Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach

  • Chunmei Gui
  • Quanyuan Wu
  • Huaimin Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


To guarantee trustworthiness and reliability of resource selection, entity’s reputation is a key factor that decides our selection, no matter who is provider or consumer. Built on top of idea of SOA, based on fuzzy logic methods of optimal membership degree, the approach is efficient to deal with uncertainty, fuzziness, and incompleteness of information in systems, and finally builds instructive decision. By applying the approach using eBay transaction statistical data, the paper demonstrates the final integrative decision order in various conditions. Compared with other methods, this approach has better overall consideration, accords with human selection psychology naturally.


Membership Degree Total Order Resource Provider Resource Selection Relative Membership Degree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)CrossRefGoogle Scholar
  2. 2.
    Yao, W., Julita, V.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proceedings of the 3rd IEEE International Conference on Peer-to-Peer Computing, pp. 150–158. IEEE Computer Society, Linkping (2003)Google Scholar
  3. 3.
    Dengfeng, L.: Fuzzy Multiobjective Many-person Decision Makings and Games[M]. National Defense Industry Press, Beijing (2003)Google Scholar
  4. 4.
    Marsh, S.: Formalising trust as a computational concept. PhD Thesis. Scotland, University of Stirling (1994)Google Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Dale, J., Dinolt, G. (eds.) Proceedings of the 17th Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society Press, Oakland (1996)Google Scholar
  6. 6.
    Shanshan, S., Kai, H., Mikin, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Beulah, K.A.: Grid EigenTrust: A Framework for Computing Reputation in Grids. MS thesis, Department of Computer Science, Illinois Institute of Technology (November 2003)Google Scholar
  8. 8.
    Xiong, L., Lin, L.: PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities. IEEE Transactions on Knowledge and Data Engineering, Special Issue on Peer-to-Peer Based Data Management 16(7) (July 2004)Google Scholar
  9. 9.
    Guha, R.: Propagation of Trust and Distrust. In: Proc. ACM World Wide Web Conference(WWW 2004), pp. 403–412. ACM Press, New York (2004)CrossRefGoogle Scholar
  10. 10.
    Yan, S., Wei, Y., Zhu, H., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks, Selected Areas in Communications. IEEE Journal on 24(2) (February 2006)Google Scholar
  11. 11.
    Florina, A., Andres, M., Daniel, D., Juan, S.: Developing a Model for Trust Management in Pervasive Devices. In: Third IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2006), at Fourth Annual IEEE International Conference on Pervasive Computing and Communications (March 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Chunmei Gui
    • 1
  • Quanyuan Wu
    • 1
  • Huaimin Wang
    • 1
  1. 1.School of Computer Science, National University of Defense Technology, 410073, Changsha, Email:

Personalised recommendations