[en] In a type of interactions over the Internet, a user (the subject) is dependent on another user (the target), but not vice versa. The subject should therefore form an opinion about the target, before possibly initiating an interaction. The scenario wherein a subject only relies on information obtained from past interactions with the target, is well-studied and understood. In this paper, we formally analyze the implication of allowing recommendations (statements of a third party) as source of information. We identify the family of valid models that admit recommendations. This allows us to verify particular existing models that admit recommendations.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
MULLER, Tim ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
SCHWEITZER, Patrick ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Langue du document :
Anglais
Titre :
On Beta Models with Trust Chains
Date de publication/diffusion :
2013
Nom de la manifestation :
7th IFIP WG 11.11 International Conference on Trust Management
Lieu de la manifestation :
Malaga, Espagne
Date de la manifestation :
3-7 June, 2013
Titre de l'ouvrage principal :
Proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management
Maison d'édition :
Springer
Collection et n° de collection :
IFIP Advances in Information and Communication Technology 401
Billingsley, P.: Probability and measure, 3rd edn. Wiley (1995)
Bouckaert, R.: Bayesian belief networks and conditional independencies. Tech. Rep. RUU-CS-92-36, Utrecht University, The Netherlands (1992)
Gut, A.: Probability: A Graduate Course (Springer Texts in Statistics). Springer (2007)
Josang, A.: Artificial reasoning with subjective logic. In: 2nd Australian Workshop on Commonsense Reasoning (1997)
Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, vol. 160, pp. 324–337 (2002)
Josang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: Stolen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 179–192. Springer, Heidelberg (2006)
Krukow, K., Nielsen, M., Sassone, V.: Trust models in ubiquitous computing. Royal Society of London Philosophical Transactions Series A 366, 3781–3793 (2008)
Mui, L., Mohtashemi, M.: A computational model of trust and reputation. In: Proceedings of the 35th HICSS (2002)
Muller, T., Schweitzer, P.: A Formal Derivation of Composite Trust. In: Proceedings of the 5th International Symposium on Foundations & Practice of Security (2012) (to appear)
Muller, T., Schweitzer, P.: On beta models with trust chaining (technical report). Tech. rep., University of Luxembourg (2013), http://satoss.uni.lu/members/tim/papers/TrustChainingTechReport.pdf
Ries, S.: Certaintrust: a trust model for users and agents. In: Proceedings of the 2007 ACM Symposium on Applied Computing, SAC 2007, pp. 1599–1604. ACM, New York (2007)
Staab, E., Fusenig, V., Engel, T.: Towards Trust-Based Acquisition of Unverifiable Information. In: Klusch, M., Pěchouček, M., Polleres, A. (eds.) CIA 2008. LNCS (LNAI), vol. 5180, pp. 41–54. Springer, Heidelberg (2008)
Teacy, W., Patel, J., Jennings, N., Luck, M.: TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources. Autonomous Agents and Multi-Agent Systems 12, 183–198 (2006)