SlideShare a Scribd company logo
1 of 47
Trust in Pervasive  Social Computing Licia Capra Dept of Computer Science University College London
EVOLUTION OF MOBILE TECHNOLOGY
TRANSFORMATION OF INTERNET USERS
A DIGITAL  TAPESTRY
PERVASIVE SOCIAL COMPUTING
A DIGITAL TAPESTRY ,[object Object],[object Object]
A DIGITAL TAPESTRY ,[object Object],[object Object]
CONNECTING SYPPLY & DEMAND ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COLLABORATIVE FILTERING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOCIAL NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE  TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the  Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B C D Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B X Y Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
= Intent & Competence
PHILOSOPHY OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D X Y Direct Trust for Judgements Direct Trust for Users C B Inferred Trust for Judgements
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],X A B C D ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd. “ The PageRank Citation Ranking: Bringing Order to the Web”. Stanford Digital Library. 1998
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],J. M. Kleinberg. “Authoritative Sources in a Hyperlinked Environment”. Journal of the ACM, 1999 ,[object Object],[object Object],0.25 0.25 0.25 0.25 0.75 0.25 0.50 0.25 0.75 1.00 1.25 0.75 0.20 0.27 0.33 0.20
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R. Lempel and S. Moran. “SALSA: the Stochastic Approach to for Link Structure Analysis”. ACM TOIS, 2001
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.5,   =0.3 for SOFIA;   =0.3 for PPR;   =0.05 for N-SOFIA 1709 115 30 8 2 1 PPR 1136 63 12 3 1 1 N-SOFIA 855 31 4 1 1 1 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.9,   =0.05 for SOFIA;   =0.5 for PPR;   =0.01 for N-SOFIA 16025 2188 344 66 12 5 PPR 6954 822 157 32 6 2 N-SOFIA 7429 992 174 32 6 2 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ROBUSTNESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS Lower values of    improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
UNLOCKING THE  TAPESTRY
UNLOCKING THE TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY Evaluate Browse Build
UNLOCKING THE TAPESTRY HOW TO  BUILD  AN UNLOCKED TAPESTRY
HOW TO BUILD AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  BROWSE  AN UNLOCKED TAPESTRY
HOW TO BROWSE AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  EVALUATE  OUR APPROACHES
HOW TO EVALUATE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU! ,[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationLicia Capra
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationLiquis
 
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5WebExpo
 
Tomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuTomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuWebExpo
 
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraPetr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraWebExpo
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishingjeannebarker
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuWebExpo
 
Jakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorJakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorWebExpo
 
Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015HeshamAnwar
 
Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!WebExpo
 
WebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo
 
Lukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleLukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleWebExpo
 
Jakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchJakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchWebExpo
 
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánJiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánWebExpo
 
Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?WebExpo
 

Viewers also liked (16)

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness Presentation
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf Presentation
 
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
 
Tomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuTomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designu
 
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraPetr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishing
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementu
 
Hotmail Add Other Account
Hotmail Add Other AccountHotmail Add Other Account
Hotmail Add Other Account
 
Jakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorJakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with Phabricator
 
Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015
 
Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!
 
WebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo 2008 Glogster
WebExpo 2008 Glogster
 
Lukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleLukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživatele
 
Jakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchJakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiích
 
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánJiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
 
Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?
 

Similar to ARM'08 - Keynote Talk

Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systemsguest77b0cd12
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkLora Aroyo
 
Telefonica Lunch Seminar
Telefonica Lunch SeminarTelefonica Lunch Seminar
Telefonica Lunch SeminarNeal Lathia
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfBalasundaramSr
 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network SitesXenia K-i
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Xiaohan Zeng
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyoLora Aroyo
 
Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Shalin Hai-Jew
 
Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Wael Elrifai
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreWael Elrifai
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018Arsalan Khan
 
A recommender system for social learning platforms
A recommender system for social learning platformsA recommender system for social learning platforms
A recommender system for social learning platformsSoudé Fazeli
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisWael Elrifai
 
Learning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksLearning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksSymeon Papadopoulos
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Daniel Katz
 

Similar to ARM'08 - Keynote Talk (20)

Content-based link prediction
Content-based link predictionContent-based link prediction
Content-based link prediction
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Telefonica Lunch Seminar
Telefonica Lunch SeminarTelefonica Lunch Seminar
Telefonica Lunch Seminar
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network Sites
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyo
 
Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...
 
Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
A recommender system for social learning platforms
A recommender system for social learning platformsA recommender system for social learning platforms
A recommender system for social learning platforms
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Ppt
PptPpt
Ppt
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence
 
Learning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksLearning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction Networks
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

ARM'08 - Keynote Talk

  • 1. Trust in Pervasive Social Computing Licia Capra Dept of Computer Science University College London
  • 2. EVOLUTION OF MOBILE TECHNOLOGY
  • 4. A DIGITAL TAPESTRY
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. BROWSING THE TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. = Intent & Competence
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 35. EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 36. EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 37. EXPERIMENTS – ROBUSTNESS Lower values of  improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 38. UNLOCKING THE TAPESTRY
  • 39.
  • 40. UNLOCKING THE TAPESTRY Evaluate Browse Build
  • 41. UNLOCKING THE TAPESTRY HOW TO BUILD AN UNLOCKED TAPESTRY
  • 42.
  • 43. UNLOCKING THE TAPESTRY HOW TO BROWSE AN UNLOCKED TAPESTRY
  • 44.
  • 45. UNLOCKING THE TAPESTRY HOW TO EVALUATE OUR APPROACHES
  • 46.
  • 47.