Profit-Maximizing Trustworthiness Level of Composite Systems
Service providers face the ever-increasing problem of meeting customer expectations while maximizing profits. This optimal balance is very important for delivering better service quality to users and keeping costs under control through efficient resource allocation. In this paper we suggest optimal strategies for managing system trustworthiness in two different contexts. In the first one the provider has limited information about the users’ trustworthiness preferences, which have to be satisfied on every transaction. In the second context, the provider knows what the effect of possible outcomes on customer’s trust level and, given that the customer will perform a certain number of transactions, would like to know whether the system trustworthiness should be managed at any point in time in order to meet customer’s expectations in a cost-effective way. The optimality of the proposed strategies is demonstrated via both analytical techniques and simulations.
KeywordsTrustworthiness management Trust management Optimal strategies Trust Trust computational model Run-time Composite systems Economics of security
This work was supported by the EU-funded project OPTET (grant no. 317631).
- 1.Mohammadi, N.G., Paulus, S., Bishr, M., Metzger, A., Könnecke, H., Hartenstein, S., Weyer, T., Pohl, K.: Trustworthiness attributes and metrics for engineering trusted internet-based software systems. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds.) CLOSER 2013. CCIS, vol. 453, pp. 19–35. Springer, Heidelberg (2014)Google Scholar
- 3.Elshaafi, H., et al.: Trustworthiness monitoring and prediction of composite services. In: 2012 IEEE Symposium on Computers and Communications (ISCC). IEEE (2012)Google Scholar
- 5.Kanakakis, M., et al.: Towards Market Efficiency Using a Personalised Trust Computational Model. Telecommunications Policy (Under Review)Google Scholar
- 6.Mohammadi, N.G., et al.: Trustworthiness Evaluation of Socio-Technical-Systems using Computational and Risk Assessment Approaches, CAiSE Forum (2015, To appear)Google Scholar