Trust Measurement Using Fuzzy Theory and Trade Protocol Recommendation Based on Trust Level in Trusted Auction System

신뢰 기반 경매 시스템에서의 퍼지를 이용한 신뢰도 측정과 신뢰도에 따른 거래 방식 추천

  • 양근우 (한국과학기술원 테크노경영대학원) ;
  • 허순영 (한국과학기술원 테크노경영대학원)
  • Published : 2003.06.01

Abstract

The explosive growth of the internet-based transactions requires not only a secure payment system but also an appropriate trust measuring methodology and secure transaction protocols to guarantee the minimal risk for the transacting entities involved in specific transactions. Especially, in internet auction systems where either buyers or sellers or both can be more than one in one transaction, providing those systems that make sure no one transacting entity takes a major risk becomes critical. In this paper, an improved trust measuring method using a relationship-based internet community for an auction system is proposed. The proposed system incorporates fuzzy set and calculation concepts to help build trust matrices and models, which is used to measure the level of risk involved in a specific auction trade concerned. Also, to optimize the auction trade process in terms of cost and time, the proposed system recommends a differentiated trade protocol according to the risk level involved in each auction trade. To test the appropriateness of the proposed trusted auction system, a prototype system has been developed under a Windows-NT environment.

Keywords

References

  1. Decision Support System v.31 Establishing Online Trust Through a Community Responsibility System Ba,S. https://doi.org/10.1016/S0167-9236(00)00144-5
  2. European Economic Review v.44 Network Externalities and Universal Service Obligation in the Internet Cremer,J.
  3. Journal of Marketing v.61 An Examination of the Nature of Trust in Buyer-Seller Relationships Doney,P.;J.Cannon https://doi.org/10.2307/1251829
  4. International Journal of Industrial Organization v.14 The Economics of Networks Economides,N. https://doi.org/10.1016/0167-7187(96)01015-6
  5. UML Distilled 2nd Edition : A Brief Guide to the Standard Object Modeling Language Fowler,M.;K.Scott
  6. The SSL Prococol, Version 3.0, Netscape Specification Freier,A.O.;P.Karlton;P.Kocher
  7. Communications of the ACM v.42 no.4 Building Customer Trust Online Hoffman,D.;T.Novak;M.Peralta https://doi.org/10.1145/299157.299175
  8. IEEE Transactions of Software Engineering v.22 no.5 Accountability in Electronic Commerce Protocols Kailar,R.
  9. Communication of the ACM v.36 no.8 Internet Privacy Enhanced Mail Kent,S. https://doi.org/10.1145/163381.163390
  10. 16th International Conference on Distributed Computing Systems (ICDCS '96) Marking Trust Explicit in Distributed Commerce Transactions Ketchpel,S.;H.Garcia-Molina
  11. Proceedings of 2nd ACM Conference of Computer and Communication Security Endorsing, Licensing and Insurance for Distributed System Services Lai,C.G.;Medvinskey;B.C.Newman
  12. IEEE Proceedings of Control & Science v.121 no.12 Application of Fuzzy Algorithms for Control of Simple Dynamic Plant Mamdani,H.
  13. 18th International Conference on Distributed Computing Systems(ICDCS '98) Trust Metrics,Models and Protocols for Electronic Commerce Transactions Manchala,D.
  14. IEEE Internet Computing no.3-4 E-Commerce Trust Metrics and Models Manchala,D.
  15. Proceedings of the 1996 European Symposium on Research in Computer Security (ESORICS '96) Modeling a Public-Key Infrastructure Maurer,U.
  16. Academy of Management Review v.20 no.3 An Integrative Model of Organizational Trust Mayer,R.;J.Davis;F.Schoorman https://doi.org/10.2307/258792
  17. Journal of Computer and System Science v.27 Transaction Protection by Beacons Rabin,M. https://doi.org/10.1016/0022-0000(83)90042-9
  18. Proceedings of the IEEE Symposium on Security and Privacy Toward Acceptable Metrics of Authentication Reiter,M.K.;S.G.Stubblebine
  19. The MD5 Message Digest Algorithm Rivest,R.L.
  20. Journal of Magement v.27 Virtual Internet Communities and Commercial Success : Individual and Community-Level Theory Guounded in the Atypical Case of Time Zone.com Rothaermel,F.;S.Sugiyama
  21. Proceedings of the 14th International Joint Conference of Artificial Intelligence(IJCAI-95) Equilibrium Analysis of the Possibilities of Unenforced Exchange in Multiagent Systems Sandholm,T.;V.Lesser
  22. Protect Your Privacy, A Guide for PGP Users Stallings,W.
  23. 17th International Conference on Distributed Computing Systems(ICDCS '97) Building Trust for Distributed Commerce Transactions Su,J.;D.Manchala
  24. Proceedings of the 4th 4CM Conference on Computer and Communications Security Trust Relationships in Secure Systems A Distributed Authentication Perspective Yahalom,R.;B.Klein
  25. IEEE Transactions on Systems Management and Cybernetics v.SMC-3 no.1 Outline of a New Approach to the Analysis of Complex Systems and Decision Processes Zadeh,L. https://doi.org/10.1109/TSMC.1973.5408575