Abstract
An increasing number of dynamic software evolution approaches is commonly based on integrating or utilising new pieces of software. This requires resolution of issues such as ensuring awareness of newly available software pieces and selection of most appropriate software pieces to use. Other chapters in this book discuss dynamic software evolution focusing primarily on awareness, integration and utilisation of new software pieces, paying less attention on how selection among different software pieces is made. The selection issue is quite important since in the increasingly dynamic software world quite a few new software pieces occur over time, some of which being of lower utility, lower quality or even potentially harmful and malicious (for example, a new piece of software may contain hidden spyware, or it may be a virus). In this chapter, we describe how computational trust and reputation can be used to avoid choosing new pieces of software that may be malicious or of lower quality. We start by describing computational models of trust and reputation, and subsequently we apply them in two application domains: firstly, in quality assessment of open source software, discussing the case where different trustors have different understandings of trust and trust estimation methods, and secondly, in protection of open collaborative software, such as Wikipedia.
More and more software is reused, mixed and mingled. How to obtain a trustworthy software mix?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
FOAF (Friend of a Friend) is a project devoted to linking people and information using the Web. The FOAF vocabulary is a machine-readable ontology describing persons, their activities and their relations to other people and objects, which is defined using RDF and OWL technologies.
References
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS (2000)
Ball, E., Chadwick, D.W., Basden, A.: The implementation of a system for evaluating trust in a PKI environment. In: Proceedings of Trust in the Network Economy, Evolaris (2003)
Bizer, C., Cyganiak, R., Gauss, T., Maresh, O.: The TriQL.P browser: filtering information using context, content and rating-based trust policies. In: Proceedings of the Semantic Web and Policy Workshop (2005)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 17th IEEE Symposium on Security and Privacy (1996)
Bryce, C., Couderc, P., Seigneur, J.M., Cahill, V.: Implementation of the secure trust engine. In: iTrust, pp. 397–401 (2005)
Castelfranchi, C., Falcone, R., Peluzzo, G.: Trust in information sources as a source for trust: a fuzzy approach. In: Proceedings of the 1st Conference on Autonomous Agent and Multi-Agent Systems (AAMAS). ACM, New York (2003)
Christianson, B., Harbison, W.S.: Why isn’t trust transitive. In: Security Protocols Workshop, pp. 171–176 (1996)
Cissee, R., Albayak, S.: An agent-based approach for privacy-preserving recommender systems. In: Proceedings of the Sixth Conference on Autonomous Agent and Multi-Agent Systems (AAMAS). ACM, New York (2007)
Computational trust community. http://www.trustcomp.org (2004)
Conte, R., Paolucci, M.: Reputation in Artificial Societies: Social Beliefs for Social Order. Kluwer Academic, Norwell (2002)
Despotovic, Z., Aberer, K.: Maximum likelihood estimation of peers performance in P2P networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)
Dondio, P., Barrett, S., Weber, S., Seigneur, J.M.: Extracting trust from domain analysis: a case study on the Wikipedia project. In: ATC, pp. 362–373 (2006)
erep:social knowledge for e-governance. http://megatron.iiia.csic.es/eRep (2006)
Fenton, N., Neil, M.: Combining evidence in risk analysis using Bayesian networks. Tech. Rep., Agena (2004)
Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. Dissertation, University of California, Irvine (2000)
Frewer, L., Miles, S.: Temporal stability of the psychological determinants of trust: implications for communication about food risks. Health, Risk Soc. 5, 259–271 (2003)
Gambetta, D.: Can we trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237 (2000). Published Online, Chap. 13. http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
Giles, J.: Special report: Internet encyclopedias go head to head. Nature 438, 900–901 (2005). doi:10.1038/438900a
Golbeck, J., Parsia, B.: Trusting claims from trusted sources: trust network based filtering of aggregated claims. In: Proceedings of the 3rd International Semantic Web Conference. LNCS, vol. 3298. Springer, Berlin (2004). http://www.mindswap.org/papers/Jen-ISWC04.pdf
Gonzalez-Barahona, J.M., Conklin, M., Robles, G.: Public data about software development. In: Proceedings of the International Conference on Open Source Software (2006)
Gordijn, J., Tan, Y.H.: A design methodology for trust and value exchanges in business models. In: Proceedings of the 16th Bled Electronic Commerce Conference (2003)
Guha, R.: Open rating systems. Techn. Rep., Stanford University (2004)
Jøsang, A.: The right type of trust for distributed systems. In: Proceedings of the New Security Paradigms Workshop. ACM, New York (1996). http://citeseer.nj.nec.com/47043.html
Lerch, J., Prietula, M., Kulik, C.: The Turing effect: the nature of trust in expert systems advice. In: Expertise in Context. AAAI, MIT Press, Cambridge (1997)
Longo, L., Dondio, P., Barrett, S.: Temporal factors to evaluate trustworthiness of virtual identities. In: Proceedings of SECOVAL (2007), Third International Workshop on the Value of Security through Collaboration (2007)
Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237 (2000). Chap. 13. Published Online http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
Marsh, S.: Formalising trust as a computational concept. Ph.D. dissertation, University of Stirling, Department of Mathematics and Computer Science (1994). http://citeseer.nj.nec.com/marsh94formalising.html
Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on Epinions.com community. In: AAAI, pp. 121–126 (2005)
McGuiness, D., Zeng, H., da Silva, P.P., Ding, L., Narayanan, D., Bhaowal, M.: Investigations into trust for collaborative information repositories: a Wikipedia case study. In: Proceedings of the WWW2006 Workshop on the Models of Trust for the Web (MTW’06). ACM, New York (2006)
McKnight, D.H., Chervany, N.L.: What is trust? A conceptual analysis and an interdisciplinary model. In: Proceedings of the Americas Conference on Information Systems (2000)
Messery, A.E.: Expectations enhanced trust value. In: Ninth Workshop on Trust in Agent Societies, pp. 70–77 (2007)
Olsson, O.: Privacy protection and trust models. Ercim News (2002)
Pawlak, M.: Project management interface (pmi). Techn. Rep., University of Geneva (2005)
Pinyol, I., Jordi, S.M., Guifre, C.: How to talk about reputation using a common ontology: from definition to implementation. In: Ninth Workshop on Trust in Agent Societies, pp. 90–102 (2007)
Rahman, A.F.: A framework for decentralised trust reasoning. Ph.D. dissertation, University of London (2005)
Raymond, E.S.: The Cathedral and the Bazar (1997)
Romano, D.M.: The nature of trust: conceptual and operational clarification. Ph.D. dissertation, Louisiana State University (2004)
Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: First International Conference on Autonomous Agents and Multiagent systems (AAMAS-02), pp. 475–482 (2002)
Schach, S.R.: Colloquium presentation (2004)
Seigneur, J.M.: Trust, security and privacy in global computing. Ph.D. dissertation, Trinity College Dublin (2005)
Seigneur, J.M.: Security evaluation of free/open source software powered by a peer-to-peer ecosystem. In: Proceedings of the Workshop on Evaluation Frameworks for Open Source Software, OSS International Conference (2006)
Seigneur, J.M., Jensen, C.D.: Trading privacy for trust. In: iTrust, pp. 93–107 (2004)
Stanford guidelines. http://credibility.stanford.edu/guidelines
Stewart, K.J., Gosain, S.: An exploratory study of ideology and trust in open source development groups. In: Proceedings of the International Conference on Information Systems (2001)
Suryanarayana, G., Erenkrantz, J.R., Taylor, R.: An architectural approach for decentralised trust management. IEEE Internet Comput. (2005)
Terzis, S., Wagealla, W., English, C., McGettrick, A., Nixon, P.: The secure collaboration model. Techn. Rep., Trinity College Dublin (2004). http://secure.dsg.cs.tcd.ie
Tversky, A., Kahneman, D.: Judgment under uncertainty: heuristics and biases. Science, New Ser. 185(4157), 1124–1131 (1974)
Wang, Y., Vassileva, J.: Bayesian network trust model in peer-to-peer networks. In: AP2PC, pp. 23–34 (2003)
Wikipedia encyclopedia. www.wikipedia.org
Ziegler, C.N., Golbeck, J.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43(2), 460–475 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Seigneur, JM., Dondio, P. (2011). Trust and Reputation for Successful Software Self-organisation. In: Di Marzo Serugendo, G., Gleizes, MP., Karageorgos, A. (eds) Self-organising Software. Natural Computing Series. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17348-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-17348-6_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17347-9
Online ISBN: 978-3-642-17348-6
eBook Packages: Computer ScienceComputer Science (R0)