[Publication 7] Zheng Yan and Ronan MacLaverty, “Autonomic Trust
Management in a Component Based Software System”, In Proceedings of the
3rd International Conference on Autonomic and Trusted Computing (ATC2006),
LNCS Vol. 4158/2006, pp. 279-292, China, September 2006.
© 2006 Springer Science + Business Media. Reprinted with kind permission of
Springer Science and Business Media.
http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/11839569_27
{zheng.z.yan, ronan.maclaverty}@nokia.com
!
!
"
%
#
!
$
"
"
%
"
+
!
& '()
%*
%*
$
"
+
%
( "#
$
'(
!
%
!
!
,
%
"
,
$
$
$
!
$
%
!
%
"
"
!
-
+
$
%
$
"
"
"
'(
$
!
"
)
!
!
"
4
&,
012%
"
%.
!
%
!!
/
"$
$
!
"
"#
3
%
$
!
"
"
%
"
+
!
,
!
062% 7
$
%5
"
(
"
+
$
$
6
%
%
062%
!
,
% 8
(:
.
092
!
8
%
!
"
"
%
!
!
$
%
$
"
"
"
%
.
!
'(
%
"
$
!
!
'(
"
%*
"
!
!
$
$
%
"
!
"
!
!
!
"
$
'(%
$
!
'(
%
"
4
'(
$
!
!
+
$
$
$
"
%
3
% (
!%(
6
"
9
'(
%(
;
!
$
%
!
8
'(
(
!
<%
3
!
4
%
!
+
!
!
!
%
"
!
,
%
$
!
!
+
!
!
%
!
+
$
4
%.
"
!
!
!
! !
!
%
$
$
.
'
*
'(
!
(
9
%=
"
!
%
!
+
"
!#
!
(
%
"
!
!
,
$
!
+
%.
& % %
"
)
,
!
+ "
& % %
%
$
$
$
!
!
)!
!
!
,
%
'(
!
4
& )
"
%
& )% 8
& % %
/
!
'(
)% .
!
,
"#
"
+
& )%
/
%(
$
+ & )
&)
& )
"
& )%
/
) "
&
,
"
& )
& % %
&
"
+
,
!
)%
"
/
4"
$
"$
"
+
)
9$
%(
% .
&
"
)
%
$
0;2%
!
. '(
&
"
) !
" !
%
"
'(
%
'(
&
)
!
.
"
!
$
"$
%
% .
%.
!
$
%.
"
;
%
%
& =)
!
% .
"
!
"
1%
14
'(
.
'(
!
/
"
!
+
%
!
*
$
%
>$
!
4
"
4
"
&
)%
& "# )
"
"#
%
!
?1
?6
?9
%%%
,
?
"
$
"
%
&
?1
?6
?9
%%%
,
)% 8
,
!
"
)
?
$
"
&
;%9
$
%
+
+
!
!
& % %
)
$
"
$!
%
,
%
"
"
!
"
.
'
-
&'
"
"
"
-
"
%
+
"
*(
*(
"
%
"
(
% =
<
,
"
/,
"
%
)!(
"
!
(
"
(
(
"
%%%
%
"
@
"
(
!
-
"
"
,
(
$
$
"
&'
$
!
"
%
.
"
!
+
+
%
%
!
%8
"
& )
"
4
" "
" "
"
1
"
"
"
"
"
" "
+
& )
B
"
"
% A
" " $
& )% A $
"
"
1%
"
%
,
!
"
,
$
"
$
$
$
"
%
,
! !
,
"
"
-
!
"
%
)
&
!
,
"
%
%
"
&
"
"
,
"
/
$
$
%8
&
%
-
)
"
$
%
%
C (
).
%
,
!
+
"
"
,
-
!
>
%
%
!
(
(
&
)%
C &
)
D
C
C
C&
)
C&
)
C&
)
0 !
0
$
$&
)
'
C
D
/ 1
,
"
3
$
40 !
C
&
)
C & )
-
" /
-
-
.
.
.
%
//
/
%
2F4
%.
40
!
-
$
-
-
%
"
%
$
"
%
"
,
%.
/
5
/
!
!
!
$
/
"
8
/
- .
EF%
.
+
"
$
$
"
+
!
%8
!
& % %
$
)
/
8
"
"
%
"
"
/
+
>$
'%
'
!
"
.
!
%
&
+
/ ,
41G
" +
"
-BG
9$
() !
/
(%
$1 G
! %
' ( &
' )
.
'
"
(
!
(
H
#
"
!
'(
%
!
"
!
$
"
!
"
$
!
0>2 !
"
0<2%
"
%
$
!
-
9
4
!
$"
! $
!
%:
!
!
"
+
4
"$
& =)
"
"$
%
!
%
+
!
"$
%
!
$
%
!
I
$
$
%
!
%=
+
!
"
-
"
9%6
$
%
-
%
!
!
"
%
+
!
$
,
% 8
J
%8
$
!
"
%
0H K2%
$
A
$
!
&
!
!
!
"
)
$
%
6
"
"$
"
%
!
$
"
%
!
!
"
%
!
!
!
"
"
!
,
!
!
*
+
,
!
"
+
%
!
/
!
!
$
K
%
%
%
!
"$
%8
!
%
"
!
!
"
(
$
$
%
$
!
!
!
!
%(
"
!
%
64
!
"
!
$
9
!
"
"
$
$
$ =+
%
$
$
!
!
"
%
"
"
%
4
& )
"
"
%
& !
+ -
'(
.
$ I
'
J
(
"
+
"
,
!
%8
"
L
"
$
$
"
"
%8
$
(
%
"
"
+
$ (
%
"
/
!
+%
94 .
!
8
%
A
'(
%
"
%M
"
"
/
'(
%
"
!
!
!
%
"
+
%
"
"#
&( ) 0;2
"
"
"
"
-
"
+
!
"
!
! %&
I
&'
$
$
( "#
(
0L 1B2
+
"
!
%
!
% ( "#
0L 1B2% *
"
.
+
I
<$H
1$;%)
)G
4
%
"
+
$
"
1B
%
%
"
%
&I
)
!
/
& % %
)G
4
"
%
"
!
&
)
#
&
!
" &I
!
% &.
!
!
#
)G
/
)G
/
5
4
/ ,
%
%
"
"
%
"
"
"
4
)G
"
& 6% 1)
H&
%
4
"
6
"
. I
!
& &5
!
$
+
%
4
!
) G
"
!
$
%
&6)
6/ ,
"
$
%
4
)G
!
$
"
"
,
.
,
"
%8
"
/
+
"
&
"
"
,
"
"
& )
$
%
$
" 1%
"
%8
"
%'
"
"
)
"
!
" 1% 8
"
"
!
,
"
"
%
"
"
!%
Initialization
te: the assessed target (a system or subsystem or a service)
py(to, ir, ep, cr): the policy on te:
?
B;
?
6- &
?
1 %%% )
op(qa_i) = (0,0,1); op(te) = (0,0,1)
1. Monitor te’s performance regarding te’s quality attributes in
specified period t.
2. For
? & 1 %%% ) ,
If the monitored result is better than
Else,
?
? &
3. For
&
% %
? )
1 %%% ) , calculate the opinion:
&
?
?
?
).
?
,
?
;
.
'
(
!
(
11
4. Based on the importance rates on different attributes, calcu-
& )
late a combined opinion:
&
?
? ) %
1
& )
5. If
%
make trust decision; else, make distrust de-
cision.
""
#
.
%
$
"
4
%
"
" !
"
"
,
!
!
$
%
4
%
$
%
$
4
!
"
%
!
!
$
!
$
"
"
%8
%
"
"
4
!
" "
$
%
"
"
!
+
$
$
$
%
"
%'
" 1% 8
"
"
&'
"
"
"
% .
"
%.
" 1%
% 8
!
"
"
!
"
%
"
!
"
!
!
%8
%'
"
"
" "
!
"
$
"
!
%
$
$
"
"
!%
Initialization
Considering ATM = (TR,TA,AO)
'
? & 1 %%% ) : the trust management operations applied
for TR
16
%
%
?
?
B;
6; &
?
1 %%% )
op = op(ao_i) = (0,0,1)
py(to, ir, ep, cr): the policy on AO
: the set of selected operations
At the Mechanism Base, generate opinions on operations
1. Do trust assessment, if
' 1,
&
?
1 %%% )
Else, find the operations po_i that cause the problems:
? &
"
&
? ,
2. For
3. If
1 %%% 7 ) & "
%
&
' ),
? )
&
? ) or
?
&
?
?
?
1 %%% 7 )-
?
"
)
' 1 , put ao_i (with opinion below
? &
threshold) or po_i into a set
1 %%% ) , upgrade
these operations in RO with better ones
At the Selection Engine, select suitable operations.
For each composition of a set of upgrading operations CO, do
3.1 Get existing opinions of new selected operations supported by the system op(co_j) (j=1,...,m)
3.2. Aggregate above opinions
&
? 8)
&
? ) & 8 1 %%%
)&
1 %%%
)
?
'
% , add CO into S
3.3. If
3.4. If
, order all opinions of the operation sets in
using
select operation set with highest opinion be-
lief from
4. Go to step 1
; else raise warning message
%
' $
"
*
( "#
'(
'(
%*
% '
" !
!
'(
!
%
!
!
%
%5
$
$
$
$
"
" !
'(
$
"
%8
"
%
"
!
+
"
!
!
%
$
!
.
I
'
"
"
"
'(
(
!
(
19
"
%
"
"
"
-
$
,
"
"
$
%
" "
!
!
! !
+$ !
%*
!
%
$
$
"
"
"
"
+
"
"
$
$
%
!
%
$
!
I%A
" =: 8 =.
N
5
I%
(
"
;.
3
:
# %
I%(
!
$
$
=
%
(
1% I= I
.
*
6%
%7
!A
1LL9%
%(
(
.(
(
9%
M
(
7
A
7
;% .% OP
8
>%
H%
K%
L%
8
% 6G1> 6BBB%
8===
.
!A
$
8===
8
.
&
$
%8
6BB9)
6BB9%
.
:
$'
(
% 6BB6% '
6; 8
1L $ 6< 6BB6 .
A " "
8
O
:
33 $
L&9) %6HLG916 O
6BB1%
N 5
A
A
! ( !
%8 A $
( !
=
8 (= RB6 5
A
!
% 6<<$6><%
O%
% 6BB;% 8
'
(
%
8 A
9B =: 5 8 5
&=
RB;) N
BB * $
I .
91 $ (
" B9 6BB;
% >11$>1L
=
A
'
O
A
*
'
.
5
A
8===
(
O
6BB9
% <<$>6%
7
& 7) A (
1%6 6BB9%
4JJ!!!%
% J
J A J
%- N
#
N%- *
%- A
N% =
7 (
!
$
) A
8=== 8
(
&(
6BB;) 1<$1K ( % 6BB;
% 9B9 G 91B%
Q !
<%
9&;)
A
1;
%
%
1B% !
.% . ( "#
8
6BB9%
.
A6A
,
%0
&'
!
%8 A
6BB9)
&
*+ !
!
.
- .
7
/
12/
1
%%%%%%
6
"
% 9
1
6
%%%%%%
/
&
$
1)
$
1
"
&' !
/ !
"$
%
%
"
,
"
&
1
6
%
%%%%%%
/
%
) "
-
-
1
1
1
%
!
&0
12/
"
/
"
&
"
)% *
1
J
J
J
$
$
$
1
!
"
,
&!
"
6 )%
%
&
"
)
"
%
!
7
30
14/
!
'
&
!
'
View publication stats
&
'
'
'
"
'
'
)
'
)
'
&
) !
'
"
-
'
&
'
%.
)%
!