Skip to main content

On Propagating Interpersonal Trust in Social Networks

  • Chapter

Part of the book series: Human–Computer Interaction Series ((HCIS))

Abstract

The age of information glut has fostered the proliferation of data and documents on the Web, created by man and machine alike. Hence, there is an enormous wealth of minable knowledge that is yet to be extracted, in particular, on the Semantic Web. However, besides understanding information stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part, which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alfarez Abdul-Rahman and Stephen Hailes. A distributed trust model. In new Security Paradigms Workshop, pp. 48-60, Cumbria, UK, September 1997.

    Google Scholar 

  2. Alfarez Abdul-Rahman and Stephen Hailes. Supporting trust in virtual communities. In Proceeding of the 33rd Hawali International Conference on System Sciences, Mauti, HW, USA, January 2000.

    Google Scholar 

  3. Kari Aberter and Zoran Despotovic. managing trust in a peer-2-peer information system. In Henrique Paques,Ling Liu, and David Grossman,editors, it Proceeding of the Tenth International Conference Information and Knowledge Management, pp. 310–317. ACM Press, 2001.

    Google Scholar 

  4. Thomas Beth, Malte Borcherding, and Bright Klein. Valuation of trust in open networks. In Proceeding of the 1994 European Symposium on Research in Computer Security, pp. 3–18, 1994.

    Google Scholar 

  5. Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceed-ing of the 17th Symposium on Security and Pricacy, pages 164–173, IEEE Computer Society Prees, Oakland CA, USA, May 1996.

    Google Scholar 

  6. Maciej Ceglowski, Aaron Caburn, and John Cuadrado. Semantic search of unstructured data using contextural network graphs, June 2003.

    Google Scholar 

  7. Rita Chen and William Yeager. Poblano: A distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems, Santa Clara, CA, USA, February 2003.

    Google Scholar 

  8. Edd Dumbill. Finding friends with XML and RDF, IBM’s XML Watch, June 2002.

    Google Scholar 

  9. Laurent Eschenauer, Virigl Gligor, and John Baras. On trust establishment in mobile adhoc networks. Technical Report MS 2002-10, Imstitute for Systems Research, Univeresity of Maryland, MD, USA, OCtober 2002.

    Google Scholar 

  10. Lester Ford and Ray Fulkerson. Flows in Networks. Princeton University Press, Princeton, NJ, USA, 1962.

    Google Scholar 

  11. Günter Gans, Mathias Jarks, Stefanie Kethers, and Gerhard Lakemeyer. Modeling the impact of trust and distrust in agent networks. In Proceedings of the Third International Bi-Conference Workshop on Agent-oriented Information Systems, Montreal, Canada, May 2001.

    Google Scholar 

  12. Yolanda Gil and Varun Ratnakar. Trusting information sources one citizen at a time. In Proceedings of the First International Semantic Web Conference, Sardinia, Italy, June 2002.

    Google Scholar 

  13. Jennifer Golbeck, Bijan Parsia, and James Hendler. Trust networks on the semantic web in. Proceedings of Cooperative Intelligent Agents, Helsinki, Finland, August 2003.

    Google Scholar 

  14. Elizabeth Gray, Jean-Marc Seigneur, Yong Chen, and Christian Jensen. Trust Propagation in small worlds. In Paddy Nixon and Sotirios Terzis, editors, Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, pp. 239–254. Springer-Verlag April 2003.

    Google Scholar 

  15. Ramanthan Guha. Open rating systems. Technical report, Sandford Knowledge Systems Laboratory, Sandford, CA, USA, 2003.

    Google Scholar 

  16. Ramanathan Guha, Ravi Kumar, Prabhakar Raghavan, and Andrew Tomkins. Propagation of turst and distrust. In Proceedings of the Thirteenth International World Wide Web Conference, ACM Press, New York, USA, May 2004.

    Google Scholar 

  17. Knut Hatmann and Thomas Strothotte. A speading activation approach to text illustration. In Proceedings of the 2nd Interpersonal Symposium on Smart Graphics, pp. 39–46, Hawthorne, NY, USA, ACM Press, 2002.

    Google Scholar 

  18. Fritz Heider. The Psychology of Interpersonal Relations. Wiley, New York, Ny, USA, 1958.

    Google Scholar 

  19. Paul Holland and Samuel Leinhardt. Some evidence on the transitivity of positive interper- sonal sentiment. American Journal of Sociology, 77;1205–1209, 1972.

    Article  Google Scholar 

  20. Richard Housely, William Ford, William Polk, and David Solo. Internet X.509 public key infrastucture, Internet Engineering Task Force RFC 2459, January 1999.

    Google Scholar 

  21. Audun Jøsang, Elizabeth Gray, and Michael Kinateder. Analysing topologies of transitive trust. In proceedings of the Workshop of Formal Aspects of Security and Trust, Pisa, Italy, September 2003.

    Google Scholar 

  22. Jose Kahan, Marja-Ritta Koivunen, Eric Prud’ Hommeaux, and Ralph Swick. Annotea – an open RDF infrastrucute for shard web annotations. In Proceedings of the Tenth International World Wide Web Conference, pp. 623–632, Hong Kong, China, May 2001.

    Google Scholar 

  23. Speandar Kamamvar, Mario Schlosser, and Hector Garcia-Molina. The Eigen Trust algorithm for reputation management in P2P networks. In Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, May 2003.

    Google Scholar 

  24. Michael Kinateder and Siani Pearson. A privacy-enhanced peer-to-peer reputation system. In proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, volume 2378 of LNCS, prague, Czech Republic, Springer-Verlag, September 2003.

    Google Scholar 

  25. Michael Kinateder and Kurt and Rothermel. Architecture and algorithms of a distributed reputation system. In Paddy Nixon and Sotirios Terzis, editors, proceeding of the First International Conference on Trust Management, volume 2692 of LNCS, pp. 1–16. Springer-Verlag, April 2003.

    Google Scholar 

  26. Raph Levien. Attack Resistant Trust Metrics. PhD thesis, UC Berkeley, CA, USA, 2003.

    Google Scholar 

  27. Raph Levien and Alexander Aiken. Attack-resistant trust for public key certification. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 1998.

    Google Scholar 

  28. Raph Levien and Alexander Aiken. An attack-resistant, scalable name service, 2000. Draft submission to the Fourth International Conference on Financial Cryptography, 2000.

    Google Scholar 

  29. Rot Lewicki, Daniel McAllister, and Robert Bies. Trust and distrust: New relationships and realities. Academy of Management Review, 23(12):438–458, 1998.

    Google Scholar 

  30. Niklas Luhmann. Trust and Power. Wiley, Chichester, UK, 1979.

    Google Scholar 

  31. Stephen Marsh. Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK, 1994.

    Google Scholar 

  32. Stephen Marsh. Optimism and pessimism in trust. In Jose Ramirez, editor, Proceedings of the Ibero-American Conference on Artificial Intelligence, McGraw-Hill Caracas, Venezuela, 1994.

    Google Scholar 

  33. Ueh Maurer. Modelling a public key infrastructure. In Elisa Bertino, editor, Proceedings of the 1996 European Symposium on Reserach in Computer Security, Volume 1146 of LNCS, pp. 325–350. Springer-Verlag, 1996.

    Google Scholar 

  34. Harrison McKnight and Norman Chervany. The meaning of trust. Technical Report MISRC 96–04, Management Informations Systems Research Center, University of Minnesota, MN, USA, 1996.

    Google Scholar 

  35. Stanley Milgram. The small world problem. In John Sabini and Maury Sliver, editors, The Individual in a Social World – Essays and Experiments. McGraw-Hill, New York, NY, USA, 2nd edition, 1992.

    Google Scholar 

  36. Lik Mui, Mojdeh Mohtashemi, and Ari Halberstradt. A computational model of trust and reputation. In Proceedings of the 35th Hawaii International Conference on System Sciences, pp. 188–196, Big Island, HI, USA, January 2002.

    Google Scholar 

  37. Lawrence Page, Sergey Brin, RAjeev Motwani, and Terry Winograd. The pagerank citation ranking: Bringing order of the web. Technical report, Stanford Digital Library Technologies Project, 1998.

    Google Scholar 

  38. Ross Quillian. Semantic memory. In Marvin Minsky, editor, Semantic Information Processing, pp. 227–270. MIT Press, Boston, MA, USA, 1968.

    Google Scholar 

  39. Anatol Rapoport. Mathematical models of social interaction. In Duncan Luce, Robert Bush, and Eugene Galanter, editors, Handbook of Mathematical Psychology, Volume 2. Wiley, New York, NY, USA, 1963.

    Google Scholar 

  40. Michael Reiter and Stuart Stubblebine. Path independence for authentication in large scale systems. In ACM Conference on Computer and Communications Security, pp. 57–66, 1996.

    Google Scholar 

  41. Michael Reiter and Stuart Stubblebine. Toward acceptable metrices of authentication. In Proceedings of the IEEE Symposium on Security and Privacy, pp. 10–20, 1997.

    Google Scholar 

  42. Matthew Richardson, Rakesh Agrawal, and Pedro Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, Sanibel Island, FL, USA, September 2003.

    Google Scholar 

  43. Karthikeyan Sankaralingam, Simha Sethumadhavan, and James Browne. Distributed pagerank for P2P systems. In Proceedings of the Twelfth International Symposium on High Performance Distributed Computing, Seattle, WA, USA, June 2003.

    Google Scholar 

  44. Edward Smith, Susan Nolen-Hoeksema, Barbara Fredrickson, and Geoffrey Loftus. Atkinson and Hilgards’s Introduction to Psychology. Thomson Learning, Boston, MA, USA, 2003.

    Google Scholar 

  45. Andrew Twigg and Nathan Dimmock. Attack-resistance of computational trust models. In Proceedings of the Twelfth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises: Enterprise Security (Special Session on Trust Management), pp. 275–280, Linz, Austria, June 2003.

    Google Scholar 

  46. Roland Wiese, Markus Eiglsperger, and Michael Kaufmann. yfiles – visualization and automatic layout of graphs. In Proceedings of the 9th International Symposium on Graph Drawing, volume 2265 of LNCS, pp. 453–454, Springer-Verlag, Heidelberg, Germany, January 2001.

    Google Scholar 

  47. Cai-Nicolas Ziegler. Semantic web recommender systems. In Wolfgang Lindner and Andrea Perego, editors, Proceedings of the Joint ICDE/EDBT Ph.D. Workshop 2004, Crete University Press, Heraklion, Greece, March 2004.

    Google Scholar 

  48. Cai-Nicolas Ziegler and Georg Lausen. Analyzing correlation between trust and user similarity in online communities. In Christian Jensen, Stefan Poslad, and Theodosis Dimitrakos, editors, Proceedings of the 2nd International Conference on Trust Management, volume 2995 of LNCS, pp. 251–265, Springer-Verlag, Oxford, UK, March 2004.

    Google Scholar 

  49. Philip Zimmermann. The Official PGP User’s Guide. MIT Press, Boston, MA, USA, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Ziegler, CN. (2009). On Propagating Interpersonal Trust in Social Networks. In: Golbeck, J. (eds) Computing with Social Trust. Human–Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-84800-356-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-84800-356-9_6

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84800-355-2

  • Online ISBN: 978-1-84800-356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics