UNCERTAINTY-BASED TRUST ESTIMATION IN A MULTI-VALUED TRUST ENVIRONMENT

2013 ◽  
Vol 22 (05) ◽  
pp. 1360003
Author(s):  
SINA HONARI ◽  
BRIGITTE JAUMARD ◽  
JAMAL BENTAHAR

Despite the widespread usage of the evaluation mediums for online services by the clients, there is a requirement for a trust evaluation tool that provides the clients with the degree of trustworthiness of the service providers. Such a tool can provide increased familiarity with unknown third party entities, e.g. service providers, especially when those entities neither project completely trustworthy nor totally untrustworthy behaviour. Indeed, developing some metrics for trust evaluation under uncertainty can come handy, e.g., for customers interested in evaluating the trustworthiness of an unknown service provider throughout queries to other customers of unknown reliability. In this research, we propose an evaluation metric to estimate the degree of trustworthiness of an unknown agent, say aD, through the information acquired through a group of agents who have interacted with agent aD. This group of agents is assumed to have an unknown degree of reliability. In order to tackle the uncertainty associated with the trust of these set of unknown agents, we suggest to use possibility distributions. Later, we introduce a new certainty metric to measure the degree of agreement in the information reported by the group of agents in A on agent aD. Fusion rules are then used to measure an estimation of the agent aD’s degree of trustworthiness. To the best of our knowledge, this is the first work that estimates trust, out of empirical data, subject to some uncertainty, in a discrete multi-valued trust domain. Finally, numerical experiments are presented to validate the proposed tools and metrics.

Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This paper empirically examines the 17 U.S.C. § 512 notice and takedown process as implemented by the Texas online service provider, The Planet. We reviewed a random sample of notices from a population of all notices processed by The Planet from August 2004 to June 2007. We used a mixed methodology, qualitatively assessing the notices, and running quantitative checks to ensure that we were not mistakenly over- or understating the importance of qualitative findings. Because the notices most clearly show sender behavior, we focus on senders’ use of section 512; we then more generally discuss the possible effects of sender behavior on targets and OSPs. We conclude that section 512 continues to be useful for copyright holders; in addition, it undoubtedly provides important innovation-promoting protection for intermediaries. Yet the section 512 regime also shows serious strain in practice, at least within our observed set of notices. A considerable group of senders have difficulty following section 512’s technical requirements and understanding the substantive underlying copyright law. Further, as expected, the large copyright industries appear to be challenged by peer-to-peer filesharing — a problem for which the notice and takedown framework does not provide immediate relief — leading them to make broader demands than are supported by section 512. Finally, the emerging dominance of third-party rights enforcement organizations ("REOs") and trade associations, which have incentives to generate notices and achieve takedowns, add a layer of complexity to the process. Ultimately, these strains, and senders’ responses to them, likely affect both OSPs and targets. Overall, they prompt concerns about due process for targets and potential harms to Internet expression. We reaffirm our previous suggestions for reform, and call for greater information sharing and transparency to help rebalance and strengthen the section 512 process.Available at SSRN: http://ssrn.com/abstract=2694348


2011 ◽  
Vol 5 (4) ◽  
pp. 1-7
Author(s):  
Murthy V. Rallapalli

This article presents an alternate approach to effectively address the way privacy agreements are initiated through web services. In this new framework, the consumer and the service provider can mutually negotiate on the privacy terms. It contains a privacy model in which the transaction takes place after a negotiation between the service provider and the web user is completed. In addition, this framework would support various negotiation levels of the agreement lifecycle which is an important aspect of the dynamic environment of a B2C e-commerce scenario. A third party trusted agency and a privacy filter are included to handle privacy information of the web user. The author seeks to raise awareness of the issues surrounding privacy transactions and the potential ongoing impact to both service providers and clients as the use of web services accelerates.


Author(s):  
Alptekin Ulutas

Logistics is a key factor for companies to sustain their businesses, to gain the competitive advantage in the market, and to speed up the transportation process. Companies can perform their own logistic activities using their own core competencies; however, they can face huge logistics costs. To avoid these logistics operating costs, companies need to cooperate with third party logistics service providers (3PL) to perform logistics activities. This chapter proposes an integrated rough MCDM model including Rough SWARA and Rough COPRAS methods to identify the best 3PL for a Turkish textile company. These two rough methods were not previously utilized in solving any decision-making problems in the extant literature. Thus, the contribution of this study is to develop a new rough integrated model to solve the 3PL service provider selection problem.


Author(s):  
Murthy V. Rallapalli

This article presents an alternate approach to effectively address the way privacy agreements are initiated through web services. In this new framework, the consumer and the service provider can mutually negotiate on the privacy terms. It contains a privacy model in which the transaction takes place after a negotiation between the service provider and the web user is completed. In addition, this framework would support various negotiation levels of the agreement lifecycle which is an important aspect of the dynamic environment of a B2C e-commerce scenario. A third party trusted agency and a privacy filter are included to handle privacy information of the web user. The author seeks to raise awareness of the issues surrounding privacy transactions and the potential ongoing impact to both service providers and clients as the use of web services accelerates.


2016 ◽  
Vol 16 (1) ◽  
pp. 51-59 ◽  
Author(s):  
Ponnuboina Kishore ◽  
G. Padmanabhan

AbstractIn India, Manufacturing companies are primarily being concentrated on the production activities which led to drastic improvement of outsourcing logistics process to third party logistics (3PLS), consequently a strong outsourcing logistics can be observed over the next two decades for the development of a company. It may therefore be noted that the enhancement and extrusion are necessary in order to effectively asses risk and opportunities. To achieve this, the best logistics service provider which leads to the growth of organisation and industry has to be selected. The present work aims at the integration of Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) in Fuzzy environment. The integration is carried out with more consistency while evaluating and selecting the best Logistics service provider based on ten coordination criteria viz. Custom Clearance, On Time Delivery, Number of Customers Handled, Placement Percentage, Tracking Status, Service Quality, Solving of Issues, Collecting Proof of Delivery, Region and Price. Fuzzy AHP is used to calculate relative weights of each coordination criterion. Logistics service providers are ranked based on closeness coefficient, calculated for each LSP using Fuzzy TOPSIS. By this method the LSP5 has selected as best logistic service provider among the seven LSP for battery manufacturing company.


2021 ◽  
Vol 4 (1) ◽  
pp. 19-33
Author(s):  
Çağlar Karamaşa ◽  
◽  
Ezgi Demir ◽  
Salih Memiş ◽  
Selçuk Korucuk ◽  
...  

Today, growing and changing competitive conditions, products, and services, free movement of labor, and businesses with the information they develop strategies that create value to obtain a competitive advantage. Now, final buyers have the convenience of purchasing the products they demand with the features and conditions they want and at the price they accept. In such an environment, businesses use their supply chain and logistics activities more effectively and efficiently than their competitors. Today, achieving a strategic superiority in a global market where the content and quality of the products are the same is only possible by delivering the desired products to the customer at the desired price, at the desired time, in the desired amount, through the right channel, as quickly as possible and without any damage. In such a situation, the desire to focus on the main activities of the enterprises, the need for effective logistics operations, etc. logistics outsourcing has increased rapidly for reasons. Businesses can carry out logistics activities requiring expertise thanks to third party logistics (3PL) service providers in the field such as transportation, storage, customs clearance, without investing in logistics. For logistics outsourcing to be beneficial, a correct logistics service provider must be selected under the needs of the business. Selecting the right logistics service provider is important in increasing the benefit of outsourcing. In this study neutrosophic AHP was used to prioritize the factors.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Gülşen Akman ◽  
Kasım Baynal

Nowadays, the demand of third-party logistics provider becomes an increasingly important issue for companies to improve their customer service and to decrease logistics costs. This paper presents an integrated fuzzy approach for the evaluation and selection of 3rd party logistics service providers. This method consists of two techniques: (1) use fuzzy analytic hierarchy process to identify weights of evaluation criteria; (2) apply fuzzy technique for order preference by similarity to ideal solution (TOPSIS) method to evaluate and sequence alternatives and to make the final selection. Finally, an actual industrial application is performed in logistics department of a tire manufacturing company. For this, first, eight logistics supplier selection criteria were determined, and then the best alternative among seven logistics service provider companies was selected by the proposed method.


Author(s):  
Omotayo Adebare ◽  
Melan Mustakim ◽  
Alonge O. Richard

Innovation consists of making collaborative efforts in term of relationship with other organization and institutions to attain competitive advantage by means of innovative services and products, as well as different relationships with their shareholders and stakeholders. Logistics services includes warehousing, freight, transportation, product return and repairs, inventory management, packaging, order entry/order processing. All these can be managed internally. But the challenges of coping with manufacturing and handling logistics which is not the core of the organization business model result to the outsourcing for logistics service providers, such as third-party logistics service providers. This paper aimed at investigating the moderating effect of innovation on logistics practices, particularly, warehousing, transport and packaging services, of 3PLs service provider in Malaysia manufacturing sector. Quantitative method of research was adopted, and questionnaire was distributed electronically. It was analysed using SPSS and the result indicated that innovation of green logistics moderates the relationship between inventory management and operational performance, packaging and service performance but does not moderate relationship between transportation and service performance.


2017 ◽  
Vol 4 (4) ◽  
pp. 251-279
Author(s):  
Stanley Shanapinda

This article describes how Australia’s metadata retention and disclosure regime addresses the retention and disclosure of location information and location identifiers by locally licensed telecommunications service providers and those that do not require a licence to operate in Australia. The article specifically looks at over the-top-content and communication services. The retention and disclosure duties are described in contrast to the powers of the law enforcement agencies to access and use location information from free online social networking services, whereas the law seeks to restrict the retention and thereby the disclosure of location information in respect of over the-top-content and communication services that are not provided by the licensed or unlicensed telecommunications service provider. The paper argues the retention limitations in respect of over the-top-content and communication services are undermined by the actions of the agencies to harvest location information and conduct big data analytics. Similarly, so does the discretion granted to the telecommunications service provider to retain location information in respect of over the-top-content and communication services, provided by a third party content service provider and then be required to disclose it, without any additional safeguards. The actions of the agencies and the discretion granted to the telecommunications companies undermine privacy protections. 


Sign in / Sign up

Export Citation Format

Share Document