Skip to main content

Computational Trust Models

  • Reference work entry
  • First Online:
  • 73 Accesses

Synonyms

Agent; Interaction

Glossary

Agent:

A generic term representing any entities (e.g., peer in Peer-to-Peer networks, user in various Web 2.0 applications) that interact with each other

Interaction or transaction:

The process where the trustor accepts and consumes services or products that are provided by the trustee

Trustee or target agent:

The agent who will be evaluated

Trustor:

The agent who wants to evaluate its trust in another agent

Overview

Many Internet-scale social applications have evolved recently, fueled by and fueling applications open to all, e.g., various Web 2.0 applications, where end users play active role in the system, and thus, their activities in turn significantly impact the system’s behavior and other users’ experience with the same. For instance, different from traditional static websites, Web 2.0 applications allow users to not only retrieve information but also contribute contents and share information with others (e.g., Wikipedia, Facebook, Twitter,...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii international conference on system sciences (HICSS), Maui

    Google Scholar 

  • Abdul-Rahman A, Hailes S (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New Security Paradigms (NSPW), Langdale, Cumbria, pp 48–60

    Google Scholar 

  • Aberer K, Despotovic Z (2001) Managing trust in a peer-2-peer information system. In: CIKM, Atlanta

    Google Scholar 

  • Buchegger S, Boudec JYL (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 03: modeling and optimization in mobile, ad hoc and wireless networks, Sophia Antipolis

    Google Scholar 

  • Burnett C, Norman TJ, Sycara K (2010) Bootstrapping trust evaluations through stereotypes. In: Proceedings of the 9th international conference on autonomous agents and multiagent systems, Toronto, pp 241–248

    Google Scholar 

  • Despotovic Z, Aberer K (2006) P2p reputation management: probabilistic estimation vs. social networks. Comput Netw 50(4):485–500. MATH

    Article  MATH  Google Scholar 

  • Gambetta D (1988) Can we trust trust? In: Gambetta D (ed) Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213–237

    Google Scholar 

  • Golembiewski RT, McConkie M (1975) The centrality of interpersonal trust in group processes. In: Cooper CL (ed) Theories of group processes. Wiley, London/New York, pp 131–185

    Google Scholar 

  • Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, New York, pp 403–412

    Google Scholar 

  • Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th Bled electronic commerce conference, Bled, pp 324–337

    Google Scholar 

  • Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  • Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web (WWW), Budapest, pp 640–651

    Google Scholar 

  • Lauw HW, Lim EP, Wang K (2006) Bias and controversy: beyond the statistical deviation. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’06, Philadelphia

    Google Scholar 

  • Liu X, Datta A (2012a) Contextual trust aided enhancement of data availability in peer-to-peer backup storage systems. J Netw Syst Manag 20:200–225

    Article  Google Scholar 

  • Liu X, Datta A (2012b) Modeling context aware dynamic trust using hidden markov model. In: Proceedings of the twenty-sixth conference on artificial intelligence (AAAI), Toronto

    Google Scholar 

  • Liu X, Datta A, Rzadca K, Lim E (2009) Stereotrust: a group based personalized trust model. In: Proceedings of the 18th ACM conference on information and knowledge management (CIKM), Hong Kong, pp 7–16

    Google Scholar 

  • Liu X, Kaszuba T, Nielek R, Datta A, Wierzbicki A (2010) Using stereotypes to identify risky transactions in internet auctions. In: Proceedings of the IEEE second international conference on social computing, Minneapolis, pp 513–520

    Google Scholar 

  • Liu X, Tredan G, Datta A (2011) Metatrust: discriminant analysis of local information for global trust assessment. In: Proceedings of the 10th international conference on autonomous agents and multiagent systems (AAMAS), Taipei

    Google Scholar 

  • Marsh SP (1994) Formalising trust as a computational concept. PhD thesis, University of Stirling

    Google Scholar 

  • Mcknight DH, Chervany NL (1996) The meanings of trust. Technical report, University of Minnesota

    Google Scholar 

  • Mui L, Mohtashemi M (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system science, Hawaii, pp 2431–2439

    Google Scholar 

  • Rich E (1998) User modeling via stereotypes. In: Maybury MT, Wahlster W (eds) Readings in intelligent user interfaces. Morgan Kaufmann, San Francisco, pp 329–342

    Google Scholar 

  • Schillo M, Funk P, Rovatsos M (2000) Using trust for detecting deceitful agents in artificial societies. Appl Artif Intell 14(8):825–848

    Article  Google Scholar 

  • Tadelis S (2003) Firm reputation with hidden information. Economic Theory 21:635–651. MATHMathSciNet

    Article  MathSciNet  MATH  Google Scholar 

  • Teacy WTL, Patel J, Jennings NR, Luck M (2006) Travos: trust and reputation in the context of inaccurate information sources. Auton Agent Multi-Agent Syst 12:183–198

    Article  Google Scholar 

  • Xiong L, Liu L (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  • Zacharia G (1999) Collaborative reputation mechanisms for online communities. PhD thesis, Massachusetts Institute of Technology

    Google Scholar 

  • Zhang J, Cohen R (2008) Evaluating the trustworthiness of advice about seller agents in e-marketplaces: a personalized approach. Electron Commer Res Appl 7:330–340

    Article  Google Scholar 

  • Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Liu .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Liu, X., Datta, A., Aberer, K. (2018). Computational Trust Models. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_228

Download citation

Publish with us

Policies and ethics