Suspending judgment to create value: Suspicion and trust in negotiation

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Exploit Ontologies in Trust Negotiation

The World Wide Web makes it easy to share information and resources, but offers few ways to limit the manner in which these resources are shared. The specification and automated enforcement of security-related policies offer promise as a way of providing controlled sharing, but few tools are available to assist in policy specification and management, especially in an open system such as the Web...

متن کامل

Trust Aware Negotiation Dissolution

In this paper we propose a recommender system that suggests the best moment to end a negotiation. The recommendation is made from a trust evaluation of every agent in the negotiation based on their past negotiation experiences. For this, we introduce the Trust Aware Negotiation Dissolution algorithm.

متن کامل

How to Exploit Ontologies for Trust Negotiation

The World Wide Web makes it easy to share information and resources, but offers few ways to limit the manner in which these resources are shared. The specification and automated enforcement of security-related policies offer promise as a way of providing controlled sharing, but few tools are available to assist in policy specification and management, especially in an open system such as the Web...

متن کامل

Trust Management and Trust Negotiation in an Extension of SQL

Security policies of large organizations cannot be expressed in the access control policy language defined by the SQL standard and provided by widely used relational database systems, because that language does not support the decentralized policies that are common in large organizations. Trust management frameworks support decentralized policies but generally have not been designed to integrat...

متن کامل

Automated Trust Negotiation

Parsimoneous Strategy: a linear strategy with focused disclosures [Winsborough, Seamons, and Jones. DISCEX 2000] Prunes: a quadratic backtracking strategy [Yu, Ma, and Winslett. CCS 2000] Policy graphs: protecting policy content as a sensitive resource [Seamons, Winslett, and Yu. NDSS 2001] Interoperable strategies: closed strategy families [Yu, Winslett, and Seamons. CCS 2001] [Yu, Winslett, a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Experimental Social Psychology

سال: 2010

ISSN: 0022-1031

DOI: 10.1016/j.jesp.2009.11.002