A Model for Trust Metrics Analysis

  • Isaac Agudo
  • Carmen Fernandez-Gago
  • Javier Lopez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5185)


Trust is an important factor in any kind of network essential, for example, in the decision-making process. As important as the definition of trust is the way to compute it. In this paper we propose a model for defining trust based on graph theory and show examples of some simple operators and functions that will allow us to compute trust.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy (1996)Google Scholar
  6. 6.
    Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRefGoogle Scholar
  7. 7.
    Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. Computer Networks and ISDN Systems 29, 953–964 (1997)CrossRefGoogle Scholar
  8. 8.
    Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1, 269–271 (1959)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Jøsang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, Bled, Slovenia (June 2002)Google Scholar
  10. 10.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43, 618–644 (2007)CrossRefGoogle Scholar
  11. 11.
    Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: ACSC 2006: Proceedings of the 29th Australasian Computer Science Conference, 2006, Darlinghurst, Australia, pp. 85–94. Australian Computer Society, Inc. (2006)Google Scholar
  12. 12.
    Leiven, R.: Attack Resistant Trust Metrics. PhD thesis, University of California, Berkeley (2003)Google Scholar
  13. 13.
    Leiven, R., Aiken, A.: Attack-Resistant Trust Metrics for Public Key Certification. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA (January 1998)Google Scholar
  14. 14.
    Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114–130. IEEE Computer Society Press, Los Alamitos (May 2002)Google Scholar
  15. 15.
    Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, Department of Computer Science and Mathematics, University of Stirling (1994)Google Scholar
  16. 16.
    Ziegler, C.N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)Google Scholar
  17. 17.
    Ziegler, C.-N., Lausen, G.: Propagation Models for Trust and Distrust in Social Networks. Information Systems Frontiers 7(4-5), 337–358 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Isaac Agudo
    • 1
  • Carmen Fernandez-Gago
    • 1
  • Javier Lopez
    • 1
  1. 1.Department of Computer ScienceUniversity of MalagaMálagaSpain

Personalised recommendations