Using subjective logic to handle uncertainty and conflicts

Murat Sensoy*, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

In coalition operations, information from different sources belong to different organisations have to be gathered and aggregated. The information from these resources may not be consistent. Inconsistencies in the gathered information creates severe uncertainties that hinders the usefulness of the information. In this paper, we have propose a Subjective Logic based approach for modelling the trustworthiness of information sources within a specific context. This model is used to handle inconsistencies through filtering information from less trustworthy sources.

Original languageEnglish
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Pages1323-1326
Number of pages4
DOIs
Publication statusPublished - 5 Nov 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: 25 Jun 201227 Jun 2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
CountryUnited Kingdom
CityLiverpool
Period25/06/1227/06/12

Keywords

  • Conflict Resolution
  • Information Fusion
  • Trust

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Using subjective logic to handle uncertainty and conflicts'. Together they form a unique fingerprint.

  • Cite this

    Sensoy, M., Pan, J. Z., Fokoue, A., Srivatsa, M., & Meneguzzi, F. (2012). Using subjective logic to handle uncertainty and conflicts. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (pp. 1323-1326) https://doi.org/10.1109/TrustCom.2012.294