SlideShare a Scribd company logo
Proposal for Open Reputation Management Systems TC (ORMS) IIW, December 3-5, 2007, Mountain View   For information on OASIS IDtrust Member Section see:  http://www.oasis-idtrust.org/ For more information related to ‘Joining OASIS’ see:  http://www.oasis-open.org/join www.oasis-open.org Abbie Barbir  ( [email_address] ) Nortel OASIS IDtrust Steering Committee
OASIS  provides a neutral setting where government agencies, companies, research institutes, and individuals work together to advance the use of trusted infrastructures History PKI Forum migrated to OASIS PKI MS in November 2002 PKI MS transformed into IDtrust MS in 2007 IDtrust expanded its scope to encompass additional standards based identity and trusted infrastructure technologies, policies, and practices Steering Committee Abbie Barbir , Nortel June Leung , FundSERV Arshad Noor , StrongAuth John Sabo , CA, Inc. Ann Terwilliger , Visa International www.oasis-open.org IDtrust MS Background
Identity and Trusted Infrastructure components Studies and Projects addressing Identity and Trust models and standards; relevant protocols and standards; trust infrastructures in use; costs, benefits and risk management issues Identity and Trust Policies and Enforcement Policies; policy mapping and standardization; assurance; technical validation mechanisms; trust path building and validation Education and Outreach Documenting trust use cases and business case scenarios, best practices and adoption reports and papers; organizing conferences and workshops; and establishing Web-based resources Barriers and Emerging Issues  Data privacy issues; interoperability; cross border/ organizational trust; outsourcing; cryptographic issues; application integration; and international issues IDtrust Strategic Focus Areas
IDTrust Summary Current TCs Enterprise Key Management Infrastructure TC PKI Adoption TC OASIS Digital Signature Services (DSS) TC XRI TC Steering Committee developing new work plan for 2007/2008  Many opportunities to get involved We invite you to join OASIS and participate in the IDtrust MS and/or TCs For more information contact  Dee Schur: Dee.schur@oasis-open.org
Open Reputation Management Systems TC (ORMS) Setting the Stage Need established during OASIS IDtrust Burton workshop ( http://events.oasis-open.org/home/idtrust/2007  ) at Catalyst Europe 2007 Validated by talks in Catalyst Europe 2007, Barcelona,  Objectives of this talk Validation/improvement/feedback on the proposed TC charter Getting interested parties involved in TC work Identify co-chairs for the proposed TC Get Founding Members involved
Need for Reputation Data Framework Reputation Summary of past behavior of a subject within a specific context (function of time) Assumes that past behavior is indicative of future behavior good reputation increases the trustworthiness of an entity Reputation Score can be used as a foundation of Trust (within a context/interaction and testimonials ) Growing in popularity (online/social communities) Many Flavors for providing feedback/reputation data Centralized systems (eBay) Decentralized systems ( such as P2P file sharing systems)
Some Examples Filtering out content that does not meet reputation criteria through pre-filtering (by moderators) or post-filtering (by community) Reputation for content, creators and spaces Objects come with reputation metadata Implies an authoring and management system for those metadata Reputation metadata must be trustworthy, i.e., authenticated while respecting privacy Reputation system must be user-centric (i.e., trust decisions are controlled by user) and must offer choices for transparency (must not get into the way of using content, leaves it to the user how to handle trust decisions) Can I trust this  collaborative space ? Is all content correct? Is all content authorized? Is all content appropriate for me? What is the creator’s reputation? Can I trust this  content ? Is this content correct? Is this content authorized? Is this content appropriate for me? What is the creator’s reputation?
Principles of Reputation Reputation is one of the factors that trust is based on Reputation is someone else’s story about me Reputation is based on identity Reputation exists in the context of community Reputation is a currency Reputation is narrative (evolves through time) Reputation is based on claims (verified or not), transactions, ratings, and endorsements Reputation is multi-level Multiple people holding the same opinion increases the weight of that opinion Source: Windley et al
Reputation Management Framework  Build a generic open reputation system that is robust, scalable, IdM and application independent that supports a  flexible trust model  Data needed for the generation of reputation Cold start problem  Supports Multiple computational models Assertions/claims (within a context) Identity linking Portable Data model for users, credentials and claims Reputation based trust model Trust metrics; Verified claims and facts Direct and indirect transactions; Third party
Reputation Management Framework  Aggregation, Discovery and Storage How reputation scores are generated??? Central/distributed Authentication/trust of data and providers Data reputation exchange protocol Overall system security Transparency Users feedback privacy & selective disclosure What transactions a user can see Ability to do Self-Assessment
Example of ORMS Interactions B about C and C about B User B User C Interaction Feedback Feedback Reputation Store I Reputation Server Reputation Feedback Feedback Interaction User D Reputation Store II Reputation Server Common Data/Context Common Schema for Rep Score Common Protocol Convertible   credentials B about D and D about B Reputation Aggregator User E Inquire about  Score of D  within a context ; Access to  Reputation of II Reputation Reputation Store I Reputation Server Reputation
ORMS TC Charter Statement of Purpose/List of Deliverables To develop an Open Reputation Management System (ORMS) that provides the ability to use common data formats for representing reputation data, and standard definitions of reputation scores.  The system will not define algorithms for computing the scores. It will provide the means for understanding the relevancy of a score within a given transaction. The TC's output will enable the deployment of a distributed reputation systems that can be either centralized or decentralized with the ability for aggregators and intermediaries to be part of the business model. The standard does not tie itself to a specific IDM, but let implementers plug-in their identity-schemes to ORMS. List of deliverables: Use Cases Requirements document XML Schema for representing ORMS data XML Schema for Reputation Score  Assertions/claims (tokens) profiles Protocol(s) for exchanging of reputation data and assertion tokens Security, threats and  Risk analysis
ORMS TC Charter Use Cases and Requirement Gathering  Use cases to gather requirements that ORMS will need to meet and understand the business and social impact of such a system including security, privacy, threats and risks requirements will also be developed. Explore the use of reputation mechanisms in novel settings. Document that analyzes performance of existing reputation mechanisms with respect to the requirements developed in the previous steps and identify current gaps.
ORMS TC Charter Develop Framework for Open Reputation Data  Enabling data mining through standard reputation data tagging for content Development of common data models for expressing reputation data Development of standard way of exchanging reputation claims among systems Development of means of aggregating reputation data including delegation of claims generations and assertions Development of query/response communication protocols for exchanging reputation data in a trusted and secure fashion This step may develop a new protocol, or extend current ones such as SAML, OpenID etc
ORMS TC Charter Out of Scope  Algorithms that can be used for generating a reputation score are out of scope of this work. The work will define a standard way to infer what a given score will mean but will not specify how to compute that value. The work does not exclude methods for asserting equivalence or relationships between scoring systems. A possible output of the TC work might include methods to facilitate the calculation of comparisons between score ratings, or operations that take multiple scores as inputs.
ORMS TC Charter Proposed Leadership Co-chairs: Anthony Nadalin, IBM Co-chairs: XXX, TBD IPR Mode TBD, RF or RF/RAND?? Language English Start Time First Meeting: February or March 2008
Next Steps Feedback on scope and charter is encouraged We need community Participation and support Early adopters can be founding members with voting rights at the first TC meeting We need co-chairs and industry support Please send feedback to  [email_address]  or Dee Schur  [email_address]   Many Thanks for your time
Bckup Backup
Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity

More Related Content

PPT
Mattocks Ont Pragebx Rr 2004 12 08
PPT
Semantics in Financial Services -David Newman
PPTX
Canarie Federated Non Web Signon
PPTX
Classification of commercial and personal profiles on my space
PPT
Relationships at the Heart of Semantic Web: Modeling, Discovering, Validating...
PPT
F E A D R M A K M 2005 03 28
PPT
SEMANTIC CONTENT MANAGEMENT FOR ENTERPRISES AND NATIONAL SECURITY
PPT
Technical Developments within the UK Access Management Federation
Mattocks Ont Pragebx Rr 2004 12 08
Semantics in Financial Services -David Newman
Canarie Federated Non Web Signon
Classification of commercial and personal profiles on my space
Relationships at the Heart of Semantic Web: Modeling, Discovering, Validating...
F E A D R M A K M 2005 03 28
SEMANTIC CONTENT MANAGEMENT FOR ENTERPRISES AND NATIONAL SECURITY
Technical Developments within the UK Access Management Federation

Similar to Open Reputation Management Systems (20)

PPTX
A trust aggregation portal
PDF
Sas web 2010 lora-aroyo
PDF
Oasis: Standards & the Cloud June2011
PDF
Openid+Opensocial
PPTX
A novel approach for trust management for peer peer
PDF
Ontolog Forum: Semantic Interop March 2008
PPTX
Mobile Network Operators and Identity – Crossing the Chasm
PDF
Web 2.0 Expo Berlin: Open Platforms and the Social Graph
PDF
Identity Talk at Net Squared 2008
PPTX
Open Security - Chad Cravens
PPTX
Cloud computing
PPTX
Cs6703 grid and cloud computing unit 5
PPTX
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
PDF
SOA
PDF
Reputation based model for decision making in the digital age
PPTX
RSA Europe: Future of Cloud Identity
PDF
TUX-TMS: Thapar University Extensible-Trust Management System
PDF
Open Systems, Innovation and Competitiveness
PDF
Designing a logical security framework
PDF
Designing A Logical Security Framework for E-Commerce System Based on SOA
A trust aggregation portal
Sas web 2010 lora-aroyo
Oasis: Standards & the Cloud June2011
Openid+Opensocial
A novel approach for trust management for peer peer
Ontolog Forum: Semantic Interop March 2008
Mobile Network Operators and Identity – Crossing the Chasm
Web 2.0 Expo Berlin: Open Platforms and the Social Graph
Identity Talk at Net Squared 2008
Open Security - Chad Cravens
Cloud computing
Cs6703 grid and cloud computing unit 5
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
SOA
Reputation based model for decision making in the digital age
RSA Europe: Future of Cloud Identity
TUX-TMS: Thapar University Extensible-Trust Management System
Open Systems, Innovation and Competitiveness
Designing a logical security framework
Designing A Logical Security Framework for E-Commerce System Based on SOA
Ad

More from Abbie Barbir (10)

PDF
3rd deliverable preso v1.2a
PDF
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
PDF
Trust elevation-share
PPT
Itu ics-pii
PPT
Trust elevation-abbie-v1
PPT
Abbie Barbir Tcg Final
PPT
Crash Only Web Services
PPT
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
PPT
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
PPT
Oasis Telecom SOA Workshop Welecome Talk
3rd deliverable preso v1.2a
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
Trust elevation-share
Itu ics-pii
Trust elevation-abbie-v1
Abbie Barbir Tcg Final
Crash Only Web Services
BarbirThe Need of SDO Collaboration as an Enabler of SOA in NGN
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Oasis Telecom SOA Workshop Welecome Talk
Ad

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Empathic Computing: Creating Shared Understanding
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mushroom cultivation and it's methods.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
August Patch Tuesday
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Assigned Numbers - 2025 - Bluetooth® Document
OMC Textile Division Presentation 2021.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cloud_computing_Infrastucture_as_cloud_p
MIND Revenue Release Quarter 2 2025 Press Release
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Empathic Computing: Creating Shared Understanding
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Unlocking AI with Model Context Protocol (MCP)
Mushroom cultivation and it's methods.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
August Patch Tuesday
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Open Reputation Management Systems

  • 1. Proposal for Open Reputation Management Systems TC (ORMS) IIW, December 3-5, 2007, Mountain View For information on OASIS IDtrust Member Section see: http://www.oasis-idtrust.org/ For more information related to ‘Joining OASIS’ see: http://www.oasis-open.org/join www.oasis-open.org Abbie Barbir ( [email_address] ) Nortel OASIS IDtrust Steering Committee
  • 2. OASIS provides a neutral setting where government agencies, companies, research institutes, and individuals work together to advance the use of trusted infrastructures History PKI Forum migrated to OASIS PKI MS in November 2002 PKI MS transformed into IDtrust MS in 2007 IDtrust expanded its scope to encompass additional standards based identity and trusted infrastructure technologies, policies, and practices Steering Committee Abbie Barbir , Nortel June Leung , FundSERV Arshad Noor , StrongAuth John Sabo , CA, Inc. Ann Terwilliger , Visa International www.oasis-open.org IDtrust MS Background
  • 3. Identity and Trusted Infrastructure components Studies and Projects addressing Identity and Trust models and standards; relevant protocols and standards; trust infrastructures in use; costs, benefits and risk management issues Identity and Trust Policies and Enforcement Policies; policy mapping and standardization; assurance; technical validation mechanisms; trust path building and validation Education and Outreach Documenting trust use cases and business case scenarios, best practices and adoption reports and papers; organizing conferences and workshops; and establishing Web-based resources Barriers and Emerging Issues Data privacy issues; interoperability; cross border/ organizational trust; outsourcing; cryptographic issues; application integration; and international issues IDtrust Strategic Focus Areas
  • 4. IDTrust Summary Current TCs Enterprise Key Management Infrastructure TC PKI Adoption TC OASIS Digital Signature Services (DSS) TC XRI TC Steering Committee developing new work plan for 2007/2008 Many opportunities to get involved We invite you to join OASIS and participate in the IDtrust MS and/or TCs For more information contact Dee Schur: Dee.schur@oasis-open.org
  • 5. Open Reputation Management Systems TC (ORMS) Setting the Stage Need established during OASIS IDtrust Burton workshop ( http://events.oasis-open.org/home/idtrust/2007 ) at Catalyst Europe 2007 Validated by talks in Catalyst Europe 2007, Barcelona, Objectives of this talk Validation/improvement/feedback on the proposed TC charter Getting interested parties involved in TC work Identify co-chairs for the proposed TC Get Founding Members involved
  • 6. Need for Reputation Data Framework Reputation Summary of past behavior of a subject within a specific context (function of time) Assumes that past behavior is indicative of future behavior good reputation increases the trustworthiness of an entity Reputation Score can be used as a foundation of Trust (within a context/interaction and testimonials ) Growing in popularity (online/social communities) Many Flavors for providing feedback/reputation data Centralized systems (eBay) Decentralized systems ( such as P2P file sharing systems)
  • 7. Some Examples Filtering out content that does not meet reputation criteria through pre-filtering (by moderators) or post-filtering (by community) Reputation for content, creators and spaces Objects come with reputation metadata Implies an authoring and management system for those metadata Reputation metadata must be trustworthy, i.e., authenticated while respecting privacy Reputation system must be user-centric (i.e., trust decisions are controlled by user) and must offer choices for transparency (must not get into the way of using content, leaves it to the user how to handle trust decisions) Can I trust this collaborative space ? Is all content correct? Is all content authorized? Is all content appropriate for me? What is the creator’s reputation? Can I trust this content ? Is this content correct? Is this content authorized? Is this content appropriate for me? What is the creator’s reputation?
  • 8. Principles of Reputation Reputation is one of the factors that trust is based on Reputation is someone else’s story about me Reputation is based on identity Reputation exists in the context of community Reputation is a currency Reputation is narrative (evolves through time) Reputation is based on claims (verified or not), transactions, ratings, and endorsements Reputation is multi-level Multiple people holding the same opinion increases the weight of that opinion Source: Windley et al
  • 9. Reputation Management Framework Build a generic open reputation system that is robust, scalable, IdM and application independent that supports a flexible trust model Data needed for the generation of reputation Cold start problem Supports Multiple computational models Assertions/claims (within a context) Identity linking Portable Data model for users, credentials and claims Reputation based trust model Trust metrics; Verified claims and facts Direct and indirect transactions; Third party
  • 10. Reputation Management Framework Aggregation, Discovery and Storage How reputation scores are generated??? Central/distributed Authentication/trust of data and providers Data reputation exchange protocol Overall system security Transparency Users feedback privacy & selective disclosure What transactions a user can see Ability to do Self-Assessment
  • 11. Example of ORMS Interactions B about C and C about B User B User C Interaction Feedback Feedback Reputation Store I Reputation Server Reputation Feedback Feedback Interaction User D Reputation Store II Reputation Server Common Data/Context Common Schema for Rep Score Common Protocol Convertible credentials B about D and D about B Reputation Aggregator User E Inquire about Score of D within a context ; Access to Reputation of II Reputation Reputation Store I Reputation Server Reputation
  • 12. ORMS TC Charter Statement of Purpose/List of Deliverables To develop an Open Reputation Management System (ORMS) that provides the ability to use common data formats for representing reputation data, and standard definitions of reputation scores. The system will not define algorithms for computing the scores. It will provide the means for understanding the relevancy of a score within a given transaction. The TC's output will enable the deployment of a distributed reputation systems that can be either centralized or decentralized with the ability for aggregators and intermediaries to be part of the business model. The standard does not tie itself to a specific IDM, but let implementers plug-in their identity-schemes to ORMS. List of deliverables: Use Cases Requirements document XML Schema for representing ORMS data XML Schema for Reputation Score Assertions/claims (tokens) profiles Protocol(s) for exchanging of reputation data and assertion tokens Security, threats and Risk analysis
  • 13. ORMS TC Charter Use Cases and Requirement Gathering Use cases to gather requirements that ORMS will need to meet and understand the business and social impact of such a system including security, privacy, threats and risks requirements will also be developed. Explore the use of reputation mechanisms in novel settings. Document that analyzes performance of existing reputation mechanisms with respect to the requirements developed in the previous steps and identify current gaps.
  • 14. ORMS TC Charter Develop Framework for Open Reputation Data Enabling data mining through standard reputation data tagging for content Development of common data models for expressing reputation data Development of standard way of exchanging reputation claims among systems Development of means of aggregating reputation data including delegation of claims generations and assertions Development of query/response communication protocols for exchanging reputation data in a trusted and secure fashion This step may develop a new protocol, or extend current ones such as SAML, OpenID etc
  • 15. ORMS TC Charter Out of Scope Algorithms that can be used for generating a reputation score are out of scope of this work. The work will define a standard way to infer what a given score will mean but will not specify how to compute that value. The work does not exclude methods for asserting equivalence or relationships between scoring systems. A possible output of the TC work might include methods to facilitate the calculation of comparisons between score ratings, or operations that take multiple scores as inputs.
  • 16. ORMS TC Charter Proposed Leadership Co-chairs: Anthony Nadalin, IBM Co-chairs: XXX, TBD IPR Mode TBD, RF or RF/RAND?? Language English Start Time First Meeting: February or March 2008
  • 17. Next Steps Feedback on scope and charter is encouraged We need community Participation and support Early adopters can be founding members with voting rights at the first TC meeting We need co-chairs and industry support Please send feedback to [email_address] or Dee Schur [email_address] Many Thanks for your time
  • 19. Reputation Technology Summary of actual past behavior, by service provider Real identity Background check against external data Peer reviews portable specific Identity Verification, Identity Proofing = Strong Identity Trust in specific attribute or future behavior?  Digital Identity