BEGIN:VCALENDAR
VERSION:2.0
PRODID:Linklings LLC
BEGIN:VTIMEZONE
TZID:America/Chicago
X-LIC-LOCATION:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:19700308T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:19701101T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20181221T160726Z
LOCATION:D163
DTSTART;TZID=America/Chicago:20181111T143000
DTEND;TZID=America/Chicago:20181111T150000
UID:submissions.supercomputing.org_SC18_sess159_ws_indis108@linklings.com
SUMMARY:Social Computational Trust Model (SCTM): A Framework to Facilitate
  Selection of Partners
DESCRIPTION:Workshop\nArchitectures, Networks, Security, Workshop Reg Pass
 \n\nSocial Computational Trust Model (SCTM): A Framework to Facilitate Sel
 ection of Partners\n\nDeljoo, van Engers, Gommans, de Laat\n\nCreating a c
 yber security alliance among network domain owners, as a means to minimize
  security incidents, has gained the interest of practitioners and academic
 s in the last few years. A cyber security alliance, like any membership or
 ganization, requires the creation and maintenance of trust among its membe
 rs, in this case the network domain owners.  To promote the disclosure and
  sharing of cyber security information among the network domain owners, a 
 trust framework is needed.\n\nThis paper discusses a social computational 
 trust model (SCTM), that helps alliance members to select the right partne
 r to collaborate with and perform collective tasks, and encourages the sha
 ring of incident data and intelligence. The social computational trust mod
 el combines benevolence and competence to estimate the risk of interaction
 . Benevolence is computed from personal experiences gained through direct 
 interactions and competence is assessed on the base of the received feedba
 ck from the other members. An agent based model case study is presented to
  demonstrate our approach.  The practicability of the proposed risk estima
 tion is validated with a detailed experiment.
URL:https://sc18.supercomputing.org/presentation/?id=ws_indis108&sess=sess
 159
END:VEVENT
END:VCALENDAR

