Trust Ontology for Information Systems Development

  • Kamaljit Kaur Bimrah
  • Haralambos Mouratidis
  • David Preston


In this chapter we review a number of works related to trust modelling and we identify some important limitations. In particular, we first argue that an ontology for trust modelling should include a number of concepts related to trust such as reputation, privacy and security. Then we discuss the current state of the art and illustrate that these works fail to consider all these concepts in a unified —conceptual framework. We then describe the development of an ontology that considers trusts and its related concepts and we briefly illustrate how such ontology can be used to assist information systems developers in analysing trust-related issues of information systems. In doing so, we use a case study from the health care domain.


Related Concept Ontology Development Instance Attribute Initial Trust Information System Development 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Firstly, we would like to show gratitude to EPSRC for their funding with regards to this project and secondly we would like to express thanks to the staff at St Patrick's College, (London) for their support in our research.


  1. Abdul-Rahman, A., Hailes, S (2000) Supporting Trust in Virtual Communities. In Proceedings of the Hawaii International Conference on System Sciences 33. Maui, Hawaii.Google Scholar
  2. Alberts, C., Dorofee, A., Stevens, J., Woody, C. (2003) Introduction to the OCTAVE Approach. . Software Engineering Institute. Carnegie Mellon University, Pittsburgh, PA.Google Scholar
  3. Alford, J. (2004) Building Trust in Partnerships Between Community Orgnization and Government. Changing the Way Government Works Seminar. Melbourne.Google Scholar
  4. Almenarez, F., Marin, A., Campo, C., Garcia, C. (2004 ) PTM: A Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security, Privacy and Trust, PSPT’04 in conjunction with Mobiquitous. Boston.Google Scholar
  5. Cams and the Department of Commerce and Trade (2003) A Security Management Framework for Online Services.Google Scholar
  6. Carbone, M., Nielsen, M., Sassone, V. (2003) A Formal Model for Trust in Dynamic Networks. BRICS Report RS-03–4.Google Scholar
  7. Casare , S., Sichman, J. (2005) Towards a Functional Ontology of Reputation, Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems. The Netherlands.Google Scholar
  8. Chang, E., Hussain, F.K., Dillon, T. (2005) Reputation Ontology for Reputation Systems. International Workshop on Web Semantics (SWWS), pp. 957–966.Google Scholar
  9. Chopra, K., Wallace, W.A. (2003) Trust in Electronic Environments. Proceedings of the 36th Hawaii Conference on System Sciences (HICSS’03). Hawaii.Google Scholar
  10. Cuske, C., Korthaus, A., Seedorf, S., Tomczyk, P. (2005) Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry. Proceedings of the 1st Workshop Formal Ontologies Meet Industry. Verona, Italy.Google Scholar
  11. Fernandez-Lopez, M., Gomez-Perez, A. (2002) Deliverable 1.4: A Survey on Methodologies for Developing, Maintaining, Integrating, Evaluating and Reengineering Ontologies.Google Scholar
  12. Golbeck, J., Hendler, J. (2004) Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks. Engineering Knowledge in the Age of the SemanticWeb: 14th International Conference, EKAW 2004, Proceedings Whittlebury Hall, UK. Springer, Berlin/Heidelberg.Google Scholar
  13. Gomez-Perez, A., Fernandez-Lopez, Corcho, O. (2004) Ontological Engineering, Springer-Verlag, London.Google Scholar
  14. Jomes, D., Bench-Capon, T., Visser, P. (1998) Methodologies for Ontology Development. In Proceedings of IT&KNOWS — Information Technology and Knowledge Systems — Conference of the 15th IFIP World Computer Congress. Vienna/Austria/Budapest, Bulgaria.Google Scholar
  15. Jøsang, A., Patton, M.A. (2004) Technologies for Trust in Electronic Commerce. Electronic Commerce Research Journal, 4, 9–21.CrossRefGoogle Scholar
  16. Jøsang, A., Kesar, C., Dimitrakos, T. (2005) Can We Manage Trust? 3rd International Conference on Trust Management (iTrust). Paris.Google Scholar
  17. Jøsang, A., Ismail, R., and Boyd, C. (2007) A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), 618–644.CrossRefGoogle Scholar
  18. Jøsang, A., Lo Presti, S. (2004) Analysing the Relationship Between Risk and Trust. IN DIMITRAKOS, T. (Ed.) Proceedings of the Second International Conference on Trust Management. Oxford.Google Scholar
  19. Kethers , S.E.A. (2005) Modelling Trust Relationships in a Healthcare Network: Experiences with the TCD Framework. In Proceedings of the Thirteenth European Conference on Information Systems. Regensburg, Germany.Google Scholar
  20. Kim, A., Luo, J., Kang, M. (2005) Security Ontology for Annotating Resources. In Meersman, R.T.Z. (Ed.) Lecture Notes in Computer Science. Agai Napa, Cyprus, Springer-Verlag Berlin/Heidelberg.Google Scholar
  21. Lau, T.S., Sure, Y. (2002) Introducing Ontology-based Skills Management at a Large Insurance Company. pp. 123–134.Google Scholar
  22. Li, X., Valachich, J.S., Hess, T.J. (2004) Predicting User Trust in Information Systems: A Comparison of Competing Trust Models. The Proceedings of the 37th Hawaii International Conference on Systems Sciences. Hawaii.Google Scholar
  23. Lo Presti, S., Cusack, M., Booth, C. (2003) Deliverable WP2-01 — Trust Issues in Pervasive Environments. QinetiQ & the University of Southampton.Google Scholar
  24. Maarof, M.A., Krishna, K. (2002) A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia. 81310 Skudai, Johor.Google Scholar
  25. Martimiano, A.F.M., Moreira, E.S. (2005) An OWL-based Security Incident Ontology. In:Proceedings of the Eighth International Protege Conference. pp. 43–44 Poster.Google Scholar
  26. Mayer, N., Rifaut, A., Dubois, E. (2005) Towards a Risk-Based Security Requirements Engineering Framework. 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ’05), in conjunction with CAiSE’05. Porto, Portugal.Google Scholar
  27. Mayer, N., Heymans, P., Matulevicius, R. (2007) Design of a Modelling Language for Information System Security Risk Managemen. 1st International Conference on Research Challenges in Information Science (RCIS 2007). Ouarzazate, Morocco.Google Scholar
  28. Michael, J. B., Hestad, D.R., Pedersen, C.M., Gaines L.T. (2002) Incorporating the Human Element of Trust into Information Systems. IAnewsletter, 5, 4–8.Google Scholar
  29. Mouratidis, H., Giorgini, P., Manson, G., Philip, I. (2002) Using Tropos Methodology to Model an Integrated Health Assessment System. Proceedings of the 4th International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS-2002). Toronto-Ontario.Google Scholar
  30. Mouratidis, H., Giorgini, P., Manson, G. (2003) An Ontology for Modelling Security: The Tropos Approach. In Palade, V., Howlett, R. (Ed.) Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems. Oxford, England.Google Scholar
  31. Mouratidis, H., Giorgini, P (2006) Integrating Security and Software Engineering: Advances and Future Vision. Idea Group.Google Scholar
  32. Noy, N.F., McGuinness, D.L. (2001) Ontology Development 101: A Guide to Creating Your First Ontology. Technical Report KSL-01–05. Stanford Knowledge Systems Laboratory.Google Scholar
  33. Numan, J. (1998) Knowledge-Based Systems as Companions: Trust, Human Computer Interaction and Complex Systems. University of Groningen.Google Scholar
  34. Pinto, H.S., Martins, J.P. (2004) Ontologies: How Can They Be Built? Knowledge and Information Systems, 6, 441–464.CrossRefGoogle Scholar
  35. Purser, S. (2001) A Simple Graphical Tool for Modelling Trust. Computers and Security, 20, 479–484.CrossRefGoogle Scholar
  36. Robinson, S.L. (1996) Trust and Breach of the Psychological Contract. Administrative Science Quarterly, 41, 574–579.CrossRefGoogle Scholar
  37. Simmonds, A., Sandilands, P., Ekert, L.V. (2004) An Ontology for Network Security Attacks. In Manandharm, S., A., J., Desai, U., Oyangi, Y., Talukder, A. (Ed.) Lecture Notes in Computer Science. Kathmandu, Nepal, Springer Berlin/HeidelbergGoogle Scholar
  38. Stolen, K. (2002) Model-Based Risk Assessment - the CORAS Approach, In Proceedings of the First iTrust Workshop.Google Scholar
  39. Sutcliffe, A. (2006) Trust: From Cognition to Conceptual Models and Design. In Dubois, E., Pohl, K (Ed.) 18th International Conference, CAiSE 2006, June 5, 2006 Proceedings. Luxembourg, Luxembourg, Springer-Verlag, Berlin/Heidelberg.Google Scholar
  40. Uschold, M., Gruninger, M (1996) Ontologies: Principles, Methods and Applications. Knowledge Engineering Review, 11, 69.CrossRefGoogle Scholar
  41. Viljanen, L. (2005) Towards an Ontology of Trust. Lecture Notes in Computer Science. Copenhagen, Denmark. Springer, Berlin/Heidelberg.Google Scholar
  42. Yu, E., Liu, L (2001) Modelling Trust for System Design Using the i* Strategic Actors Framework. In Verlag, S. (Ed.) Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives.Google Scholar
  43. Yu, E., Cysneiros, LM (2002) Designing for Privacy and Other Computing Requirements. 2nd Symposium on Requirements Engineering for Information Security. Raleigh, North Carolina.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Kamaljit Kaur Bimrah
  • Haralambos Mouratidis
  • David Preston

There are no affiliations available

Personalised recommendations