Abstract
Organic Computing (OC) systems differ from classical software systems as the topology and the participating components of the system are not predefined and therefore are subject to unforeseeable change during the systems’ runtime. Thus, completely new challenges to the verification and validation of such systems as well as for interactions between system components and, of course, between the system and the user arise. These challenges can be subsumed by the terms trustworthiness or trust.
This paper proposes – after exploring the notions and principles of trust in the literature – a definition of trust which encompasses all aspects that define the trustworthiness of an Organic Computing system. It then outlines the different research challenges that have to be tackled in order to provide an understanding of trust in OC-systems and gives perspectives on how this endeavour can be taken on. Current research initiatives in the area of trust in computing systems are reviewed and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proc. of the 33rd Hawaii International Conference on System Sciences, vol. 6, pp. 1–25 (2000)
Abrams, M.D., Joyce, M.V.: Trusted system concepts. Computers & Security 14(1), 45–56 (1995)
Abran, A., Khelifi, A., Suryn, W., Seffah, A.: Usability meanings and interpretations in ISO standards. Software Quality Journal 11(4), 325–338 (2003)
Avižienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing, 11–33 (2004)
Azzedin, F., Maheswaran, M.: Evolving and managing trust in grid computing systems. In: Proc. of the IEEE Canadian Conference on Electrical & Computer Engineering, pp. 1424–1429. IEEE, Los Alamitos (2002)
Balser, M., Reif, W.: Interactive verification of concurrent systems using symbolic execution. In: Proc. of 7th International Workshop of Implementation of Logics, IWIL 2008 (2008)
Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol. 1783, Springer, Heidelberg (2000)
Boella, G., Pigozzi, G., van der Torre, L.: Normative systems in computer science - ten guidelines for normative multiagent systems. In: Normative Multi-Agent Systems. Dagstuhl Seminar Proceedings, vol. (09121), Dagstuhl (2009)
Boon, S.D., Holmes, J.G.: The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. Cooperation and Prosocial Behaviour, 190–211 (1991)
Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Progress on the state explosion problem in model checking. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol. 2000, pp. 176–194. Springer, Heidelberg (2001)
Coleman, J.S.: Foundations of social theory. Belknap Press (1994)
Corritore, C.L., Kracher, B., Wiedenbeck, S.: On-line trust: concepts, evolving themes, a model. International Journal of Human-Computer Studies 58(6), 737–758 (2003)
Deutsch, M.: Trust and suspicion. The Journal of Conflict Resolution 2(4), 265–279 (1958)
Deutsch, M.: Cooperation and trust: Some theoretical notes. In: Nebraska Symposium on Motivation, vol. 10, pp. 275–319. University of Nebraska Press (1962)
Dunlop, D.D.: An investigation of functional correctness issues. PhD thesis, University of Maryland (1982)
Dunn, J.: The concept of trust in the politics of John Locke. Philosophy in History: Essays on the Historiography of Philosophy, 279–301 (1984)
Gambetta, D.: Can we trust trust. Trust: Making and Breaking Cooperative Relations, 213–237 (2000)
Glass, A., McGuinness, D.L., Wolverton, M.: Toward establishing trust in adaptive agents. In: IUI 2008: Proc. of the 13th International Conference on Intelligent User Interfaces, pp. 227–236. ACM, New York (2008)
Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3(4), 2–16 (2000)
Hasselbring, W., Reussner, R.: Toward trustworthy software systems. Computer 39(4), 91 (2006)
Hofstede, G.J., Jonker, C.M., Verwaart, T.: A Multi-agent Model of Deceit and Trust in Intercultural Trade. In: Nguyen, N.T., Kowalczyk, R., Chen, S.-M. (eds.) ICCCI 2009. LNCS, vol. 5796, pp. 205–216. Springer, Heidelberg (2009)
IEEE. IEEE Standard 610.12-1990: Glossary of Software Engineering Terminology
Jones, S., Morris, P.: TRUST-EC: Requirements for Trust and Confidence in E-Commerce: Report of the Workshop held in Luxembourg, April 8–9 (1999)
Kini, A., Choobineh, J.: Trust in electronic commerce: definition and theoretical considerations. In: Proc. of the Hawaii International Conference on System Sciences, vol. 31, pp. 51–61 (1998)
Kramer, R.M., Brewer, M.B., Hanna, B.A.: Collective trust and collective action. Trust in organizations: Frontiers of theory and research, 357–389 (1996)
Luck, M., McBurney, P., Shehory, O., Willmott, S.: Agentlink Roadmap. Agenlink. org. (2005)
Luhmann, N.: Trust and power. Wiley, Chichester (1979)
Luhmann, N.: Familiarity, confidence, trust: Problems and alternatives. Trust: Making and Breaking Cooperative Relations, 94–107 (2000)
Lutz, R.R.: Software engineering for safety: a roadmap. In: Proc. of the Conference on The Future of Software Engineering, pp. 213–226. ACM, New York (2000)
Marsh, S., Meech, J.: Trust in design. In: Proc. of the Conference on Human Factors in Computing Systems, pp. 45–46. ACM, New York (2000)
McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. The Academy of Management Review 23(3), 473–490 (1998)
Moebius, N., Reif, W., Stenzel, K.: Modeling Security-Critical Applications with UML in the SecureMDD Approach. International Journal On Advances in Software 1, 59–79 (2009)
Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proc. of the 35th Hawaii International Conference on System Sciences, pp. 188–196 (2002)
Müller-Schloer, C.: Organic computing: on the feasibility of controlled emergence. In: CODES+ISSS, pp. 2–5 (2004)
Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy computing. Whitepaper, Microsoft Corporation (2002)
Musa, J.D., Iannino, A., Okumoto, K.: Software reliability: measurement, prediction, application. McGraw-Hill, Inc., New York (1987)
Poslad, S., Charlton, P., Calisti, M.: Specifying standard security mechanisms in multi-agent systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 163–176. Springer, Heidelberg (2003)
Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review 19(01), 1–25 (2005)
Rotter, J.B.: A new scale for the measurement of interpersonal trust. Journal of Personality 35(4), 651–665 (1967)
Rousseau, D.M., Sitkin, S.B., Burt, R.S., Camerer, C.: Not so different after all: A cross-discipline view of trust. Academy of management review 23(3), 393–404 (1998)
Ryan, A.J.: Emergence is coupled to scope, not level. Complexity 13(2), 67–77 (2007)
Schneider, F.B.: Trust in Cyberspace. National Academy Press, Washington (1998)
Storey, N.R.: Safety Critical Computer Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (1996)
Sydow, J.: Understanding the constitution of interorganizational trust. Trust within and between organizations: Conceptual issues and empirical applications, 31–63 (1998)
Tschannen-Moran, M., Hoy, W.K.: A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research 70(4), 547 (2000)
Valmari, A.: The state explosion problem. In: Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, pp. 429–528. Springer, London (1998)
van de Bunt, G.G., Wittek, R.P.M., de Klepper, M.C.: The evolution of intra-organizational trust networks: The case of a German paper factory: An empirical test of six trust mechanisms. International Sociology 20(3), 339 (2005)
Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. of the 3rd International Conference on Peer-to-Peer Computing (2003)
Wong, H.C., Sycara, K.: Adding security and trust to multiagent systems. Applied Artificial Intelligence 14(9), 927–941 (2000)
Yan, Z., Holtmanns, S.: Trust modeling and management: from social trust to digital trust. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions (2008)
Yan, Z., MacLaverty, R.: Autonomic trust management in a component based software system. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 279–292. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Steghöfer, JP. et al. (2010). Trustworthy Organic Computing Systems: Challenges and Perspectives. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-16576-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16575-7
Online ISBN: 978-3-642-16576-4
eBook Packages: Computer ScienceComputer Science (R0)