An
idea to deal with ‘resources trustworthiness’ is to have a “trust profile”
related to each resource, the system should make use of available information
to build these profiles that can be used to analyze the resource trustworthiness,
which can be used in various ways (i.e. work allocation). To be able to use
such idea it is important to know how to build these profiles, and how to make
use of them. So, these are also important questions to answer to solve the
problem of ‘Resource trustworthiness’:
a.
How to fill and update Trust
informed resource profile?
b.
How to make use of these
Trust profiles in BPM systems (e.g. Trust base work allocation)?
Similar
idea could be used to solve the problem of ‘data trustworthiness’, as annotations
could be added to data to represent trust requirements for the data (wither it
is control data or object data), where a system could use these annotated data
to honor the trust requirements. To apply such solution we first must answer
the questions on how to annotate trust requirements within data, and how a BPM
system can exploit these trust annotated data. So, another two important
questions are:
a.
How to build a trust
annotated data?
b.
How to exploit Trust
annotated data in BPM systems?
No comments:
Post a Comment