Composing Trust Models towards Interoperable Trust Management

  • Rachid Saadi
  • Mohammad Ashiqur Rahaman
  • Valérie Issarny
  • Alessandra Toninelli
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 358)


Computational trust is a central paradigm in today’s Internet as our modern society is increasingly relying upon online transactions and social networks. This is indeed leading to the introduction of various trust management systems and associated trust models, which are customized according to their target applications. However, the heterogeneity of trust models prevents exploiting the trust knowledge acquired in one context in another context although this would be beneficial for the digital, ever-connected environment. This is such an issue that this paper addresses by introducing an approach to achieve interoperability between heterogeneous trust management systems. Specifically, we define a trust meta-model that allows the rigorous specification of trust models as well as their composition. The resulting composite trust models enable heterogeneous trust management systems to interoperate transparently through mediators.


Trust Model Trust Relationship Trust Management Mapping Rule Reputation System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: NSPW: New Security Paradigms Workshop, pp. 48–60. ACM Press, New York (1997)CrossRefGoogle Scholar
  2. 2.
    Ahamed, S., Monjur, M., Islam, M.: CCTB: Context correlation for trust bootstrapping in pervasive environment. In: 2008 IET 4th International Conference on Intelligent Environments, pp. 1–8 (2008)Google Scholar
  3. 3.
    Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)CrossRefGoogle Scholar
  4. 4.
    Fullam, K., Klos, T., Muller, G., Sabater, J., Schlosser, A., Topol, Z., Barber, K., Rosenschein, J., Vercouter, L., Voss, M.: A specification of the Agent Reputation and Trust (ART) testbed. In: Conference on Autonomous Agents and Multiagent Systems, pp. 512–518. ACM, New York (2005)CrossRefGoogle Scholar
  5. 5.
    Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys & Tutorials 3(4), 2–16 (2009)CrossRefGoogle Scholar
  6. 6.
    Haque, M., Ahamed, S.: An omnipresent formal trust model (FTM) for pervasive computing environment. In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol. 1 (2007)Google Scholar
  7. 7.
    Jøsang, A., Pope, S.: Semantic constraints for trust transitivity. In: APCCM: 2nd Asia-Pacific Conference on Conceptual Modelling, pp. 59–68. Australian Computer Society, Inc., Newcastle (2005)Google Scholar
  8. 8.
    Jsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, pp. 17–19 (2002)Google Scholar
  9. 9.
    Kaffille, S., Wirtz, G.: Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and Concepts. Innovations and Advances in Computer Sciences and Engineering, 483–489 (2010)Google Scholar
  10. 10.
    Kautz, H., Selman, B., Shah, M.: Referral Web: combining social networks and collaborative filtering. Communications of the ACM 40(3), 63–65 (1997)CrossRefGoogle Scholar
  11. 11.
    Kim, Y., Doh, K.: Trust Type based Semantic Web Services Assessment and Selection. In: Proceedings of ICACT, IEEE Computer, pp. 2048–2053 (2008)Google Scholar
  12. 12.
    Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Scotland (1994)Google Scholar
  13. 13.
    Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Ratings in distributed systems: A bayesian approach. In: Proceedings of the Workshop on Information Technologies and Systems (WITS), pp. 1–7. Citeseer (2001)Google Scholar
  14. 14.
    Nurmi, P.: A bayesian framework for online reputation systems. In: International Conference on Internet and Web Applications and Services/Advanced International Conference on AICT-ICIW 2006, p. 121 (February 2006)Google Scholar
  15. 15.
    Paradesi, S., Doshi, P., Swaika, S.: Integrating Behavioral Trust in Web Service Compositions. In: Proceedings of the 2009 IEEE International Conference on Web Services, pp. 453–460. IEEE Computer Society, Los Alamitos (2009)CrossRefGoogle Scholar
  16. 16.
    Quercia, D., Hailes, S., Capra, L.: TRULLO-local trust bootstrapping for ubiquitous devices. In: Proc. of IEEE Mobiquitous (2007)Google Scholar
  17. 17.
    Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: IEEE Hawaii International Conference on System Sciences, p. 6007 (2000)Google Scholar
  18. 18.
    Saadi, R., Pierson, J.M., Brunie, L.: Establishing trust beliefs based on a uniform disposition to trust. In: ACM SAC: Trust, Reputation, Evidence and other Collaboration Know-how track. ACM Press, New York (2010)Google Scholar
  19. 19.
    Suryanarayana, G., Erenkrantz, J., Hendrickson, S., Taylor, R.: PACE: an architectural style for trust management in decentralized applications. In: Software Architecture, WICSA 2004, pp. 221–230. IEEE, Los Alamitos (2004)Google Scholar
  20. 20.
    Suryanarayana, G., Taylor, R.: SIFT: A Simulation Framework for Analyzing Decentralized Reputation-based Trust Models. Technical Report UCI-ISR-07-5 (2007)Google Scholar
  21. 21.
    Vercouter, L., Casare, S., Sichman, J., Brandao, A.: An experience on reputation models interoperability based on a functional ontology. In: Proceedings of 20th International Joint Conference on Artificial Intelligence, IJCAI 2007 (2007)Google Scholar
  22. 22.
    Wiederhold, G.: Mediators in the architecture of future information systems. Computer 25(3), 38–49 (2002)CrossRefGoogle Scholar
  23. 23.
    Zhou, R., Hwang, K., Cai, M.: Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Transactions on Knowledge and Data Engineering, 1282–1295 (2008)Google Scholar
  24. 24.
    Zimmermann, P.R.: The official PGP user’s guide. MIT Press, Cambridge (1995)Google Scholar

Copyright information

© International Federation for Information Processing 2011

Authors and Affiliations

  • Rachid Saadi
    • 1
  • Mohammad Ashiqur Rahaman
    • 1
  • Valérie Issarny
    • 1
  • Alessandra Toninelli
    • 1
  1. 1.ARLES Project-TeamINRIA CRI Paris-RocquencourtFrance

Personalised recommendations