Trust without Truth

  • Michel Deriaz
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Can we trust without any reliable truth information? Most trust architectures work in a similar way: a trustor makes some observations, rates the trustee, and makes recommendations to his friends. When he faces a new case, he checks his trust table and uses recommendations given by trustworthy friends to decide whether he will undertake a given action. But what if the observations that are used to update the trust tables are wrong? How to deal with what we call the “uncertainty of the truth”? This paper presents how people that publish and remove virtual tags are able to create trust relations between them. A simulator as well as a concrete and widely deployed application have been used to validate our model. We observed good and encouraging results in general, but also some weaknesses, brought out through specific scenarios


Mobile Phone Trust Relationship Trust Mechanism Local Trust Trust Metrics 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
  2. [2]
    M. Deriaz and J.-M. Seigneur, “Trust and Security in Spatial Messaging: FoxyTag, the Speed Camera Case Study”, in Proceedings of the 3rd International Conference on Privacy, Security and Trust, ACM, 2006.Google Scholar
  3. [3]
    N. Dimmock, “Using trust and risk for access control in Global Computing”, PhD thesis, University of Cambridge, 2005.Google Scholar
  4. [4]
  5. [5]
    R. Guha, “Open Rating Systems”, 1st Workshop on Friend of a Friend, Social Networking and the Semantic Web, 2004.Google Scholar
  6. [6]
    N. Mezzetti, “A Socially Inspired Reputation Model”, in Proceedings of EuroPKI, 2004.Google Scholar
  7. [7]
    M. Deriaz, “What is Trust? My Own Point of View”, ASG technical report, 2006.Google Scholar
  8. [8]
    S. Buchegger and J.-Y. Le Boudec, “A Robust Reputation System for P2P and Mobile Ad-hoc Networks”, in Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004.Google Scholar
  9. [9]
    D. Quercia, S. Hailes, and L. Capra, “B-trust: Bayesian Trust Framework for Pervasive Computing”, in Proceedings of the 4th International Conference on Trust Management (iTrust), LNCS, Springer, 2006.Google Scholar
  10. [10]
    J. Burrell and G.K. Gay, “E-graffiti: evaluating real-world use of a contextaware system”, in Interacting with Computers, 14(4) p. 301–312.Google Scholar
  11. [11]
    P. Persson, F. Espinoza, P. Fagerberg, A. Sandin, and R. Cöster, “GeoNotes: A Location-based Information System for Public Spaces”, in Höök, Benyon, and Munro (eds.), Readings in Social Navigation of Information Space, Springer (2000).Google Scholar
  12. [12]
  13. [13]
    M. Deriaz and J.-M. Seigneur, “FoxyTag”, ASG technical report, 2006.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Michel Deriaz
    • 1
  1. 1.University of GenevaSwitzerland

Personalised recommendations