)

    Google Scholar 

  37. Poslad, S., Charlton, P., Calisti, M.: Specifying standard security mechanisms in multi-agent systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 163–176. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  38. Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review 19(01), 1–25 (2005)

    Google Scholar 

  39. Rotter, J.B.: A new scale for the measurement of interpersonal trust. Journal of Personality 35(4), 651–665 (1967)

    Article  Google Scholar 

  40. Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: A cross-discipline view of trust. Academy of management review 23(3), 393–404 (1998)

    Article  Google Scholar 

  41. Ryan, A.J.: Emergence is coupled to scope, not level. Complexity 13(2), 67–77 (2007)

    Article  Google Scholar 

  42. Schneider, F.B.: Trust in Cyberspace. National Academy Press, Washington (1998)

    Google Scholar 

  43. Storey, N.R.: Safety Critical Computer Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (1996)

    Google Scholar 

  44. Sydow, J.: Understanding the constitution of interorganizational trust. Trust within and between organizations: Conceptual issues and empirical applications, 31–63 (1998)

    Google Scholar 

  45. Tschannen-Moran, M., Hoy, W.K.: A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research 70(4), 547 (2000)

    Article  Google Scholar 

  46. Valmari, A.: The state explosion problem. In: Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, pp. 429–528. Springer, London (1998)

    Google Scholar 

  47. van de Bunt, G.G., Wittek, R.P.M., de Klepper, M.C.: The evolution of intra-organizational trust networks: The case of a German paper factory: An empirical test of six trust mechanisms. International Sociology 20(3), 339 (2005)

    Article  Google Scholar 

  48. Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. of the 3rd International Conference on Peer-to-Peer Computing (2003)

    Google Scholar 

  49. Wong, H.C., Sycara, K.: Adding security and trust to multiagent systems. Applied Artificial Intelligence 14(9), 927–941 (2000)

    Article  Google Scholar 

  50. Yan, Z., Holtmanns, S.: Trust modeling and management: from social trust to digital trust. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions (2008)

    Google Scholar 

  51. Yan, Z., MacLaverty, R.: Autonomic trust management in a component based software system. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 279–292. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Steghöfer, JP. et al. (2010). Trustworthy Organic Computing Systems: Challenges and Perspectives. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16576-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16575-7

  • Online ISBN: 978-3-642-16576-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics