The literature about trust in multiagent systems collects a huge number of works that analyse almost any facets of this concept from nearly every point of view. Nevertheless, an accepted and stable formal model of trust in agent societies is still missing. In this chapter, we address this remarkable flaw of the current research by reporting the main contributions of the CASCOM project on this topic: (i) a stochastic model of trust that measurably captures trust in two-party interactions, and (ii) a general-purpose framework that the CASCOM platform provides to enable the realization of secure, privacy-aware and trust-aware multiagent systems.


Probability Density Function Failure Probability Multiagent System Average Utility Mediate Interaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Bouncy Castle Crypto API Web site.
  2. [2]
    F. Bergenti, R. Bianchi and A. Fontana: Secure and Trusted Interactions in Societies of Electronic Agents. In Proceedings of The 4th Workshop on the Law and Electronic Agents (LEA 2005), 1–12 Bologna, Italy, 2005. Wolf Legal Publishers.Google Scholar
  3. [3]
    R. Bianchi, A. Fontana and F. Bergenti: A Real-World Approach to Secure and Trusted Negotiation in MASs. In Proceedings of The 4th International Joint Conference on Agents and Multi-Agents Systems (AAMAS), 1163–1164. Utrecht. The Netherlands. 2005. ACM Press.Google Scholar
  4. [4]
    R.W.H. Bons: Designing Trustworthy Trade Procedures for Open Electronic Commerce. Ph.D.diss., EURIDIS and Faculty of Business Administration, Erasmus University, Rotterdam, The Netherlands. 1999.Google Scholar
  5. [5]
    C. Castelfranchi and R. Falcone: Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification. In Proceedings of The International Conference of Multi-agent Systems (ICMAS), 72–79. Paris, France. 2005. ACM Press.Google Scholar
  6. [6]
    C. Ellison: SPKI Requirements. IETF RFC 2692. 1999.Google Scholar
  7. [7]
    C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen: SPKI Certificate Theory. IETF RFC 2693. 1999.Google Scholar
  8. [8]
    D. Gambetta (Ed.). Trust: Making and Breaking Co-operative Relations. Basil Blackwell, Inc. 1988.Google Scholar
  9. [9]
    JADE Team. JADE Programmers Guide. Available at
  10. [10]
  11. [11]
    N.R. Jennings, S. Parsons, C. Sierra and R. Faratin: Automated Negotiation. In Proceedings of The 5th International Conference on the Practical Application of Intelligent Agents and Multi-Agents Systems (PAAM-2000) 23–30. Manchester, UK 2000.Google Scholar
  12. [12]
    S. Marsh: Formalising Trust as a Computational Concept. Ph.D. dissertation, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK. 1994.Google Scholar
  13. [13]
    MINDSWAP Team. A Definition of Trust for Computing with Social Networks Technical report, University of Maryland, College Park, February 2005.Google Scholar
  14. [14]
  15. [15]

Copyright information

© Birkhäuser Verlag 2008

Authors and Affiliations

  • Federico Bergenti

There are no affiliations available

Personalised recommendations