Abstract
The use of reputation systems has been proposed for various applications, e. g., to estimate the trustworthiness of sellers and buyers in electronic transactions. Reputation systems collect opinions of users about properties of certain services, subjects and other users and evaluate these opinions. It is important that the results of reputation systems are consistent with intuitive expectations of its users, which highly depends on the properties of the underlying trust model. The trust model defines the representation of the trust values as well as the computation of trust values for derived trust relations.
Please use the following format when citing this chapter: Guischer, A., 2007, in IFIP international Federation for Information Processing, Volume 238, Trust Management, eds. Etalle, S., Marsh, S., (Boston: Springer), pp. 285–300.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ashley, J.M., Copeland, M., Grahn, J., Wheeler, D.A.: The GNU Privacy Handbook. The Free Software Foundation. (1999)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. In: Decision Support Systems. (2007)
Grandison, T., Sloman, M.: A survey of trust in internet application. IEEE Communications Surveys & Tutorials 3(4) (2000)
Good, N., Schafer, J.B., Konstan, J.A., Borchers, A., Sarwar, B., Herlocker, J., Riedl, J.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the Sixteenth National Conference on Artificial Intelligence. (1999) 439–446
Suryanarayana, G., Taylor, R.N.: A survey of trust management and resource discovery technologies in peer-to-peer applications. Technical Report UCI-ISR-04-6, Institute for Software Research, University of California (2004)
Demolombe, R.: Reasoning about trust: A formal logical framework. In: Proceedings of the Second International Conference of Trust Management (iTrust 2004). (2004) 291–303
Marsh, S., Dibben, M.R.: Trust, Untrust, Distrust and Mistrust —An Exploration of the Dark(er) Side. In Herrmann, P., Issarny, V., Shiu, S., eds.: Proceedings of Third iTrust International Conference (iTrust 2005), Paris, France, May 23–26, 2005. Volume 3477., Springer (May 2005) 17–33
Vasalou, A., Pitt, J.: Reinventing forgiveness: A formal investigation of moral facilitation. In: Proceedings of the Third International Conference of Trust Management (iTrust 2005). (2005) 146–160
Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human experiments in trust dynamics. In: Proceedings of the Second International Conference of Trust Management (iTrust 2004). (2004) 206–220
Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling (1994)
Shafer, G.: A Mathematical Theory of Evidence. Princeton Univ. Press (1976)
Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory (2002)
Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Proceedings 3rd European Symposium on Research in Computer Security (ESORICS) 1994, Springer-Verlag (1994) 3–18
Jøsang, A.: Artificial Reasoning with Subjective Logic (1997)
Jøsang, A., Knapskog, S.: A Metric for Trusted Systems. In: Proceedings 21st National Security Conference 1998. (1998)
Jøsang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. In: Web Intelligence and Agent Systems Journal. (2006) 139–161
Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: In the proceedings of Public Key Cryptography 2000. Volume 1751 of Lecture Notes in Computer Science. (January 2000) 93–112
Maurer, U.: Modelling a Public-Key Infrastructure. In Bertino, E., ed.: Proc. 1996 European Symposium on Research in Computer Security (ESORICS’ 96). Volume 1146 of Lecture Notes in Computer Science., Springer-Verlag (1996) 325–350
Reiter, M.K., Stubblebine, S.: Toward acceptable metrics of authentication. In: Proceedings of IEEE Symposium on Security and Privacy. (1997) 10–20
Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. In: IEEE Journal on Selected Areas in Communications, Volume 24, Issue 2. (Feb 2006) 305–317
Langheinrich, M.: When Trust Does Not Compute The Role of Trust in Ubiquitous Computing. Workshop on Privacy at Ubicomp 2003 (October 2003)
Gambetta, D. In: Can We Trust Trust? Basil Blackwell (1988) 213–237 Reprinted in electronic edition from Department of Sociology, University of Oxford, chapter 13, pp. 213-237.
Jøsang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In Dimitrakos, T., Martinelli, F., eds.: Proceedings of the First International Workshop on Formal Aspects in Security & Trust (FAST2003), Pisa, Italy (September 2003) 9–22
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Gutscher, A. (2007). A Trust Model for an Open, Decentralized Reputation System. In: Etalle, S., Marsh, S. (eds) Trust Management. IFIPTM 2007. IFIP International Federation for Information Processing, vol 238. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73655-6_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-73655-6_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73654-9
Online ISBN: 978-0-387-73655-6
eBook Packages: Computer ScienceComputer Science (R0)