Abstract
Trust and its support with appropriate trust management methodologies and technologies is becoming one crucial element for wider acceptance of web services. In the computing society trust and related issues were addressed already in the nineties of the former century, but the approaches from that period were about security, more precisely security services and security mechanisms. These approaches were followed by more advanced ones, where the first branch was based on Bayesian statistics, the second branch was based on Dempster-Shafer theory of evidence and its successors, most notably subjective logic, and the third branch originated from game theory. It is, however, important to note that at the core of trust there are cognition, assessment processes, and they are governed by various factors. Consequently, trust management methodologies should take these factors, which may ne rational, irrational, contextual, etc., into account. This research contribution will therefore provide an extensive overview of existing methodologies in the computer sciences field, followed by their evaluation in terms of their advantages and disadvantages. Further, some latest experimental results will be given that identify and evaluate some of those most important factors mentioned above. Finally, we will present a new trust management methodology called Qualitative Assessment Dynamics, QAD (aka Qualitative Algebra) that complements existing methodologies mentioned above, and that is aligned with the results of the latest experimental findings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Miller, J., Resnick, P., Singer, D.: PICS Rating Services and Rating Systems. W3C (1996), http://www.w3c.org/TR/REC-PICS-services
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, pp. 164–173 (1996)
Herzberg, A., et al.: Access Control Meets Public Key Infrastructure. In: Proc. of the IEEE Conf. on Security and Privacy, Oakland, pp. 2–14 (2000)
Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys 3(4), 2–13 (2000)
Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. Of the 3rd Int. Conference on Peer-to-Peer Computing (P2P 2003), p. 150, Linkoping (2003)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Jøsang, A.: A logic for uncertain probabilities. Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)
Jøsang, A.: An Algebra for Assessing Trust in Certification Chanis. In: Proceedings of the Network and Distributed Systems Security Symposium, NDSS 1999, pp. 618–644. The Interent Society, San Diego (1999)
Yu, B., Singh, M.P.: Distributed Reputation Management for e-Commerce. In: Proc. of the 1st AA-MAS Conference, Bologna (2002)
Paul-Amaury, M., Morge, M., Toni, F.: Combining statistics and arguments to compute trust. In: Proc. of the 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AA-MAS), Toronto, pp. 209–216 (2010)
Tennenholtz, M.: Game-Theoretic Recommendations: Some Progress in an Uphill Battle.In: Proc. of AAMAS 2008, Estoril , pp. 10 –16, (2008)
Harish, M., Anandavelu, N., Anbalagan, N., Mahalakshmi, G.S., Geetha, T.V.: Design and analysis of a game theoretic model for P2P trust management. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2007. LNCS, vol. 4882, pp. 110–115. Springer, Heidelberg (2007)
Altman, A., Tennenholtz, M.: An axiomatic approach to personalized ranking systems. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI 2007), pp. 1187–1192. Morgan & Kaufmann, San Francisco (2007)
Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review 24(1), 33–60 (2005)
Golbeck, J.: Trust on the World Wide Web: A survey. Foundation and Trends in Web Science 1(2), 131–197 (2006)
Artz, D., Gil, Y.: A survey of trust in computer science and the Semantic Web. Software Engineering and the Semantic Web 5(2), 58–71 (2007)
Kahneman, D., Slovic, P., Tversky, A. (eds.): Judgment Under Uncertainty, 22nd reprint. Cambridge University Press, Cambridge (2006)
Denning, D.: A new Paradigm for trusted systems. In: Proc. of ACM SIGSAC New Security Paradigms Workshop, pp. 36–41. ACM, New York (1993)
Trček, D.: A formal apparatus for modeling trust in computing environments. Mathematical and Computer Modeling 49(1-2), 226–233 (2009)
Trček, D.: Ergonomic trust management in pervasive computing environments - qualitative assessment dynamics. In: Proceedings of the ICPCA 2010, pp. 1–7. IEEE Press, Maribor (2010)
Pfleeger, S.L., Kitchenham, B.A.: Principles of Survey Research, Parts 1-6. ACM Software Engineering Notes 26-28 (2001-2003)
Reding, V.: The need for a new impetus to the European ICT R & I Agenda. In: Int. High Level Research Seminar on “Trust in the Net”, Vienna (2006)
Kovač, D., Trček, D.: Qualitative trust modeling in SOA. Journal of Systems Architecture 55(4), 255–263 (2009)
Grabner-Kraeuter, S., Kaluscha, E.A.: Empirical Research in on-line trust: a review and critical assessment. International Journal of Human Computer Studies 2003(58), 783–812 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Trček, D. (2011). Trust Management Methodologies for the Web. In: Polleres, A., et al. Reasoning Web. Semantic Technologies for the Web of Data. Reasoning Web 2011. Lecture Notes in Computer Science, vol 6848. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23032-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-23032-5_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23031-8
Online ISBN: 978-3-642-23032-5
eBook Packages: Computer ScienceComputer Science (R0)