Trust and Reputation Systems

  • Audun Jøsang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4677)


There are currently very few practical methods for assessing the quality of resources or the reliability of other entities in the online environment. This makes it difficult to make decisions about which resources can be relied upon and which entities it is safe to interact with. Trust and reputation systems are aimed at solving this problem by enabling service consumers to reliably assess the quality of services and the reliability of entities before they decide to use a particular service or to interact with or depend on a given entity. Such systems should also allow serious service providers and online players to correctly represent the reliability of themselves and the quality of their services. In the case of reputation systems, the basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive its reputation score. In the case of trust systems, the basic idea is to analyse and combine paths and networks of trust relationships in order to derive measures of trustworthiness of specific nodes. Reputation scores and trust measures can assist other parties in deciding whether or not to transact with a given party in the future, and whether it is safe to depend on a given resource or entity. This represents an incentive for good behaviour and for offering reliable resources, which thereby tends to have a positive effect on the quality of online markets and communities. This chapter describes the background, current status and future trend of online trust and reputation systems.


Trust Management Reputation System Versus Versus Versus Versus Versus Reputation Score PageRank Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii, January 4-7, 2000 (2000)Google Scholar
  2. 2.
    Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Paques, H., Liu, L., Grossman, D. (eds.) Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM 2001), pp. 10–317. ACM Press, New York (2001)Google Scholar
  3. 3.
    Abrams, M.D.: Trusted System Concepts. Computers and Security 14(1), 45–56 (1995)CrossRefGoogle Scholar
  4. 4.
    Adar, E., Huberman, B.A.: Free Riding on Gnutella. First Monday (Peer-reviewed Journal on the Internet) 5(10), 8 (2000)Google Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Conference on Security and Privacy, Oakland, CA (1996)Google Scholar
  6. 6.
    Cahill, V., Shand, B., Gray, E., et al.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing 2(3), 52–61 (2003)CrossRefGoogle Scholar
  7. 7.
    Carbone, M., Nielsen, M., Sassone, V.: A Formal Model for Trust in Dynamic Networks. In: Proc. of International Conference on Software Engineering and Formal Methods (SEFM 2003), Brisbane (September 2003)Google Scholar
  8. 8.
    Christianson, B., Harbison, W.S.: Why Isn’t Trust Transitive? In: Proceedings of the Security Protocols International Workshop, University of Cambridge, Cambridge (1996)Google Scholar
  9. 9.
    Clausen, A.: The Cost of Attack of PageRank. In: Proceedings of The International Conference on Agents, Web Technologies and Internet Commerce (IAWTIC 2004), Gold Coast (July 2004)Google Scholar
  10. 10.
    Cornelli, F., et al.: Choosing Reputable Servents in a P2P Network. In: Proceedings of the eleventh international conference on World Wide Web (WWW 2002), ACM, New York (2002)Google Scholar
  11. 11.
    Damiani, E., et al.: A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security (CCS 2002), pp. 207–216. ACM, New York (2002)CrossRefGoogle Scholar
  12. 12.
    Fahrenholtz, D., Lamesdorf, W.: Transactional Security for a Distributed Reputation Management System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2002. LNCS, vol. 2455, pp. 214–223. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  13. 13.
    Falcone, R., Castelfranchi, C.: How trust enhances and spread trust. In: Proceedings of the 4th Int. Workshop on Deception Fraud and Trust in Agent Societies, in the 5th International Conference on Autonomous Agents (AGENTS 2001) (May 2001)Google Scholar
  14. 14.
    Falcone, R., Castelfranchi, C.: Social Trust: A Cognitive Approach. In: Castelfranchi, C., Tan, Y.H. (eds.) Trust and Deception in Virtual Societies, pp. 55–99. Kluwer, Dordrecht (2001)Google Scholar
  15. 15.
    Freeman, L.C.: Centrality on Social Networks. Social Networks 1, 215–239 (1979)CrossRefGoogle Scholar
  16. 16.
    Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–238. Basil Blackwell, Oxford (1990)Google Scholar
  17. 17.
    Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials, 3 (2000)Google Scholar
  18. 18.
    Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video (NOSSDAV) (2003)Google Scholar
  19. 19.
    Ismail, R., Boyd, C., Jøsang, A., Russel, S.: Strong Privacy in Reputation Systems. In: Proceedings of the 4th International Workshop on Information Security Applications (WISA), Jeju Island, Korea (August 2003)Google Scholar
  20. 20.
    Ismail, R., Boyd, C., Jøsang, A., Russel, S.: An Efficient Off-Line Reputation Scheme Using Articulated Certificates. In: Proceedings of the Second International Workshop on Security in Information Systems (WOSIS 2004) (2004)Google Scholar
  21. 21.
    ISO: ISO/IEC IS17799 - Information technology – Code of practice for information security management. ISO/IEC (2005)Google Scholar
  22. 22.
    Jøsang, A.: The right type of trust for distributed systems. In: Meadows, C. (ed.) Proc. of the 1996 New Security Paradigms Workshop, ACM, New York (1996)Google Scholar
  23. 23.
    Jøsang, A.: Trust-Based Decision Making for Electronic Transactions. In: Yngström, L., Svensson, T. (eds.) Proceedings of the 4th Nordic Workshop on Secure Computer Systems (NORDSEC 1999). Stockholm University, Sweden (1999)Google Scholar
  24. 24.
    Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)MathSciNetGoogle Scholar
  25. 25.
    Jøsang, A.: Probabilistic Logic Under Uncertainty. In: Proceedings of Computing: The Australian Theory Symposium (CATS 2007), CRPIT Ballarat, Australia, vol. 65 (January 2007)Google Scholar
  26. 26.
    Jøsang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (June 2002)Google Scholar
  27. 27.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  28. 28.
    Jøsang, A., Haller, J.: Dirichlet Reputation Systems. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria (April 2007)Google Scholar
  29. 29.
    Jøsang, A., Lo Presti, S.: Analysing the Relationship Between Risk and Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, Springer, Heidelberg (2004)Google Scholar
  30. 30.
    Jøsang, A., Pope, S.: Semantic Constraints for Trust Tansitivity. In: Hartmann, S., Stumptner, M. (eds.) Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM) (Conferences in Research and Practice in Information Technology), Newcastle, Australia, vol. 43 (February 2005)Google Scholar
  31. 31.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the Twelfth International World Wide Web Conference, Budapest (May 2003)Google Scholar
  32. 32.
    Krukow, K., Nielsen, M.: From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust (FAST 2006), Ontario, Canada (August 2006)Google Scholar
  33. 33.
    Levien, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2004)Google Scholar
  34. 34.
    Liau, C.Y., et al.: Efficient Distributed Reputation Scheme for Peer-to-Peer Systems. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 54–63. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  35. 35.
    Manchala, D.W.: Trust Metrics, Models and Protocols for Electronic Commerce Transactions. In: Proceedings of the 18th International Conference on Distributed Computing Systems (1998)Google Scholar
  36. 36.
    Marsden, P.V., Lin, N. (eds.): Social Structure and Network Analysis. Sage Publications, Beverly Hills (1982)Google Scholar
  37. 37.
    McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Reseach Center (1996)Google Scholar
  38. 38.
    Merriam-Webster: Merriam-Webster Online (accessed June 2007), Available from
  39. 39.
    Mui, L., Mohtashemi, M., Ang, C.: A Probabilistic Rating Framework for Pervasive Computing Environments. In: Proceedings of the MIT Student Oxygen Workshop (SOW 2001) (2001)Google Scholar
  40. 40.
    Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Ratings in Distributed Systems: A Bayesian Approach. In: Proceedings of the Workshop on Information Technologies and Systems (WITS) (2001)Google Scholar
  41. 41.
    Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Hawaii International Conference on System Science (HICSS) (2002)Google Scholar
  42. 42.
    OASIS: Conformance Requirements for the OASIS Security Assertion Markup Language (SAML) V2.0, Committee Draft. Organization for the Advancement of Structured Information Standards (January 15, 2005)Google Scholar
  43. 43.
    Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)Google Scholar
  44. 44.
    Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Meadows, C. (ed.) Proceedings of the 1996 New Security Paradigms Workshop, ACM, New York (1996)Google Scholar
  45. 45.
    Resnick, P., Zeckhauser, R.: Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol. 11, Elsevier Science, Amsterdam (2002)CrossRefGoogle Scholar
  46. 46.
    Sabater, J., Sierra, C.: REGRET: A reputation model for gregarious societies. In: Proceedings of the 4th Int. Workshop on Deception, Fraud and Trust in Agent Societies, in the 5th Int. Conference on Autonomous Agents (AGENTS 2001), Montreal, Canada, pp. 61–69 (2001)Google Scholar
  47. 47.
    Sabater, J., Sierra, C.: Reputation and Social Network Analysis in Multi-Agent Systems. In: Alonso, E., Kudenko, D., Kazakov, D. (eds.) Adaptive Agents and Multi-Agent Systems. LNCS (LNAI), vol. 2636, Springer, Heidelberg (2003)Google Scholar
  48. 48.
    Sabater, J., Sierra, C.: Social ReGreT, a reputation model based on social relations. SIGecom Exchanges 3(1), 44–56 (2002)CrossRefGoogle Scholar
  49. 49.
    Schneider, J., et al.: Disseminating Trust Information in Wearable Communities. In: Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC2K) (September 2000)Google Scholar
  50. 50.
    Simmons, G.J.: An introduction to the mathematics of trust in security protocols. In: Proceedings of the 1993 Computer Security Foundations Workshop, pp. 121–127. IEEE Computer Society Press, Los Alamitos, CA (1993)CrossRefGoogle Scholar
  51. 51.
    Tadelis, S.: Firm Reputation with Hidden Information. Economic Theory 21(2), 635–651 (2003)zbMATHCrossRefMathSciNetGoogle Scholar
  52. 52.
    Williamson, O.E.: Calculativeness, Trust and Economic Organization. Journal of Law and Economics 36, 453–486 (1993)CrossRefGoogle Scholar
  53. 53.
    Withby, A., Jøsang, A., Indulska, J.: Filtering Out Unfair Ratings in Bayesian Reputation Systems. The Icfain Journal of Management Research 4(2), 48–64 (2005)Google Scholar
  54. 54.
    Ziegler, C.-N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)Google Scholar
  55. 55.
    Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Audun Jøsang
    • 1
  1. 1.QUT, BrisbaneAustralia

Personalised recommendations