Managing Obligation Delegation: Incentive Model and Experiment

Chen, Liang, Zeng, Cheng, Vidalis, Stilianos and Jie, Wei ORCID: https://orcid.org/0000-0002-5392-0009 (2024) Managing Obligation Delegation: Incentive Model and Experiment. Security and Privacy. (In Press)

[thumbnail of No Accepted manuscript policy for this Hybrid Journal]
Preview
PDF (No Accepted manuscript policy for this Hybrid Journal)
Wiley - Security and Privacy.pdf - Accepted Version

Download (3MB) | Preview

Abstract

Obligations are essential part of security policies, which specify what actions a user is obliged to perform in the future. One interesting feature of obligations is unenforceable, that is, the system cannot guarantee that each obligation will be fulfilled. Indeed, obligations go unfulfilled for a variety of reasons. For example, a user may have a family emergency that leads her having little time to discharge assigned obligations. We argue that delegation of obligations can be regarded as a means of providing opportunity for obligations to be discharged. However, this opportunity will be wasted if users who received delegation do not fulfil the obligations eventually. In this paper we propose a mechanism that incentivises users to accept and fulfil obligations for others by rewarding users credits. The amount of credits that can be earned depends on their trust rating, which reflects precisely how diligent of individuals in fulfilling obligations in the past. Users are motivated to raise up their trust ratings by fulfilling obligations for others, in order to earn more credits in the future. To evaluate our approach, we develop a multiple-agent system that simulates a number of different profiles for agents and run experiments for one-hop delegation and cascaded delegation with those agents. The experiments show a rich set of results, one of which confirms that delegation with incentives achieves the best outcome in terms of the number of obligations being fulfilled. Also, we implemented the modified ϵ-greedy algorithm, one of the closely related existing works, in our experimental framework and compared its performance to our approach. The results show that our approach offers greater flexibility and efficiency, as well as a higher obligation fulfilment rate.

Item Type: Article
Subjects: Computing > Information security
Depositing User: WEI JIE
Date Deposited: 10 Dec 2024 08:32
Last Modified: 10 Dec 2024 08:32
URI: https://repository.uwl.ac.uk/id/eprint/12968

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu