XDI Trust Information: Trustability protocol for validating distributed personal information
نویسندگان
چکیده
Trust of information has always been a critical issue in large distributed environments. With the rapid and recent development of online communities and social networks, it has been evident that the Web will rely more and more on user-edited information. As a consequence trust in the correctness of data is falling dramatically and no general solution has been proposed in order to consider that specific but fundamental problem. Trustworthiness on the Internet is usually addressed as a problem of privacy and security(1). So, until now, the solutions to the trust issues are focused on privacy and security. For instance, certificates and the TLS protocol address authentication and data transfer security. The OASIS Consortium addresses information control through the XDI contract links, which are part of the Dataweb architecture (2). This paper is introducing a method for endorsing content correctness based on social participation and the Dataweb paradigm. The general idea is that by creating special XDI contract links supporting trusty-trustee relationships (XDI Trust Information(XTI) contract links), people will be able to estimate the correctness of information using collective intelligence or give their trust to any data for improving the social perception of its correctness. In the future, a new generation of web browser would be able to use the power of XTI and the Dataweb architecture in order to give people a critical view of information. For spreading the technology it should be necessary to fully specify XTI and integrate it in XDI and make it an Internet standard. However, this cannot be done at the moment since the first official release of the XDI specifications is expected before April 2009.
منابع مشابه
Traversal and Relations Discovery among Business Entities and People using Semantic Web Technologies and Trust Management
There are several data silos containing information about business entities and people but are not semantically connected. If in integration process of data sources trust management is also employed than we can expect much higher success rate in relations discovery among entities. Majority of current mash-up approaches that deal with integration of information from several data sources omit or ...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملComplementing E-Mails with Distinct, Geographic Location Information in Packet-switched IP Networks
Although the Internet has developed into a mass-medium for communication and information exchange over the last couple of years, many problems still exist regarding security and anonymity. One of these Achilles’ Heels is spam. Electronic mail (e-mail) has become one of the most used communication mechanism. It is absolutely easy to use and cost-effective. Unfortunately, the simplicity and effec...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملA Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they com...
متن کامل