Advertisement

A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web

  • Barbara Carminati
  • Elena Ferrari
  • Marco Viviani
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7710)

Abstract

In this paper, we propose a general-purpose Trust Layer that fits and exploits the emerging concept of Social Web. Key features of our proposal are the consideration of several dimensions for trust computation and the exploitation of social interaction dynamics over the Web, through the definition and the evaluation of event patterns and trust rules. Besides presenting our trust model, we discuss a case study on the ACM Digital Library social environment.

Keywords

Trust Multi-dimensional Social Trust Social Web 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, CIKM 2001, pp. 310–317. ACM, New York (2001)Google Scholar
  2. 2.
    Adali, S., Wallace, W.A., Qian, Y., Vijayakumar, P., Singh, M.: A Unified Framework for Trust in Composite Networks. In: Proceedings of the 13th AAMAS Workshop on Trust in Agent Societies (Trust), pp. 1–12 (2011)Google Scholar
  3. 3.
    Anicic, D., Stojanovic, N.: Expressive logical framework for reasoning about complex events and situations. In: Intelligent Event Processing, Papers from the 2009 AAAI Spring Symposium, pp. 14–20 (2009)Google Scholar
  4. 4.
    Appelquist, D., Brickley, D., Carvahlo, M., Iannella, R., Passant, A., Perey, C., Story, H.: A standards-based, open and privacy-aware social web. Tech. rep., W3C (December 2010)Google Scholar
  5. 5.
    Aringhieri, R., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J. Am. Soc. Inf. Sci. Technol. 57(4), 528–537 (2006)Google Scholar
  6. 6.
    Atzori, L., Iera, A., Morabito, G.: SIoT: Giving a Social Structure to the Internet of Things. IEEE Communications Letters 15(11), 1193–1195 (2011)Google Scholar
  7. 7.
    Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Dell’Acqua, P. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999)Google Scholar
  8. 8.
    Breslin, J., Decker, S.: The Future of Social Networks on the Internet: The Need for Semantics. IEEE Internet Computing 11, 86–90 (2007)Google Scholar
  9. 9.
    Castaneda, A., da Silva, P.P.: Extracting Trust Network Information from Scientific Web Portals. Tech. Rep. UTEP-CS-08-32, University of Texas at El Paso (August 2008)Google Scholar
  10. 10.
    Chu, X., Chen, X., Zhao, K., Liu, J.: Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems 44, 191–203 (2010)Google Scholar
  11. 11.
    Ding, L., Chen, S., Rundensteiner, E.A., Tatemura, J., Hsiung, W.-P., Candan, K.S.: Runtime semantic query optimization for event stream processing. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp. 676–685. IEEE Computer Society Press, Washington, DC, USA (2008)Google Scholar
  12. 12.
    DuBois, T., Golbeck, J., Srinivasan, A.: Predicting Trust and Distrust in Social Networks. In: Proceedings of the Third IEEE International Conference on Social Computing (SocialCom 2011). IEEE (October 2011)Google Scholar
  13. 13.
    Falcone, R., Castelfranchi, C.: Trust and Transitivity: A Complex Deceptive Relationship. In: Proceedings of the 12th AAMAS Workshop on Trust in Agent Societies (Trust), pp. 43–54 (2010)Google Scholar
  14. 14.
    Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 191–202. ACM, New York (2011)Google Scholar
  15. 15.
    Ghiselli Ricci, R., Viviani, M.: Asymptotically idempotent aggregation operators for trust management in multi-agent systems. In: IPMU 2008: Proceedings, Malaga, Spain, June 22-27, pp. 129–137 (2008)Google Scholar
  16. 16.
    Golbeck, J., Hendler, J.: Inferring binary trust relationships in web-based social networks. ACM Trans. Internet Technol. 6, 497–529 (2006)Google Scholar
  17. 17.
    Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.T.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst. 22(1), 5–53 (2004)Google Scholar
  18. 18.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)Google Scholar
  19. 19.
    Jøsang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006)Google Scholar
  20. 20.
    Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. Computer 34(12), 154–157 (2001)Google Scholar
  21. 21.
    Kazienko, P., Musial, K., Kajdanowicz, T.: Multidimensional Social Network in the Social Recommender System. IEEE Transactions on Systems, Man, and Cybernetics, Part A 41(4), 746–759 (2011)Google Scholar
  22. 22.
    Kumar, R., Novak, J., Tomkins, A.: Structure and Evolution of Online Social Networks. In: Yu, P.S.S., Han, J., Faloutsos, C. (eds.) Link Mining: Models, Algorithms, and Applications, pp. 337–357. Springer (2010)Google Scholar
  23. 23.
    Kuter, U., Golbeck, J.: Using probabilistic confidence models for trust inference in web-based social networks. ACM Trans. Internet Technol. 10, 8:1–8:23 (2010)Google Scholar
  24. 24.
    Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1) (March 2007)Google Scholar
  25. 25.
    Liu, G., Wang, Y., Orgun, M.A.: Trust Transitivity in Complex Social Networks. In: Burgard, W., Roth, D. (eds.) AAAI. AAAI Press (2011)Google Scholar
  26. 26.
    Luckham, D.C.: The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley Longman Publishing Co., Inc, Boston (2001)Google Scholar
  27. 27.
    Maheswaran, M., Tang, H.C., Ghunaim, A.: Towards a gravity-based trust model for social networking systems. In: Proceedings of the 27th ICDCS Workshops, p. 24. IEEE Computer Society Press, Washington, DC, USA (2007)Google Scholar
  28. 28.
    Mass, Y., Shehory, O.: Distributed Trust in Open Multi-agent Systems. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, pp. 159–174. Springer, Heidelberg (2001)Google Scholar
  29. 29.
    McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Tech. Rep. MISRC Working Paper Series 96-04, University of Minnesota (1996)Google Scholar
  30. 30.
    Nin, J., Carminati, B., Ferrari, E., Torra, V.: Computing Reputation for Collaborative Private Networks. In: Proceedings of COMPSAC 2009, pp. 246–253. IEEE Computer Society Press, Washington, DC, USA (2009)Google Scholar
  31. 31.
    O’Donovan, J., Smyth, B.: Trust in recommender systems. In: Proceedings of the 10th International Conference on Intelligent User Interfaces, IUI 2005, pp. 167–174. ACM, New York (2005)Google Scholar
  32. 32.
    Rana, O.F., Hinze, A.: Trust and reputation in dynamic scientific communities. IEEE Distributed Systems Online 5(1) (2004)Google Scholar
  33. 33.
    Tang, J., Gao, H., Liu, H.: mTrust: Discerning Multi-faceted Trust in a Connected World. In: Adar, E., Teevan, J., Agichtein, E., Maarek, Y. (eds.) WSDM, pp. 93–102. ACM (2012)Google Scholar
  34. 34.
    Taylor, H., Yochem, A., Phillips, L., Martinez, F.: Event-Driven Architecture: How SOA Enables the Real-Time Enterprise, 1st edn. Addison-Wesley Professional (2009)Google Scholar
  35. 35.
    Wang, Y., Singh, M.P.: Trust representation and aggregation in a distributed agent system. In: Proceedings of the 21st National Conference on Artificial Intelligence, AAAI 2006, pp. 1425–1430. AAAI Press (2006)Google Scholar
  36. 36.
    Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 981–990. ACM, New York (2010)Google Scholar
  37. 37.
    Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Barbara Carminati
    • 1
  • Elena Ferrari
    • 1
  • Marco Viviani
    • 1
  1. 1.Dipartimento di Scienze Teoriche e Applicate (DiSTA)Università degli Studi dell’InsubriaVareseItalia

Personalised recommendations