A Discussion on Trust Requirements for a Social Network of Eahoukers

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8073)


A social network of eahoukers is intended to benefit from the socially generated knowledge to deal with the home appliances in a domestic environment. The entire system being developed in the SandS project has diverse facets, in this paper we focus on a discussion of the trust requirements from several points of view. Trust has been studied for a long time in different contexts. In this paper we review some definitions and ideas related to trust, as a basis for the desired discussion, as a first step previous to any implementation.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adams, W.J., Hadjichristofi, G.C., Davis IV, N.J.: Calculating a node’s reputation in a mobile ad hoc network. In: 24th IEEE International Performance, Computing, and Communications Conference, IPCCC 2005, pp. 303–307 (April 2005)Google Scholar
  2. 2.
    Ahamed, S.I., Haque, M.M., Endadul Hoque, M., Rahman, F., Talukder, N.: Design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments. Journal of Systems and Software 83(2), 253–270 (2010); Computer Software and ApplicationsCrossRefGoogle Scholar
  3. 3.
    Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2), 58–71 (2007); Software Engineering and the Semantic WebCrossRefGoogle Scholar
  4. 4.
    Bharadwaj, K.K., Al-Shamri, M.Y.H.: Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications 8(1), 37–47 (2009)CrossRefGoogle Scholar
  5. 5.
    Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T.S., Chang, E., Hussain, F.K., Nejdl, W., Olmedilla, D., Kashyap, V.: The pudding of trust (intelligent systems). IEEE Intelligent Systems 19(5), 74–88 (2004)CrossRefGoogle Scholar
  6. 6.
    Blomqvist, K.: The many faces of trust. Scandinavian Journal of Management 13(3), 271–286 (1997)CrossRefGoogle Scholar
  7. 7.
    Can, A.B., Bhargava, B.: Sort: A self-organizing trust model for peer-to-peer systems. IEEE Transactions on Dependable and Secure Computing 10(1), 14–27 (2013)CrossRefGoogle Scholar
  8. 8.
    Chadwick, D.W., Young, A.J., Cicovic, N.K.: Merging and extending the pgp and pem trust models-the ice-tel trust model. IEEE Network 11(3), 16–24 (1997)CrossRefGoogle Scholar
  9. 9.
    Chang, B.-J., Kuo, S.-L.: Markov chain trust model for trust-value analysis and key management in distributed multicast manets. IEEE Transactions on Vehicular Technology 58(4), 1846–1863 (2009)CrossRefGoogle Scholar
  10. 10.
    Cho, J.-H., Swami, A., Chen, I.-R.: A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys Tutorials 13(4), 562–583 (2011)CrossRefGoogle Scholar
  11. 11.
    Cook, K.S. (ed.): Trust in Society, New York. Russell Sage Foundation Series on Trust, vol. 2 (February 2003)Google Scholar
  12. 12.
    Fachrunnisa, O., Hussain, F.K.: A methodology for maintaining trust in industrial digital ecosystems. IEEE Transactions on Industrial Electronics 60(3), 1042–1058 (2013)CrossRefGoogle Scholar
  13. 13.
    Gai, X., Li, Y., Chen, Y., Shen, C.: Formal definitions for trust in trusted computing. In: 2010 7th International Conference on Ubiquitous Intelligence Computing and 7th International Conference on Autonomic Trusted Computing (UIC/ATC), pp. 305–310 (October 2010)Google Scholar
  14. 14.
    Golbeck, J.: Computing with trust: Definition, properties, and algorithms. In: Securecomm and Workshops, August 28-September 1, pp. 1–7 (2006)Google Scholar
  15. 15.
    He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine 16(6), 1164–1175 (2012)CrossRefGoogle Scholar
  16. 16.
    Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Commun. ACM 49(7), 94–101 (2006)CrossRefGoogle Scholar
  17. 17.
    Manchala, D.W.: E-commerce trust metrics and models. IEEE Internet Computing 4(2), 36–44 (2000)CrossRefGoogle Scholar
  18. 18.
    Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)zbMATHCrossRefGoogle Scholar
  19. 19.
    Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)CrossRefGoogle Scholar
  20. 20.
    Wang, X., Liu, L., Su, J.: Rlm: A general model for trust representation and aggregation. IEEE Transactions on Services Computing 5(1), 131–143 (2012)CrossRefGoogle Scholar
  21. 21.
    Xiu, D., Liu, Z.: A formal definition for trust in distributed systems. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 482–489. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  22. 22.
    Zhang, P., Durresi, A., Barolli, L.: Survey of trust management on various networks. In: 2011 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), June 30-July 2, pp. 219–226 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Grupo de Inteligencia Computacional (GIC)Universidad del País VascoSpain
  2. 2.Dept. of Computer ScienceUniversity of MilanoMilanoItaly

Personalised recommendations