University of Hertfordshire

By the same authors

Beyond trust

Research output: Chapter in Book/Report/Conference proceedingChapter

Standard

Beyond trust. / Chowdhury, Partha Das; Christianson, Bruce.

Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Vol. 8809 Springer-Verlag, (Berlin-Heidelberg), 2014. p. 340-344 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingChapter

Harvard

Chowdhury, PD & Christianson, B 2014, Beyond trust. in Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. vol. 8809, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8809, Springer-Verlag, (Berlin-Heidelberg), pp. 340-344. https://doi.org/10.1007/978-3-319-12400-1_33

APA

Chowdhury, P. D., & Christianson, B. (2014). Beyond trust. In Security Protocols XXII - 22nd International Workshop, Revised Selected Papers (Vol. 8809, pp. 340-344). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8809). Springer-Verlag, (Berlin-Heidelberg). https://doi.org/10.1007/978-3-319-12400-1_33

Vancouver

Chowdhury PD, Christianson B. Beyond trust. In Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Vol. 8809. Springer-Verlag, (Berlin-Heidelberg). 2014. p. 340-344. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-12400-1_33

Author

Chowdhury, Partha Das ; Christianson, Bruce. / Beyond trust. Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Vol. 8809 Springer-Verlag, (Berlin-Heidelberg), 2014. pp. 340-344 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

Bibtex

@inbook{2d643baab26742a4ae76cba58bebd473,
title = "Beyond trust",
abstract = "Risk as studied conventionally and risk as manifested in actuality differ widely both in semantics and content. In this paper we explore the possibility of managing risk without resorting to transitive and compulsive relationships termed as “trust”. We draw an exploitable analogy with the assumptions under which cooperation is observed in repeated strategic games and posit that voluntary cooperation between players with mutually incompatible commitments is indeed possible provided that such cooperation can be promiscuous.",
author = "Chowdhury, {Partha Das} and Bruce Christianson",
year = "2014",
doi = "10.1007/978-3-319-12400-1_33",
language = "English",
isbn = "9783319123998",
volume = "8809",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer-Verlag, (Berlin-Heidelberg)",
pages = "340--344",
booktitle = "Security Protocols XXII - 22nd International Workshop, Revised Selected Papers",

}

RIS

TY - CHAP

T1 - Beyond trust

AU - Chowdhury, Partha Das

AU - Christianson, Bruce

PY - 2014

Y1 - 2014

N2 - Risk as studied conventionally and risk as manifested in actuality differ widely both in semantics and content. In this paper we explore the possibility of managing risk without resorting to transitive and compulsive relationships termed as “trust”. We draw an exploitable analogy with the assumptions under which cooperation is observed in repeated strategic games and posit that voluntary cooperation between players with mutually incompatible commitments is indeed possible provided that such cooperation can be promiscuous.

AB - Risk as studied conventionally and risk as manifested in actuality differ widely both in semantics and content. In this paper we explore the possibility of managing risk without resorting to transitive and compulsive relationships termed as “trust”. We draw an exploitable analogy with the assumptions under which cooperation is observed in repeated strategic games and posit that voluntary cooperation between players with mutually incompatible commitments is indeed possible provided that such cooperation can be promiscuous.

UR - http://www.scopus.com/inward/record.url?scp=84921459744&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-12400-1_33

DO - 10.1007/978-3-319-12400-1_33

M3 - Chapter

AN - SCOPUS:84921459744

SN - 9783319123998

VL - 8809

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 340

EP - 344

BT - Security Protocols XXII - 22nd International Workshop, Revised Selected Papers

PB - Springer-Verlag, (Berlin-Heidelberg)

ER -