Jason: A Scalable Reputation System for the Semantic Web

  • Sandra Steinbrecher
  • Stephan Groß
  • Markus Meichau
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 297)


The recent development of the Internet, especially the expanding use of social software and dynamic content generation commonly termed as Web 2.0 enables users to find information about almost every possible topic on the Web. On the downside, it becomes more and more difficult to decide which information can be trusted in. In this paper we propose the enhancement of Web 2.0 by a scalable and secure cross-platform reputation system that takes into account a user’s social network. Our proposed solution Jason is based on standard methods of the semantic web and does not need a central entity. It enables the fast and flexible evaluation of arbitrary content on the World Wide Web. In contrast to many other reputation systems it provides mechanisms to ensure the authenticity of web content, thus, enabling the user to explicitely choose information published by trusted authors.


Trust management reputation system secure semantic web identity management privacy-preserving data management secure information integration 


  1. 1.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proceedings of the 33rd Hawaii Intern. Conference on System Sciences, vol. 6. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  2. 2.
    Clauß, S., Pfitzmann, A., Hansen, M., Herreweghen, E.V.: Privacy-enhancing identity management. The IPTS Report 67, 8–16 (2002)Google Scholar
  3. 3.
    ENISA, Position paper. reputation-based systems: a security analysis (2007) (last visited 07/01/09),
  4. 4.
    European Parliament, Directive 95/46 EC. Official Journal L281, 23/11/1995, 31–50 (1995)Google Scholar
  5. 5.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  6. 6.
    Kamvar, S., Schlosser, M., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: WWW 2003: Proc. of the 12th Intern. Conf. on World Wide Web, pp. 640–651. ACM Press, New York (2003)Google Scholar
  7. 7.
    Lazarsfeld, P., Merton, R.: Friendship as a Social Process: A Substantive and Methodological Analysis. In: Berger, M., Abel, T., Page, C. (eds.) Freedom and Control in Modern Society, pp. 18–66. Van Nostrand, New York (1954)Google Scholar
  8. 8.
    Manola, F., Miller, E.: RDF Primer. W3C Recommendation, W3C (last visited 07/01/09) (2004),,
  9. 9.
    Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: IMC 2007: Proc. of the 7th ACM SIGCOMM Conf. on Internet Measurement, pp. 29–42. ACM, New York, USA (2007)Google Scholar
  10. 10.
    Pfitzmann, A.: Technologies for multilateral security. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security for Global Communication, pp. 85–91. Addison-Wesley, Reading (1999)Google Scholar
  11. 11.
    Schillo, M., Funk, P., Rovatsos, M.: Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence 14(8), 825–848 (2000)CrossRefGoogle Scholar
  12. 12.
    Steinbrecher, S.: Design options for privacy-respecting reputation systems within centralised internet communities. In: Proceedings of IFIP Sec 2006, 21st IFIP International Information Security Conference: Security and Privacy in Dynamic Environments. IFIP, vol. 201, pp. 123–134. Springer, Heidelberg (2006)Google Scholar
  13. 13.
    Voss, M., Heinemann, A., Mühlhäuser, M.: A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. In: First Intern. Conf. on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM 2005), pp. 171–181. IEEE, Los Alamitos (2005)CrossRefGoogle Scholar
  14. 14.
    Warren, R.H., Wilkinson, D.F., Warnecke, M.: Empirical Analysis of a Dynamic Social Network Built from PGP Keyrings. In: Airoldi, E.M., Blei, D.M., Fienberg, S.E., Goldenberg, A., Xing, E.P., Zheng, A.X. (eds.) ICML 2006. LNCS, vol. 4503, pp. 158–171. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Sandra Steinbrecher
    • 1
  • Stephan Groß
    • 1
  • Markus Meichau
    • 2
  1. 1.Fakultät InformatikTechnische Universität DresdenDresdenGermany
  2. 2.Max-Planck-GesellschaftMünchenGermany

Personalised recommendations