Information Systems Frontiers

, Volume 7, Issue 4–5, pp 337–358

Propagation Models for Trust and Distrust in Social Networks

Article

Abstract

Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

trust semantic web trust propagation spreading activation models balance theory web of trust 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman A, Hailes S. A distributed trust model. In: New Security Paradigms Workshop, Cumbria, UK, September 1997:48–60.Google Scholar
  2. Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Maui, HW, USA, January 2000.Google Scholar
  3. Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. In Paques H, Liu L, and Grossman D (eds.) Proceedings of the Tenth International Conference on Information and Knowledge Management, ACM Press, 2001:310–317.Google Scholar
  4. Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proceedings of the 1994 European Symposium on Research in Computer Security, 1994:3–18.Google Scholar
  5. Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of the 17th Symposium on Security and Privacy, Oakland, CA, USA. IEEE Computer Society Press 1996:164–173.Google Scholar
  6. Ceglowski M, Coburn A, Cuadrado J. Semantic search of unstructured data using contextual network graphs, June 2003.Google Scholar
  7. Chen R, Yeager W. Poblano: A distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems, Santa Clara, CA, USA, February 2003.Google Scholar
  8. Dumbill E. Finding friends with XML and RDF, June 2002. IBM's XML Watch.Google Scholar
  9. Eschenauer L, Gligor V, Baras J. On trust establishment in mobile ad-hoc networks. Technical Report MS 2002-10, Institute for Systems Research, University of Maryland, MD, USA, October 2002.Google Scholar
  10. Ford L, Fulkerson R. Flows in Networks. Princeton, NJ, USA:Princeton University Press, 1962.Google Scholar
  11. Gans G, Jarke M, Kethers S, Lakemeyer G. Modeling the impact of trust and distrust in agent networks. In: Proceedings of the Third International Bi-Conference Workshop on Agent-oriented Information Systems, Montreal, Canada, May 2001.Google Scholar
  12. Gil Y, Ratnakar V. Trusting information sources one citizen at a time. In: Proceedings of the First International Semantic Web Conference, Sardinia, Italy, June 2002.Google Scholar
  13. Golbeck J, Parsia B, Hendler J. Trust networks on the semantic web. In: Proceedings of Cooperative Intelligent Agents, Helsinki, Finland, August 2003.Google Scholar
  14. Gray E, Seigneur J-M, Chen Y, Jensen C. Trust propagation in small worlds. In Nixon P, and Terzis S (eds.), Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, Springer-Verlag, 2003:239–254.Google Scholar
  15. Guha R. Open rating systems. Technical report, Stanford Knowledge Systems Laboratory, Stanford, CA, USA, 2003.Google Scholar
  16. Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In: Proceedings of the Thirteenth International World Wide Web Conference, New York, NY, USA, May 2004. ACM Press, 2004.Google Scholar
  17. Hartmann K, Strothotte T. A spreading activation approach to text illustration. In: Proceedings of the 2nd International Symposium on Smart Graphics, Hawthorne, NY, USA: ACM Press, 2002:39–46.Google Scholar
  18. Heider F. The Psychology of Interpersonal Relations. New York, NY, USA, Wiley, 1958.Google Scholar
  19. Holland P, Leinhardt S. Some evidence on the transitivity of positive interpersonal sentiment. American Journal of Sociology, 1972;77:1205–1209.CrossRefGoogle Scholar
  20. Housely R, Ford W, Polk W, Solo D. Internet X.509 public key infrastructure, January 1999. Internet Engineering Task Force RFC 2459.Google Scholar
  21. Jøsang A, Gray E, Kinateder M. Analysing topologies of transitive trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust, Pisa, Italy, September 2003.Google Scholar
  22. Kahan J, Koivunen M-R, Prud' Hommeaux E, Swick R. Annotea - an open RDF infrastructure for shared web annotations. In: Proceedings of the Tenth International World Wide Web Conference, Hong Kong, China, May 2001:623–632.Google Scholar
  23. Kamvar S, Schlosser M, Garcia-Molina H. The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, May 2003.Google Scholar
  24. Kinateder M, Pearson S. A privacy-enhanced peer-to-peer reputation system. In: Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, volume 2378 of LNCS, Prague, Czech Republic, September 2003. Springer-Verlag.Google Scholar
  25. Kinateder M, Rothermel K. Architecture and algorithms for a distributed reputation system. In Nixon P, Terzis S (eds.), Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, Springer-Verlag, 2003:1–16.Google Scholar
  26. Levien R. Attack Resistant Trust Metrics. PhD thesis, UC Berkeley, Berkeley, CA, USA, 2003.Google Scholar
  27. Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 1998.Google Scholar
  28. Levien R, Aiken A. An attack-resistant, scalable name service, 2000. Draft submission to the Fourth International Conference on Financial Cryptography.Google Scholar
  29. Lewicki R, McAllister D, Bies R. Trust and distrust: New relationships and realities. Academy of Management Review, 1998;23(12):438–458.Google Scholar
  30. Luhmann N. Trust and Power. Chichester, UK: Wiley, 1979.Google Scholar
  31. Marsh S. Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK, 1994a.Google Scholar
  32. Marsh S. Optimism and pessimism in trust. In Ramirez J (eds.), Proceedings of the Ibero-American Conference on Artificial Intelligence, Caracas, Venezuela, McGraw-Hill, 1994.Google Scholar
  33. Maurer U. Modelling a public key infrastructure. In Bertino E, editor, Proceedings of the 1996 European Symposium on Research in Computer Security, volume 1146 of LNCS, Springer-Verlag, 1996:325–350.Google Scholar
  34. McKnight H, Chervany N. The meaning of trust. Technical Report MISRC 96-04, Management Informations Systems Research Center, University of Minnesota, MN, USA, 1996.Google Scholar
  35. Milgram S. The small world problem. In Sabini J, and Silver M (eds.), The Individual in a Social World—Essays and Experiments 2nd edition. New York, NY, USA, McGraw-Hill, 1992.Google Scholar
  36. Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation. In: Proceedings of the 35th Hawaii International Conference on System Sciences, Big Island, HI, USA, January 2002:188–196.Google Scholar
  37. Page L, Brin S, Motwani R, Winograd T. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.Google Scholar
  38. Quillian R. Semantic memory. In Minsky M, (ed.), Semantic Information Processing, Boston, MA, USA, MIT Press, 1968:227–270.Google Scholar
  39. Rapoport A. Mathematical models of social interaction. In Luce D, Bush R, and Galanter E (eds.), Handbook of Mathematical Psychology, volume 2. New York, NY, USA Wiley, 1963.Google Scholar
  40. Reiter M, Stubblebine S. Path independence for authentication in large-scale systems. In: ACM Conference on Computer and Communications Security, 1996:57–66.Google Scholar
  41. Reiter M, Stubblebine S. Toward acceptable metrics of authentication. In: Proceedings of the IEEE Symposium on Security and Privacy, 1997:10–20.Google Scholar
  42. Richardson M, Agrawal R, Domingos P. Trust management for the semantic web. In: Proceedings of the Second International Semantic Web Conference, Sanibel Island, FL, USA, September 2003.Google Scholar
  43. Sankaralingam K, Sethumadhavan S, Browne J. Distributed pagerank for P2P systems. In: Proceedings of the Twelfth International Symposium on High Performance Distributed Computing, Seattle, WA, USA, June 2003.Google Scholar
  44. Smith E, Nolen-Hoeksema S, Fredrickson B, Loftus G. Atkinson and Hilgards's Introduction to Psychology. Thomson Learning, Boston, MA, USA, 2003.Google Scholar
  45. Twigg A, Dimmock N. Attack-resistance of computational trust models. In: Proceedings of the Twelfth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises: Enterprise Security (Special Session on Trust Management), Linz, Austria, June 2003:275–280.Google Scholar
  46. Wiese R, Eiglsperger M, Kaufmann M. yfiles—visualization and automatic layout of graphs. In: Proceedings of the 9th International Symposium on Graph Drawing, volume 2265 of LNCS, Heidelberg, Germany, Springer-Verlag, January 2001:453–454.Google Scholar
  47. Ziegler C-N. Semantic web recommender systems. In Lindner W, and Perego A (eds.), Proceedings of the Joint ICDE/EDBT Ph.D. Workshop 2004, Heraklion, Greece. Crete University Press, March 2004.Google Scholar
  48. Ziegler C-N, Lausen G. Analyzing correlation between trust and user similarity in online communities. In: Jensen C, Poslad S, and Dimitrakos T (eds.), Proceedings of the 2nd International Conference on Trust Management, volume 2995 of LNCS, Oxford, UK, March 2004. Springer-Verlag, 251–265.Google Scholar
  49. Zimmermann P. The Official PGP User's Guide. Boston, MA, USA, MIT Press, 1995.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  1. 1.Institut für InformatikUniversität Freiburg, Georges-Köhler-AlleeFreiburg i.Br.Germany

Personalised recommendations