Encyclopedia of Social Network Analysis and Mining

2018 Edition
| Editors: Reda Alhajj, Jon Rokne

Computational Trust Models

  • Xin Liu
  • Anwitaman Datta
  • Karl Aberer
Reference work entry
DOI: https://doi.org/10.1007/978-1-4939-7131-2_228




A generic term representing any entities (e.g., peer in Peer-to-Peer networks, user in various Web 2.0 applications) that interact with each other

Interaction or transaction

The process where the trustor accepts and consumes services or products that are provided by the trustee

Trustee or target agent

The agent who will be evaluated


The agent who wants to evaluate its trust in another agent


Many Internet-scale social applications have evolved recently, fueled by and fueling applications open to all, e.g., various Web 2.0 applications, where end users play active role in the system, and thus, their activities in turn significantly impact the system’s behavior and other users’ experience with the same. For instance, different from traditional static websites, Web 2.0 applications allow users to not only retrieve information but also contribute contents and share information with others (e.g., Wikipedia, Facebook, Twitter,...

This is a preview of subscription content, log in to check access.


  1. Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii international conference on system sciences (HICSS), MauiGoogle Scholar
  2. Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New Security Paradigms (NSPW), Langdale, Cumbria, pp 48–60Google Scholar
  3. Aberer K, Despotovic Z (2001) Managing trust in a peer-2-peer information system. In: CIKM, AtlantaGoogle Scholar
  4. Buchegger S, Boudec JYL (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 03: modeling and optimization in mobile, ad hoc and wireless networks, Sophia AntipolisGoogle Scholar
  5. Burnett C, Norman TJ, Sycara K (2010) Bootstrapping trust evaluations through stereotypes. In: Proceedings of the 9th international conference on autonomous agents and multiagent systems, Toronto, pp 241–248Google Scholar
  6. Despotovic Z, Aberer K (2006) P2p reputation management: probabilistic estimation vs. social networks. Comput Netw 50(4):485–500. MATHzbMATHCrossRefGoogle Scholar
  7. Gambetta D (1988) Can we trust trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237Google Scholar
  8. Golembiewski RT, McConkie M (1975) The centrality of interpersonal trust in group processes. In: Cooper CL (ed) Theories of group processes. Wiley, London/New York, pp 131–185Google Scholar
  9. Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, New York, pp 403–412Google Scholar
  10. Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th Bled electronic commerce conference, Bled, pp 324–337Google Scholar
  11. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRefGoogle Scholar
  12. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web (WWW), Budapest, pp 640–651Google Scholar
  13. Lauw HW, Lim EP, Wang K (2006) Bias and controversy: beyond the statistical deviation. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’06, PhiladelphiaGoogle Scholar
  14. Liu X, Datta A (2012a) Contextual trust aided enhancement of data availability in peer-to-peer backup storage systems. J Netw Syst Manag 20:200–225CrossRefGoogle Scholar
  15. Liu X, Datta A (2012b) Modeling context aware dynamic trust using hidden markov model. In: Proceedings of the twenty-sixth conference on artificial intelligence (AAAI), TorontoGoogle Scholar
  16. Liu X, Datta A, Rzadca K, Lim E (2009) Stereotrust: a group based personalized trust model. In: Proceedings of the 18th ACM conference on information and knowledge management (CIKM), Hong Kong, pp 7–16Google Scholar
  17. Liu X, Kaszuba T, Nielek R, Datta A, Wierzbicki A (2010) Using stereotypes to identify risky transactions in internet auctions. In: Proceedings of the IEEE second international conference on social computing, Minneapolis, pp 513–520Google Scholar
  18. Liu X, Tredan G, Datta A (2011) Metatrust: discriminant analysis of local information for global trust assessment. In: Proceedings of the 10th international conference on autonomous agents and multiagent systems (AAMAS), TaipeiGoogle Scholar
  19. Marsh SP (1994) Formalising trust as a computational concept. PhD thesis, University of StirlingGoogle Scholar
  20. Mcknight DH, Chervany NL (1996) The meanings of trust. Technical report, University of MinnesotaGoogle Scholar
  21. Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science, Hawaii, pp 2431–2439Google Scholar
  22. Rich E (1998) User modeling via stereotypes. In: Maybury MT, Wahlster W (eds) Readings in intelligent user interfaces. Morgan Kaufmann, San Francisco, pp 329–342Google Scholar
  23. Schillo M, Funk P, Rovatsos M (2000) Using trust for detecting deceitful agents in artificial societies. Appl Artif Intell 14(8):825–848CrossRefGoogle Scholar
  24. Tadelis S (2003) Firm reputation with hidden information. Economic Theory 21:635–651. MATHMathSciNetMathSciNetzbMATHCrossRefGoogle Scholar
  25. Teacy WTL, Patel J, Jennings NR, Luck M (2006) Travos: trust and reputation in the context of inaccurate information sources. Auton Agent Multi-Agent Syst 12:183–198CrossRefGoogle Scholar
  26. Xiong L, Liu L (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857CrossRefGoogle Scholar
  27. Zacharia G (1999) Collaborative reputation mechanisms for online communities. PhD thesis, Massachusetts Institute of TechnologyGoogle Scholar
  28. Zhang J, Cohen R (2008) Evaluating the trustworthiness of advice about seller agents in e-marketplaces: a personalized approach. Electron Commer Res Appl 7:330–340CrossRefGoogle Scholar
  29. Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.École Polytechnique Fédérale de Lausanne (EPFL)LausanneSwitzerland
  2. 2.Nanyang Technological UniversitySingaporeSingapore
  3. 3.Distributed Inf. Sys Lab.Inst. for Core Computing Science (IIF), EPFL-IC-IIF-LSIRLausanneSwitzerland

Section editors and affiliations

  • Przemysław Kazienko
    • 1
  • Jaroslaw Jankowski
    • 2
  1. 1.Department of Computer Science and Management, Institute of InformaticsWrocław University of TechnologyWrocławPoland
  2. 2.Faculty of Computer Science and Information TechnologyWest Pomeranian University of TechnologySzczecinPoland