A Trust Model for an Open, Decentralized Reputation System

  • Andreas Gutscher
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


The use of reputation systems has been proposed for various applications, e. g., to estimate the trustworthiness of sellers and buyers in electronic transactions. Reputation systems collect opinions of users about properties of certain services, subjects and other users and evaluate these opinions. It is important that the results of reputation systems are consistent with intuitive expectations of its users, which highly depends on the properties of the underlying trust model. The trust model defines the representation of the trust values as well as the computation of trust values for derived trust relations.


Inference Rule Trust Management Reputation System Trust Relation Indirect Trust 


  1. 1.
    Ashley, J.M., Copeland, M., Grahn, J., Wheeler, D.A.: The GNU Privacy Handbook. The Free Software Foundation. (1999)Google Scholar
  2. 2.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. In: Decision Support Systems. (2007)Google Scholar
  3. 3.
    Grandison, T., Sloman, M.: A survey of trust in internet application. IEEE Communications Surveys & Tutorials 3(4) (2000)Google Scholar
  4. 4.
    Good, N., Schafer, J.B., Konstan, J.A., Borchers, A., Sarwar, B., Herlocker, J., Riedl, J.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the Sixteenth National Conference on Artificial Intelligence. (1999) 439–446Google Scholar
  5. 5.
    Suryanarayana, G., Taylor, R.N.: A survey of trust management and resource discovery technologies in peer-to-peer applications. Technical Report UCI-ISR-04-6, Institute for Software Research, University of California (2004)Google Scholar
  6. 6.
    Demolombe, R.: Reasoning about trust: A formal logical framework. In: Proceedings of the Second International Conference of Trust Management (iTrust 2004). (2004) 291–303Google Scholar
  7. 7.
    Marsh, S., Dibben, M.R.: Trust, Untrust, Distrust and Mistrust —An Exploration of the Dark(er) Side. In Herrmann, P., Issarny, V., Shiu, S., eds.: Proceedings of Third iTrust International Conference (iTrust 2005), Paris, France, May 23–26, 2005. Volume 3477., Springer (May 2005) 17–33Google Scholar
  8. 8.
    Vasalou, A., Pitt, J.: Reinventing forgiveness: A formal investigation of moral facilitation. In: Proceedings of the Third International Conference of Trust Management (iTrust 2005). (2005) 146–160Google Scholar
  9. 9.
    Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human experiments in trust dynamics. In: Proceedings of the Second International Conference of Trust Management (iTrust 2004). (2004) 206–220Google Scholar
  10. 10.
    Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling (1994)Google Scholar
  11. 11.
    Shafer, G.: A Mathematical Theory of Evidence. Princeton Univ. Press (1976)Google Scholar
  12. 12.
    Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory (2002)Google Scholar
  13. 13.
    Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Proceedings 3rd European Symposium on Research in Computer Security (ESORICS) 1994, Springer-Verlag (1994) 3–18Google Scholar
  14. 14.
    Jøsang, A.: Artificial Reasoning with Subjective Logic (1997)Google Scholar
  15. 15.
    Jøsang, A., Knapskog, S.: A Metric for Trusted Systems. In: Proceedings 21st National Security Conference 1998. (1998)Google Scholar
  16. 16.
    Jøsang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. In: Web Intelligence and Agent Systems Journal. (2006) 139–161Google Scholar
  17. 17.
    Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: In the proceedings of Public Key Cryptography 2000. Volume 1751 of Lecture Notes in Computer Science. (January 2000) 93–112Google Scholar
  18. 18.
    Maurer, U.: Modelling a Public-Key Infrastructure. In Bertino, E., ed.: Proc. 1996 European Symposium on Research in Computer Security (ESORICS’ 96). Volume 1146 of Lecture Notes in Computer Science., Springer-Verlag (1996) 325–350Google Scholar
  19. 19.
    Reiter, M.K., Stubblebine, S.: Toward acceptable metrics of authentication. In: Proceedings of IEEE Symposium on Security and Privacy. (1997) 10–20Google Scholar
  20. 20.
    Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. In: IEEE Journal on Selected Areas in Communications, Volume 24, Issue 2. (Feb 2006) 305–317MATHCrossRefGoogle Scholar
  21. 21.
    Langheinrich, M.: When Trust Does Not Compute The Role of Trust in Ubiquitous Computing. Workshop on Privacy at Ubicomp 2003 (October 2003)Google Scholar
  22. 22.
    Gambetta, D. In: Can We Trust Trust? Basil Blackwell (1988) 213–237 Reprinted in electronic edition from Department of Sociology, University of Oxford, chapter 13, pp. 213-237.Google Scholar
  23. 23.
    Jøsang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In Dimitrakos, T., Martinelli, F., eds.: Proceedings of the First International Workshop on Formal Aspects in Security & Trust (FAST2003), Pisa, Italy (September 2003) 9–22Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Andreas Gutscher
    • 1
  1. 1.Institute of Communication Networks and Computer EngineeringUniversität StuttgartStuttgartGermany

Personalised recommendations