Skip to main content

Trust Management Methodologies for the Web

  • Chapter
Reasoning Web. Semantic Technologies for the Web of Data (Reasoning Web 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6848))

Included in the following conference series:

Abstract

Trust and its support with appropriate trust management methodologies and technologies is becoming one crucial element for wider acceptance of web services. In the computing society trust and related issues were addressed already in the nineties of the former century, but the approaches from that period were about security, more precisely security services and security mechanisms. These approaches were followed by more advanced ones, where the first branch was based on Bayesian statistics, the second branch was based on Dempster-Shafer theory of evidence and its successors, most notably subjective logic, and the third branch originated from game theory. It is, however, important to note that at the core of trust there are cognition, assessment processes, and they are governed by various factors. Consequently, trust management methodologies should take these factors, which may ne rational, irrational, contextual, etc., into account. This research contribution will therefore provide an extensive overview of existing methodologies in the computer sciences field, followed by their evaluation in terms of their advantages and disadvantages. Further, some latest experimental results will be given that identify and evaluate some of those most important factors mentioned above. Finally, we will present a new trust management methodology called Qualitative Assessment Dynamics, QAD (aka Qualitative Algebra) that complements existing methodologies mentioned above, and that is aligned with the results of the latest experimental findings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Miller, J., Resnick, P., Singer, D.: PICS Rating Services and Rating Systems. W3C (1996), http://www.w3c.org/TR/REC-PICS-services

  2. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, pp. 164–173 (1996)

    Google Scholar 

  3. Herzberg, A., et al.: Access Control Meets Public Key Infrastructure. In: Proc. of the IEEE Conf. on Security and Privacy, Oakland, pp. 2–14 (2000)

    Google Scholar 

  4. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys 3(4), 2–13 (2000)

    Article  Google Scholar 

  5. Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. Of the 3rd Int. Conference on Peer-to-Peer Computing (P2P 2003), p. 150, Linkoping (2003)

    Google Scholar 

  6. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)

    Google Scholar 

  7. Jøsang, A.: A logic for uncertain probabilities. Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  8. Jøsang, A.: An Algebra for Assessing Trust in Certification Chanis. In: Proceedings of the Network and Distributed Systems Security Symposium, NDSS 1999, pp. 618–644. The Interent Society, San Diego (1999)

    Google Scholar 

  9. Yu, B., Singh, M.P.: Distributed Reputation Management for e-Commerce. In: Proc. of the 1st AA-MAS Conference, Bologna (2002)

    Google Scholar 

  10. Paul-Amaury, M., Morge, M., Toni, F.: Combining statistics and arguments to compute trust. In: Proc. of the 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AA-MAS), Toronto, pp. 209–216 (2010)

    Google Scholar 

  11. Tennenholtz, M.: Game-Theoretic Recommendations: Some Progress in an Uphill Battle.In: Proc. of AAMAS 2008, Estoril , pp. 10 –16, (2008)

    Google Scholar 

  12. Harish, M., Anandavelu, N., Anbalagan, N., Mahalakshmi, G.S., Geetha, T.V.: Design and analysis of a game theoretic model for P2P trust management. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2007. LNCS, vol. 4882, pp. 110–115. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Altman, A., Tennenholtz, M.: An axiomatic approach to personalized ranking systems. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI 2007), pp. 1187–1192. Morgan & Kaufmann, San Francisco (2007)

    Google Scholar 

  14. Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review 24(1), 33–60 (2005)

    Article  MATH  Google Scholar 

  15. Golbeck, J.: Trust on the World Wide Web: A survey. Foundation and Trends in Web Science 1(2), 131–197 (2006)

    Article  MATH  Google Scholar 

  16. Artz, D., Gil, Y.: A survey of trust in computer science and the Semantic Web. Software Engineering and the Semantic Web 5(2), 58–71 (2007)

    Article  Google Scholar 

  17. Kahneman, D., Slovic, P., Tversky, A. (eds.): Judgment Under Uncertainty, 22nd reprint. Cambridge University Press, Cambridge (2006)

    Google Scholar 

  18. Denning, D.: A new Paradigm for trusted systems. In: Proc. of ACM SIGSAC New Security Paradigms Workshop, pp. 36–41. ACM, New York (1993)

    Google Scholar 

  19. Trček, D.: A formal apparatus for modeling trust in computing environments. Mathematical and Computer Modeling 49(1-2), 226–233 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  20. Trček, D.: Ergonomic trust management in pervasive computing environments - qualitative assessment dynamics. In: Proceedings of the ICPCA 2010, pp. 1–7. IEEE Press, Maribor (2010)

    Google Scholar 

  21. Pfleeger, S.L., Kitchenham, B.A.: Principles of Survey Research, Parts 1-6. ACM Software Engineering Notes 26-28 (2001-2003)

    Google Scholar 

  22. Reding, V.: The need for a new impetus to the European ICT R & I Agenda. In: Int. High Level Research Seminar on “Trust in the Net”, Vienna (2006)

    Google Scholar 

  23. Kovač, D., Trček, D.: Qualitative trust modeling in SOA. Journal of Systems Architecture 55(4), 255–263 (2009)

    Article  Google Scholar 

  24. Grabner-Kraeuter, S., Kaluscha, E.A.: Empirical Research in on-line trust: a review and critical assessment. International Journal of Human Computer Studies 2003(58), 783–812 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Trček, D. (2011). Trust Management Methodologies for the Web. In: Polleres, A., et al. Reasoning Web. Semantic Technologies for the Web of Data. Reasoning Web 2011. Lecture Notes in Computer Science, vol 6848. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23032-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23032-5_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23031-8

  • Online ISBN: 978-3-642-23032-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics