Skip to main content

Trust and Reputation for Successful Software Self-organisation

  • Chapter
Self-organising Software

Part of the book series: Natural Computing Series ((NCS))

Abstract

An increasing number of dynamic software evolution approaches is commonly based on integrating or utilising new pieces of software. This requires resolution of issues such as ensuring awareness of newly available software pieces and selection of most appropriate software pieces to use. Other chapters in this book discuss dynamic software evolution focusing primarily on awareness, integration and utilisation of new software pieces, paying less attention on how selection among different software pieces is made. The selection issue is quite important since in the increasingly dynamic software world quite a few new software pieces occur over time, some of which being of lower utility, lower quality or even potentially harmful and malicious (for example, a new piece of software may contain hidden spyware, or it may be a virus). In this chapter, we describe how computational trust and reputation can be used to avoid choosing new pieces of software that may be malicious or of lower quality. We start by describing computational models of trust and reputation, and subsequently we apply them in two application domains: firstly, in quality assessment of open source software, discussing the case where different trustors have different understandings of trust and trust estimation methods, and secondly, in protection of open collaborative software, such as Wikipedia.

More and more software is reused, mixed and mingled. How to obtain a trustworthy software mix?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    FOAF (Friend of a Friend) is a project devoted to linking people and information using the Web. The FOAF vocabulary is a machine-readable ontology describing persons, their activities and their relations to other people and objects, which is defined using RDF and OWL technologies.

References

  1. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS (2000)

    Google Scholar 

  2. Ball, E., Chadwick, D.W., Basden, A.: The implementation of a system for evaluating trust in a PKI environment. In: Proceedings of Trust in the Network Economy, Evolaris (2003)

    Google Scholar 

  3. Bizer, C., Cyganiak, R., Gauss, T., Maresh, O.: The TriQL.P browser: filtering information using context, content and rating-based trust policies. In: Proceedings of the Semantic Web and Policy Workshop (2005)

    Google Scholar 

  4. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 17th IEEE Symposium on Security and Privacy (1996)

    Google Scholar 

  5. Bryce, C., Couderc, P., Seigneur, J.M., Cahill, V.: Implementation of the secure trust engine. In: iTrust, pp. 397–401 (2005)

    Google Scholar 

  6. Castelfranchi, C., Falcone, R., Peluzzo, G.: Trust in information sources as a source for trust: a fuzzy approach. In: Proceedings of the 1st Conference on Autonomous Agent and Multi-Agent Systems (AAMAS). ACM, New York (2003)

    Google Scholar 

  7. Christianson, B., Harbison, W.S.: Why isn’t trust transitive. In: Security Protocols Workshop, pp. 171–176 (1996)

    Google Scholar 

  8. Cissee, R., Albayak, S.: An agent-based approach for privacy-preserving recommender systems. In: Proceedings of the Sixth Conference on Autonomous Agent and Multi-Agent Systems (AAMAS). ACM, New York (2007)

    Google Scholar 

  9. Computational trust community. http://www.trustcomp.org (2004)

  10. Conte, R., Paolucci, M.: Reputation in Artificial Societies: Social Beliefs for Social Order. Kluwer Academic, Norwell (2002)

    Google Scholar 

  11. Despotovic, Z., Aberer, K.: Maximum likelihood estimation of peers performance in P2P networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)

    Google Scholar 

  12. Dondio, P., Barrett, S., Weber, S., Seigneur, J.M.: Extracting trust from domain analysis: a case study on the Wikipedia project. In: ATC, pp. 362–373 (2006)

    Google Scholar 

  13. erep:social knowledge for e-governance. http://megatron.iiia.csic.es/eRep (2006)

  14. Fenton, N., Neil, M.: Combining evidence in risk analysis using Bayesian networks. Tech. Rep., Agena (2004)

    Google Scholar 

  15. Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. Dissertation, University of California, Irvine (2000)

    Google Scholar 

  16. Frewer, L., Miles, S.: Temporal stability of the psychological determinants of trust: implications for communication about food risks. Health, Risk Soc. 5, 259–271 (2003)

    Article  Google Scholar 

  17. Gambetta, D.: Can we trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237 (2000). Published Online, Chap. 13. http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf

    Google Scholar 

  18. Giles, J.: Special report: Internet encyclopedias go head to head. Nature 438, 900–901 (2005). doi:10.1038/438900a

    Article  Google Scholar 

  19. Golbeck, J., Parsia, B.: Trusting claims from trusted sources: trust network based filtering of aggregated claims. In: Proceedings of the 3rd International Semantic Web Conference. LNCS, vol. 3298. Springer, Berlin (2004). http://www.mindswap.org/papers/Jen-ISWC04.pdf

    Google Scholar 

  20. Gonzalez-Barahona, J.M., Conklin, M., Robles, G.: Public data about software development. In: Proceedings of the International Conference on Open Source Software (2006)

    Google Scholar 

  21. Gordijn, J., Tan, Y.H.: A design methodology for trust and value exchanges in business models. In: Proceedings of the 16th Bled Electronic Commerce Conference (2003)

    Google Scholar 

  22. Guha, R.: Open rating systems. Techn. Rep., Stanford University (2004)

    Google Scholar 

  23. Jøsang, A.: The right type of trust for distributed systems. In: Proceedings of the New Security Paradigms Workshop. ACM, New York (1996). http://citeseer.nj.nec.com/47043.html

    Google Scholar 

  24. Lerch, J., Prietula, M., Kulik, C.: The Turing effect: the nature of trust in expert systems advice. In: Expertise in Context. AAAI, MIT Press, Cambridge (1997)

    Google Scholar 

  25. Longo, L., Dondio, P., Barrett, S.: Temporal factors to evaluate trustworthiness of virtual identities. In: Proceedings of SECOVAL (2007), Third International Workshop on the Value of Security through Collaboration (2007)

    Google Scholar 

  26. Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237 (2000). Chap. 13. Published Online http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf

    Google Scholar 

  27. Marsh, S.: Formalising trust as a computational concept. Ph.D. dissertation, University of Stirling, Department of Mathematics and Computer Science (1994). http://citeseer.nj.nec.com/marsh94formalising.html

  28. Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on Epinions.com community. In: AAAI, pp. 121–126 (2005)

    Google Scholar 

  29. McGuiness, D., Zeng, H., da Silva, P.P., Ding, L., Narayanan, D., Bhaowal, M.: Investigations into trust for collaborative information repositories: a Wikipedia case study. In: Proceedings of the WWW2006 Workshop on the Models of Trust for the Web (MTW’06). ACM, New York (2006)

    Google Scholar 

  30. McKnight, D.H., Chervany, N.L.: What is trust? A conceptual analysis and an interdisciplinary model. In: Proceedings of the Americas Conference on Information Systems (2000)

    Google Scholar 

  31. Messery, A.E.: Expectations enhanced trust value. In: Ninth Workshop on Trust in Agent Societies, pp. 70–77 (2007)

    Google Scholar 

  32. Olsson, O.: Privacy protection and trust models. Ercim News (2002)

    Google Scholar 

  33. Pawlak, M.: Project management interface (pmi). Techn. Rep., University of Geneva (2005)

    Google Scholar 

  34. Pinyol, I., Jordi, S.M., Guifre, C.: How to talk about reputation using a common ontology: from definition to implementation. In: Ninth Workshop on Trust in Agent Societies, pp. 90–102 (2007)

    Google Scholar 

  35. Rahman, A.F.: A framework for decentralised trust reasoning. Ph.D. dissertation, University of London (2005)

    Google Scholar 

  36. Raymond, E.S.: The Cathedral and the Bazar (1997)

    Google Scholar 

  37. Romano, D.M.: The nature of trust: conceptual and operational clarification. Ph.D. dissertation, Louisiana State University (2004)

    Google Scholar 

  38. Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: First International Conference on Autonomous Agents and Multiagent systems (AAMAS-02), pp. 475–482 (2002)

    Chapter  Google Scholar 

  39. Schach, S.R.: Colloquium presentation (2004)

    Google Scholar 

  40. Seigneur, J.M.: Trust, security and privacy in global computing. Ph.D. dissertation, Trinity College Dublin (2005)

    Google Scholar 

  41. Seigneur, J.M.: Security evaluation of free/open source software powered by a peer-to-peer ecosystem. In: Proceedings of the Workshop on Evaluation Frameworks for Open Source Software, OSS International Conference (2006)

    Google Scholar 

  42. Seigneur, J.M., Jensen, C.D.: Trading privacy for trust. In: iTrust, pp. 93–107 (2004)

    Google Scholar 

  43. Stanford guidelines. http://credibility.stanford.edu/guidelines

  44. Stewart, K.J., Gosain, S.: An exploratory study of ideology and trust in open source development groups. In: Proceedings of the International Conference on Information Systems (2001)

    Google Scholar 

  45. Suryanarayana, G., Erenkrantz, J.R., Taylor, R.: An architectural approach for decentralised trust management. IEEE Internet Comput. (2005)

    Google Scholar 

  46. Terzis, S., Wagealla, W., English, C., McGettrick, A., Nixon, P.: The secure collaboration model. Techn. Rep., Trinity College Dublin (2004). http://secure.dsg.cs.tcd.ie

  47. Tversky, A., Kahneman, D.: Judgment under uncertainty: heuristics and biases. Science, New Ser. 185(4157), 1124–1131 (1974)

    Google Scholar 

  48. Wang, Y., Vassileva, J.: Bayesian network trust model in peer-to-peer networks. In: AP2PC, pp. 23–34 (2003)

    Google Scholar 

  49. Wikipedia encyclopedia. www.wikipedia.org

  50. Ziegler, C.N., Golbeck, J.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43(2), 460–475 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jean-Marc Seigneur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Seigneur, JM., Dondio, P. (2011). Trust and Reputation for Successful Software Self-organisation. In: Di Marzo Serugendo, G., Gleizes, MP., Karageorgos, A. (eds) Self-organising Software. Natural Computing Series. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17348-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17348-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17347-9

  • Online ISBN: 978-3-642-17348-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics