Monday, 28 March 2011

Trustworthiness for Resources & Data


An idea to deal with ‘resources trustworthiness’ is to have a “trust profile” related to each resource, the system should make use of available information to build these profiles that can be used to analyze the resource trustworthiness, which can be used in various ways (i.e. work allocation). To be able to use such idea it is important to know how to build these profiles, and how to make use of them. So, these are also important questions to answer to solve the problem of ‘Resource trustworthiness’:
a.     How to fill and update Trust informed resource profile?
b.     How to make use of these Trust profiles in BPM systems (e.g. Trust base work allocation)?
Similar idea could be used to solve the problem of ‘data trustworthiness’, as annotations could be added to data to represent trust requirements for the data (wither it is control data or object data), where a system could use these annotated data to honor the trust requirements. To apply such solution we first must answer the questions on how to annotate trust requirements within data, and how a BPM system can exploit these trust annotated data. So, another two important questions are:
a.     How to build a trust annotated data?
b.     How to exploit Trust annotated data in BPM systems?

No comments:

Post a Comment