Information Systems Research and Development at CCLRC Accelerating Innovation Through Technology Transfer • Juan Bicarregui Head of e- -Information Information Head of e Rutherford Appleton Laboratory Rutherford Appleton Laboratory Council of the Central Laboratory of the Research Council of the Central Laboratory of the Research Councils Councils FMICS 2003, Roeros, June 2003
Who we are: CCLRC Who we are: CCLRC Also Spin-in/out Facilities include: Companies: - Neutron and Muon Source - Synchrotron Radiation Source - Exitech (1984) - Lasers • laser processing (50 Staff) - Microstructures - Bookham Technology(1989) - Space Science • optoelectronic (400, £3bn) - Satellite Technology - UKERNA (1994) - Solar Terrestrial Physics - Molecular Spectroscopy • Networking (60) - High Performance Computing - Ceravision - Wind Energy Research • displays (£30M) - Information Technology - Neos Interactive - Nuclear Physics • multimedia internet (£20M, 20) - Particle Physics - Petrra(2000) - Radio Communications - Surfaces Transforms and Interfaces • Medical Diagnostic (2) FMICS 2003, Roeros, June 2003 2
Who we are: e- -Information Information Who we are: e Information Systems and Services Information Systems and Services � Information Science and Engineering Group IS Research and Development EU & UK Research, In-house projects R&D, Private Sector R&D � Information Services Group In house and commercial services Library, ERMS, Legal (Freedom of Information and data Protection Acts) � W3 Group UK& Ireland W3C office, ERCIM, etc. FMICS 2003, Roeros, June 2003 3
Information Systems and Services Information Systems and Services Research Challenges Research Challenges • e-Science ... • e-Government ... • Semantic Web ... • Trusted e-Services ... • Ambient Computing ... FMICS 2003, Roeros, June 2003 4
Information Systems and Services Information Systems and Services Research Themes Research Themes � Information Modelling and Analysis • .... � Security and Trust management • .... � Weband Grid Technology • .... FMICS 2003, Roeros, June 2003 5
Contents Contents � The advert � Two areas of research � Modeling Trust in e-Services � Semantics of information hiding � Future work FMICS 2003, Roeros, June 2003 6
Trust in e- -Services Services Trust in e (Theo Dimitrakos Dimitrakos) ) (Theo motivation for modelling trust � some properties of trust in e-services � aims for trust management � FMICS 2003, Roeros, June 2003 7
Building Trust into Building Trust into Why? Services Why? e- -Services e “ The UK is the largest The UK is the largest “ e- -commerce market in commerce market in e Europe ... Value added Value added Europe ... in ITEC sectors in ITEC sectors accounts for nearly a accounts for nearly a third of GDP growth” third of GDP growth” [UK On-line annual report 2000] FMICS 2003, Roeros, June 2003 8
Building Trust into Building Trust into Why? Services Why? e- -Services e BUT ... major concern about the trustworthiness of e- Services "While internet penetration is growing rapidly, all the evidence "While internet penetration is growing rapidly, all the evidence shows that shows that consumer confidence in the e- -commerce medium itself and in cross commerce medium itself and in cross- -border border consumer confidence in the e transactions remains low. transactions remains low. E- -commerce, therefore, is an insignificant part of final consumpti commerce, therefore, is an insignificant part of final consumption within on within E the European Union – – significantly below 1% of total retail sales." significantly below 1% of total retail sales." the European Union [David Byrne, European Commissioner for Health and Consumer Protection] FMICS 2003, Roeros, June 2003 9
Building Trust into Building Trust into Why? Services Why? e- -Services e “Despite the presence of effective base technologies, there remains a need for managed efficiently at the service level. ” further innovation before trust can be managed efficiently “ For e “ For e- -services to achieve the same levels of acceptance as their services to achieve the same levels of acceptance as their conventional counterpart trust management conventional counterpart trust management has to become an intrinsic part of has to become an intrinsic part of e- e -service provision.” service provision.” Patricia Hewitt - Patricia Hewitt - UK minister for e UK minister for e- -commerce commerce FMICS 2003, Roeros, June 2003 10
Trust in e- -Services Services Trust in e motivation for modelling trust � a model of trust in e-services � aims for trust management � FMICS 2003, Roeros, June 2003 11
A Model of Trust A Model of Trust A to a party B for a service X is Trust of a party A to a party B for a service X is the the Trust of a party A in that B behaves measurable belief of A in that B behaves measurable belief of dependably for a specified period within a dependably for a specified period within a specified context specified context Trust is relative to a specific service. Different trust relationships appear in different business contexts The measurement may be absolute (e.g. probability) or relative (e.g. dense order) This period may be in the past (history), the duration of the service (from now and until end of service), future (a scheduled or forecasted critical time slot), or always Dependability is deliberately understood broadly to include security, safety, reliability, timeliness, maintainability (following Newcastle the interpretation www.dirc.org.uk ) FMICS 2003, Roeros, June 2003 12
A model of Trust A model of Trust Subjective beliefs as opinions (Dempster-Shafer, Theory of evidence ) (Josang, Subjective Logic) • Opinions w A (p) = (b,d,u,a) (belief,disbelief,uncertainty,atomicity) b+d+u=1 FMICS 2003, Roeros, June 2003 13
A model of Trust A model of Trust • Conjunction b(p&q) = b(p).b(q) d(p&q) = d(p) + d(q) - d(p).d(q) u(p&q) = b(p).u(q) + u(p).b(q) + u(p).u(q) b d u b d u FMICS 2003, Roeros, June 2003 14
A model of Trust A model of Trust • Recommendation: w A,B ( p ) = w A ( i B ) ⊗ ⊗ w B (p) = ⊗ ⊗ = (b( i B ).b(p) , b( i B ).d(p) , ... ) i B = “B reliably tells the truth” • Consensus w A (p) ⊕ ⊕ w B (p) = ( b 1 (p).u 2 (p)+u 1 (p).b 2 (p) , ... ⊕ ⊕ u 1 (p)+u 2 (p)-u 1 (p).u 2 (p) Independent evidence ( there are alternatives) FMICS 2003, Roeros, June 2003 15
Trust in e- -Services Services Trust in e motivation for modelling trust � a model of trust in e-services � aims for trust management � FMICS 2003, Roeros, June 2003 16
Trust Management Trust Management Trust Management aims to maximise Trust Management aims to maximise trust while minimising risk. trust while minimising risk. Dependable Dependable Security Security The total process of identifying, controlling Behaviour Behaviour Threats Threats Security Risk Security Risk Security Risk and minimising the impact of deception and Management Management Management failure in trust. Dependable Dependable Intentions Intentions [ other dependability aspects [ other dependability aspects ] ] Analyses threats and trust inclinations while Safety Safety Trust Trust Threats Threats supporting the formation of dependable Safety Risk Inclinations Inclinations Management intentions and controlling dependable behaviour. Trust management subsumes and relies on risk analysis and risk management. management. Trust management subsumes and relies on risk analysis and risk “a unified approach to specifying and interpreting security policies, credentials, relationships [which] allows direct authorization of security-critical actions” -- Blaze, Blaze, Feigenbaum Feigenbaum & Lacy 1998 [ & Lacy 1998 [ AT&T ] POLICYMAKER ] AT&T POLICYMAKER FMICS 2003, Roeros, June 2003 17
Trust Trust Future Work Future Work Management Analysis Management Analysis � � � � Policy Oriented Management Policy Oriented Management Assess Dependability Assess Dependability � � � � Contract Management Contract Management Assess Risk � Assess Risk � � � Risk Management Risk Management � � Measure Divergence from prescribed Measure Divergence from prescribed � � behaviour behaviour ECONOMICS ECONOMICS & & GAME THEORY GAME THEORY GOGNITIVE GOGNITIVE LEGAL LEGAL TRUST TRUST SCIENCES SCIENCES REASONING REASONING COMPUTER LOGIC LOGIC SCIENCE Logic Logic � Modelling � Modelling � � Belief Formation Belief Formation Intentional modelling � Intentional modelling � � � Subjective Reasoning Subjective Reasoning Policy specification � Policy specification � � � Legal & Deontic Reasoning Legal & Deontic Reasoning Business Process Modelling � Business Process Modelling � � � Conflict Resolution Conflict Resolution System Modelling � System Modelling � � � FMICS 2003, Roeros, June 2003 18
On the Semantics of Information Hiding On the Semantics of Information Hiding � Do not read this � Exploring the role of frames in refinement � Non-interference : Component A does not depend on component B FMICS 2003, Roeros, June 2003 19
Recommend
More recommend