Suspending judgment to create value: Suspicion and trust in negotiation
نویسندگان
چکیده
منابع مشابه
How to Exploit Ontologies in Trust Negotiation
The World Wide Web makes it easy to share information and resources, but offers few ways to limit the manner in which these resources are shared. The specification and automated enforcement of security-related policies offer promise as a way of providing controlled sharing, but few tools are available to assist in policy specification and management, especially in an open system such as the Web...
متن کاملTrust Aware Negotiation Dissolution
In this paper we propose a recommender system that suggests the best moment to end a negotiation. The recommendation is made from a trust evaluation of every agent in the negotiation based on their past negotiation experiences. For this, we introduce the Trust Aware Negotiation Dissolution algorithm.
متن کاملHow to Exploit Ontologies for Trust Negotiation
The World Wide Web makes it easy to share information and resources, but offers few ways to limit the manner in which these resources are shared. The specification and automated enforcement of security-related policies offer promise as a way of providing controlled sharing, but few tools are available to assist in policy specification and management, especially in an open system such as the Web...
متن کاملTrust Management and Trust Negotiation in an Extension of SQL
Security policies of large organizations cannot be expressed in the access control policy language defined by the SQL standard and provided by widely used relational database systems, because that language does not support the decentralized policies that are common in large organizations. Trust management frameworks support decentralized policies but generally have not been designed to integrat...
متن کاملAutomated Trust Negotiation
Parsimoneous Strategy: a linear strategy with focused disclosures [Winsborough, Seamons, and Jones. DISCEX 2000] Prunes: a quadratic backtracking strategy [Yu, Ma, and Winslett. CCS 2000] Policy graphs: protecting policy content as a sensitive resource [Seamons, Winslett, and Yu. NDSS 2001] Interoperable strategies: closed strategy families [Yu, Winslett, and Seamons. CCS 2001] [Yu, Winslett, a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Experimental Social Psychology
سال: 2010
ISSN: 0022-1031
DOI: 10.1016/j.jesp.2009.11.002