Skip to main content

Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation

  • Conference paper
Trends in Applied Intelligent Systems (IEA/AIE 2010)

Abstract

The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation provides this ability by identifying paths that connect users in the network, and by merging trust opinions expressed by users along these paths. However, as individual trust opinions are not always based on perfect knowledge, and since the quality of a trust estimation propagated along a given path may diminish as its length increases, mechanisms are needed to handle these imperfections. In this paper, we propose a set of trust aggregation operators that take into account knowledge defects and path length. We investigate their properties, and discuss how they may be implemented in practice, taking into account characteristics of the network such as the availability of a central authority, or the need to preserve users’ privacy by not publically disclosing their trust information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bedi, P., Kaur, H., Marwaha, S.: Trust based recommender system for the semantic web. In: Proc. of IJCAI 2007, pp. 2677–2682 (2007)

    Google Scholar 

  2. Golbeck, J.: Computing and applying trust in web-based social networks. PhD thesis (2005)

    Google Scholar 

  3. Massa, P., Avesani, A.: Trust-aware recommender systems. In: Proc. of the ACM Recommender Systems Conference, pp. 17–24 (2007)

    Google Scholar 

  4. Victor, P., Cornelis, C., De Cock, M., Pinheiro da Silva, P.: Gradual trust and distrust in recommender systems. Fuzzy Sets and Systems 160(10), 1367–1382 (2009)

    Article  MATH  Google Scholar 

  5. Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: Proceedings of the First Conference on Email and Anti-Spam (2004)

    Google Scholar 

  6. Josang, A.: Trust-based decision making for electronic transactions. In: Proceedings of the Fourth Nordic Workshop on Secure IT Systems (1999)

    Google Scholar 

  7. Yager, R.R.: On ordered weighted averaging aggregation operators in multicriteria decision making. IEEE Transactions on Systems, Man, and Cybernetics 18, 183–190 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  8. Yager, R.R., Filev, D.: Induced ordered weighted averaging operators. IEEE Transactions on Systems, Man, and Cybernetics 29(2), 141–150 (1999)

    Article  Google Scholar 

  9. Victor, P., Cornelis, C., De Cock, M., Herrera-Viedma, E.: Aggregation of gradual trust and distrust. In: Proceedings of EUROFUSE 2009 (Preference Modelling and Decision Analysis), pp. 259–264 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Verbiest, N., Cornelis, C., Victor, P., Herrera-Viedma, E. (2010). Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation. In: GarcĂ­a-Pedrajas, N., Herrera, F., Fyfe, C., BenĂ­tez, J.M., Ali, M. (eds) Trends in Applied Intelligent Systems. IEA/AIE 2010. Lecture Notes in Computer Science(), vol 6098. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13033-5_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13033-5_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13032-8

  • Online ISBN: 978-3-642-13033-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics