skip to main content
survey
Public Access

A Survey on Trust Modeling

Published:12 October 2015Publication History
Skip Abstract Section

Abstract

The concept of trust and/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships based on cooperation and collaboration. Even if substantial research effort has been dedicated to addressing trust-based mechanisms or trust metrics (or computation) in diverse contexts, prior work has not clearly solved the issue of how to model and quantify trust with sufficient detail and context-based adequateness. The issue of trust quantification has become more complicated as we have the need to derive trust from complex, composite networks that may involve four distinct layers of communication protocols, information exchange, social interactions, and cognitive motivations. In addition, the diverse application domains require different aspects of trust for decision making such as emotional, logical, and relational trust. This survey aims to outline the foundations of trust models for applications in these contexts in terms of the concept of trust, trust assessment, trust constructs, trust scales, trust properties, trust formulation, and applications of trust. We discuss how different components of trust can be mapped to different layers of a complex, composite network; applicability of trust metrics and models; research challenges; and future work directions.

References

  1. S. Adalı. 2013. Modeling Trust Context in Networks. Springer Briefs in Computer Science. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. A. Adamic and E. Adar. 2003. Friends and neighbors on the web. Social Networks 25, 3 (July 2003), 211--230.Google ScholarGoogle ScholarCross RefCross Ref
  3. G. Adomavicius and J. Zhang. 2010. On the stability of recommendation algorithms. In Proceedings of the 4th ACM Conference on Recommender systems (RecSys’10). Barcelona, Spain, 47--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Axelrod. 1981. The evolution of cooperation. Science 211 (1981), 1390--1396.Google ScholarGoogle ScholarCross RefCross Ref
  5. G. Bachi, M. Coscia, A. Monreale, and F. Giannotti. 2012. Classifying trust/distrust relationships in online social networks. In Proceedings of the 2012 International Conference on Social Computing/Privacy, Security, Risk and Trust (PASSAT’12). Amsterdam, Netherlands, 552--557. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. P. Ballou and H. L. Pazer. 2003. Modeling completeness versus consistency tradeoffs in information decision contexts. IEEE Transactions on Knowledge and Data Engineering 15, 1 (Jan./Feb. 2003), 240--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Bank and B. Cole. 2008. Calculating the Jaccard similarity coefficient with map reduce for entity pairs in Wikipedia. Wikipedia Similarity Team. (Dec. 2008).Google ScholarGoogle Scholar
  8. J. S. Baras and T. Jiang. 2004. Cooperative games, phase transitions on graphs and distributed trust in MANET. In Proceedings of the 43th IEEE Conference on Decision and Control. Atlantis, Paradise Island, Bahamas.Google ScholarGoogle Scholar
  9. B. Barber. 1983. The Logic and Limits of Trust. Rutgers University Press, New Brunswick, NJ.Google ScholarGoogle Scholar
  10. M. Bedworth and J. Obrien. 2000. The omnibus model: A new model of data fusion? IEEE Aerospace and Electronic Systems Magazine 15, 4 (April 2000), 30--36.Google ScholarGoogle ScholarCross RefCross Ref
  11. E. Blasch. 1999. Derivation of a Belief Filter for High Range Resolution Radar Simultaneous Target Tracking and Identification. Ph.D. Dissertation. Wright State University.Google ScholarGoogle Scholar
  12. E. Blasch, A. Jøsang, J. Dezert, P. C. G. Costa, K. B. Laskey, and A.-L. Jousselme. 2014. URREF self-confidence in information fusion trust. In Proceedings of the IEEE 17th International Conference on Information Fusion. Salamanca, Spain, 1--8.Google ScholarGoogle Scholar
  13. E. Blasch, K. B. Laskey, A.-L. Joussselme, V. Dragos, P. C. G. Cost, and J. Dezert. 2013. URREF reliability versus credibility in information fusion (STANAG 2511). In IEEE 16th International Conference on Information Fusion.Google ScholarGoogle Scholar
  14. E. P. Blasch and S. Plano. 2002. JDL level 5 fusion model “user refinement” issues and applications in group tracking. In Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition, Vol. 4729. 270--279.Google ScholarGoogle Scholar
  15. E. P. Blasch, P. Valin, and E. Bosse. 2010. Measures of effectiveness for high-level fusion. In Proceedings of the IEEE International Conference on Information Fusion. Edinburgh, Scotland, 1--8.Google ScholarGoogle Scholar
  16. M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee. 2009. Dynamic trust management. Computers 42, 2 (2009), 44--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Bleiholder and F. Naumann. 2008. Data fusion. ACM Computing Surveys 41, 1 (Dec. 2008), Article 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Blomqvist and P. Stahle. 2000. Building organizational trust. In 16th IMP International Conference.Google ScholarGoogle Scholar
  19. P. F. Bonacich. 1987. Power and centrality: A family of measures. American Journal of Sociology 92, 5 (March 1987), 1170--1182.Google ScholarGoogle ScholarCross RefCross Ref
  20. S. Boon and J. G. Holmes. 1991. The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. In Cooperation and Prosocial Behavior, R. A. Hinde and J. Groebel (Eds.). Cambridge University Press.Google ScholarGoogle Scholar
  21. P. Bourdieu. 1983. Forms of capital. In Theory and Research for the Sociology of Education, R. A. Hinde and J. Groebel (Eds.). Greenwood Press, New York.Google ScholarGoogle Scholar
  22. J. L. Bradach and R. G. Eccles. 1989. Price, authority, and trust: From ideal types to plural forms. Annual Review of Sociology 15 (1989), 97--118.Google ScholarGoogle ScholarCross RefCross Ref
  23. U. Brandes. 2001. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology 25 (2001), 163--177.Google ScholarGoogle ScholarCross RefCross Ref
  24. J. Breese, D. Heckerman, and C. Kadie. 1998. Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publisher, Madison, WI, 43--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. S. Burt. 2000. The network structure of social capital. Research in Organizational Behavior 22 (2000), 345--423.Google ScholarGoogle ScholarCross RefCross Ref
  26. S. J. Cammarata, D. J. McArthur, and R. Steeb. 1988. Strategies of cooperation in distributed problem solving. In Distributed Artificial Intelligence. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 102--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Castelfranchi. 1995. Social commitment: From individual intentions to groups and organizations. In Proceedings of the 1st International Conference on Multi-Agent Systems (ICMAS’95). AAAI-MIT Press, San Francisco, California, USA, 41--49.Google ScholarGoogle Scholar
  28. C. Castelfranchi. 2009. A non-reductionist approach to trust. In Computing with Social Trust, J. Golbeck (Ed.). Springer, London Limited, Human-Computer Interaction Series.Google ScholarGoogle Scholar
  29. C. Castelfranchi and R. Falcone. 1998a. Principles of trust for MAS: Cognitive autonomy, social importance, and quantification. In Proceedings of the International Conference of Multi-Agent Systems (ICMAS’98). Paris, France, 72--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. Castelfranchi and R. Falcone. 1998b. Towards a theory of delegation for agent-based systems. Robotics and Autonomous Systems 24, 3--4 (Sept. 1998), 141--157.Google ScholarGoogle ScholarCross RefCross Ref
  31. C. Castelfranchi and R. Falcone. 2000. Trust and control: A dialectic link. Applied Artificial Intelligence Journal:Special Issue on Trust in Agent, Part I 14, 8 (2000), 799--823.Google ScholarGoogle Scholar
  32. C. Castelfranchi and R. Falcone. 2010. Trust Theory: A Socio-Cognitive and Computational Model, Michael Wooldridge (Ed.). Series in Agent Technology. Wiley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Castillo, M. Mendoza, and B. Poblete. 2011. Information credibility on Twitter. In Proceedings of the 20th International Conference on World Wide Web (WWW’11). 675--684. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. H. Chen, S. Yu, J. Shang, C. Wang, and Z. Ye. 2009. Comparison with several fuzzy trust methods for P2P-based system. In Proceedings of the International Conference on Information Technology and Computer Science (ITCS’09), Vol. 2. Kiev, Ukraine, 188--191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. I. R. Chen, F. Bao, M. J. Chang, and J. H. Cho. 2010. Trust management for encounter-based routing in delay tolerant networks. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’10). Miami, Florida, USA, 1--6.Google ScholarGoogle Scholar
  36. S. H. Chin. 2009. On application of game theory for understanding trust in networks. In Proceedings of the IEEE International Symposium on Collaborative Technologies and Systems. Baltimore, MD, 106--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. J. H. Cho, I. R. Chen, Y. Wang, and K. S. Chan. 2013. Trust-based multi-objective optimization for node-to-task assignment in coalition networks. In Proceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS’13). Seoul, Korea, 372--379. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. J. H. Cho, A. Swami, and I. R. Chen. 2009. Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In Proceedings of the International Conference on Computational Science and Engineering, Vol. 2. 641--650. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. J. H. Cho, A. Swami, and I. R. Chen. 2011. A survey of trust management in mobile ad hoc networks. IEEE Communications Surveys and Tutorials 13, 4 (2011), 562--583.Google ScholarGoogle ScholarCross RefCross Ref
  40. P. Cofta. 2007. The dark side. In Trust, Complexity and Control: Confidence in a Convergent World. Wiley, Chichester, UK, 103--117.Google ScholarGoogle Scholar
  41. J. C. Coleman. 1988. Social capital in the creation of human capital. American Journal of Sociology 95 (1988), S95--S120.Google ScholarGoogle ScholarCross RefCross Ref
  42. A. Corradi, R. Montanari, and D. Tibaldi. 2005. Context-driven adaptation of trust relationships in pervasive collaborative environments. In Proceedings of the 2005 Symposium on Applications and the Internet Workshops. Trento, Italy, 178--181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. G. Cvetkovich, M. Siegrist, R. Murray, and S. Tragesser. 2002. New information and social trust: Asymmetry and perseverance of attributions about hazard managers. Risk Analysis 22, 2 (April 2002), 359--367.Google ScholarGoogle ScholarCross RefCross Ref
  44. E. M. Daly and M. Haahr. 2009. Social network analysis for information flow in disconnected delay-tolerant MANETs. IEEE Transactions on Mobile Computing 8, 5 (2009), 606--621. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. R. Deepa and S. Swamynathan. 2014. A trust model for directory-based service discovery in mobile ad hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, G. Martínez Pérez et al. (Eds.). Vol. 420. Springer-Verlag Berlin Heidelberg, 115--126.Google ScholarGoogle Scholar
  46. Y. Desmedt, M. Fitzi, and J. B. Nielsen. 2007. Secure protocols with asymmetric trust. In Proceedings of the 13th International Conference on Theory and Application of Cryptology and Information Security. Kuching, Malaysia. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. J. Dezert and F. Smarandache. 2004. Advances on DSmT. In Advances and Applications of DSmT for Information Fusion, Florentin Smarandache and Jean Dezert (Eds.). American Research Press, Rehoboth, NM, USA.Google ScholarGoogle Scholar
  48. R. Diestel. 2010. Graph Theory (4th. ed.). Vol. 173. Springer, Heidelberg. Graduate Texts in Mathematics.Google ScholarGoogle Scholar
  49. P. A. Dinda. 2004. Addressing the trust asymmetry problem in grid computing with encrypted computation. In Proceedings of the 7th Workshop on Languages, Compilers, and Run-Time Support for Scalable Systems. 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. P. Dondio, L. Longo, and S. Barrett. 2008. A translation mechanism for recommendations. In Trust Management II, Y. Karabulut, J. Mitchell, P. Hermann, and C. D. Jensen (Eds.). Vol. 263. Springer, Boston, Massachusetts, USA. IFIP International Federation for Information Processing, 87--102.Google ScholarGoogle Scholar
  51. J. Doyle. 1997. Rational Decision Making, R. Wilson and F. Kiel (Eds.). MIT Press, Cambridge, Massachusetts. The MIT Encyclopedia of the Cognitive Sciences.Google ScholarGoogle Scholar
  52. J. R. Dunn and M. E. Schweitzer. 2005. Feeling and believing: The influence of emotion on trust. Journal of Personality and Social Psychology 88, 5 (2005), 736--748.Google ScholarGoogle ScholarCross RefCross Ref
  53. M. J. Dutta-Bergman. 2004. The impact of completeness and web use motivation on the credibility of e-health information. Journal of Communication 54, 2 (2004), 253--269.Google ScholarGoogle ScholarCross RefCross Ref
  54. M. R. Endsley. 1996. Automation and situation awareness. In Automation and Human Performance: Theory and Applications - Human Factors in Transportation, R. Parasuraman and M. Mouloua (Eds.). Lawrence Erlbaum Associates, Inc., Hillsdale, NJ, England.Google ScholarGoogle Scholar
  55. C. English, S. Terzis, W. Wagealla, H. Lowe, P. Nixon, and A. McGettrick. 2003. Trust dynamics for collaborative global computing. In Proceedings of the 12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 283--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. M. Everett and S. P. Borgatti. 2005. Ego network betweenness. Social Networks 27, 1 (Jan. 2005), 31--38.Google ScholarGoogle ScholarCross RefCross Ref
  57. R. Falcone and C. Castelfranchi. 2001. The socio-cognitive dynamics of trust: does trust create trust? In Lecture Notes in Computer Science. Springer, London, UK, 55--72. Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. X. Fan, S. Oh, M. McNeese, J. Y. H. Cuevas, L. Strater, and M. R. Endsley. 2008. The influence of agent reliability on trust in human-agent collaboration. In Proceedings of the ACM 15th European Conference on Cognitive Ergonomics: The Ergonomics of Cool Interaction (ECCE’08). Madeira, Portugal. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. H. Farrell. 2009. Distrust. In Trust, Distrust, and Power, R. Hardin (Ed.). Russell Sage Foundation, New York, 84--105.Google ScholarGoogle Scholar
  60. S. E. Fienberg. 2006. When did Bayesian inference become “Bayesian”? Bayesian Analysis 1, 1 (2006), 1--40.Google ScholarGoogle ScholarCross RefCross Ref
  61. S. Fong and W. Chen. 2010. Social network collaborative filtering framework and online trust factors: A case study on Facebook. In Proceedings of the 5th International Conference on Digital Information Management. Thunder Bay, ON, 266--273.Google ScholarGoogle Scholar
  62. S. Fong, Y. Zhuang, M. Yu, and I. Ma. 2012. Quantitative analysis of trust factors on social network using data mining approach. In Proceedings of the International Conference on Future Generation Communication Technology. London, UK, 70--75.Google ScholarGoogle Scholar
  63. L. C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry 40, 1 (March 1977), 35--41.Google ScholarGoogle ScholarCross RefCross Ref
  64. L. C. Freeman. 1979. Centrality in social networks: Conceptual clarification. Social Networks 1, 3 (1979), 215--239.Google ScholarGoogle ScholarCross RefCross Ref
  65. L. C. Freeman, S. P. Borgatti, and D. R. White. 1991. Centrality in valued graphs: A measure of betweenness based on network flow. Social Networks 13, 2 (June 1991), 141--154.Google ScholarGoogle ScholarCross RefCross Ref
  66. D. Gambetta. 1988. Can we trust trust? In Trust: Making and Breaking Cooperative Relations, D. Gambetta (Ed.). Basil Blackwell, New York, USA, 213--237.Google ScholarGoogle Scholar
  67. D. Gillies. 2000. The subjective theory. In Philosophical Theories of Probability. Routledge.Google ScholarGoogle Scholar
  68. K.-I. Goh, E. Oh, B. Kahng, and D. Kim. 2003. Betweenness centrality correlation in social networks. Physical Review 67, 1 (2003), 010101:1--010101:4.Google ScholarGoogle Scholar
  69. J. Golbeck. 2009. Introduction to computing with social trust. In Computing with Social Trust, J. Golbeck (Ed.). Springer, London, 1--5. Human-Computer Interaction Series.Google ScholarGoogle Scholar
  70. N. Griffiths. 2006. A fuzzy approach to reasoning with trust, distrust and insufficient trust. In Proceedings of the 10th International Workshop on Cooperative Information Agents. 360--374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. P. Hage and F. Harary. 1995. Eccentricity and centrality in networks. Social Networks 17, 1 (Jan. 1995), 57--63.Google ScholarGoogle ScholarCross RefCross Ref
  72. C. W. Hang and M. P. Singh. 2010. Trust-based recommendation based on graph similarity. In Proceedings of the 13th Autonomous Agents & Multi-Agent Systems Conference - Workshop on Trust in Agent Societies. Toronto, Canada.Google ScholarGoogle Scholar
  73. A. H. Harcourt. 1991. Help, cooperation and trust in animals. In Cooperation and Prosocial Behaviour, R. Hinde and J. Groebel (Eds.). Cambridge University Press, 15--26.Google ScholarGoogle Scholar
  74. R. Hardin. 2002. Trustworthiness. Trust and Trustworthiness. Russell Sage Foundation, New York, 28--53.Google ScholarGoogle Scholar
  75. O. Hasan, L. Brunie, J. M. Pierson, and E. Bertino. 2009. Elimination of subjectivity from trust recommendation. In 2009 IFIP Advances in Information and Communication Technology-Trust Management III. Vol. 300. Springer, Boston, USA. IFIP International Federation for Information Processing, 65--80.Google ScholarGoogle Scholar
  76. A. Heddaya and A. Helal. 1996. Reliability, Availability, Dependability and Performability: A User-Centered View. Technical Report. Computer Science Department, Boston University. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. C. Hewitt. 1991. Open information systems semantics for distributed artificial intelligence. Artificial Intelligence 47, 1--3 (1991), 79--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. B. Hilligoss and S. T. Rieh. 2008. Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context. Information Processing and Management 44, 4 (2008), 1467--1484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. J. Huang and D. Nicol. 2009. A calculus of trust and its application to PKI and identity management. In Proceedings of the 8th Symposium on Identity and Trust on the Internet. 23--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. T. D. Huynh, N. R. Jennings, and N. R. Shadbolt. 2006. An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems 13, 2 (2006), 119--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. H. S. James. 2002. The trust paradox: A survey of economic inquiries into the nature of trust and trustworthiness. Journal of Economic Behavior and Organization 47, 3 (March 2002), 291--307.Google ScholarGoogle ScholarCross RefCross Ref
  82. C. Jensen, C. Potts, and C. Jensen. 2005. Privacy practices of internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies 63, 1--2 (2005), 203--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. D. Johnson and K. Grayson. 2005. Cognitive and affective trust in service relationships. Journal of Business Research 58, 4 (April 2005), 500--507.Google ScholarGoogle ScholarCross RefCross Ref
  84. B. D. Jones. 1999. Bounded rationality. Annual Review of Political Science 2 (1999), 297--321.Google ScholarGoogle ScholarCross RefCross Ref
  85. A. Jøsang. 1999. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS’99).Google ScholarGoogle Scholar
  86. A. Jøsang. 2001. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9, 3 (2001), 279--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. A. Jøsang, E. Gray, and M. Kinateder. 2003. Analyzing topologies of transitive trust. In Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust. Pisa, Italy, 9--22.Google ScholarGoogle Scholar
  88. A. Jøsang and R. Hankin. 2012. Interpretation and fusion of hyper opinions in subjective logic. In Proceedings of the 15th International Conference on Information Fusion. Singapore, 1225--1232.Google ScholarGoogle Scholar
  89. A. Jøsang, R. Hayward, and S. Pope. 2006. Trust network analysis with subjective logic. In Proceedings of the Australasian Computer Science Conference (ACSC’06). Vol. 48, 85--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (March 2007), 618--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. A. Jøsang and S. Pope. 2005. Semantic constraints for trust transitivity. In Proceedings of the 2nd Asia-Pacific Conference of Conceptual Modeling (APCCM’05), Vol. 43. 59--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. A. Jøsang and S. L. Presti. 2004. Analyzing the relationship between risk and trust. In Proceedings of the 2nd International Conference on Trust Management (iTrust’04), Vol. 2995. Springer, 135--145.Google ScholarGoogle Scholar
  93. L. R. Kalnbach and B. M. Lantz. 1997. The Effects of Optimism and Willingness to Trust on Work-Related Attitudes and Behaviors: An Application to the Commercial Vehicle Industry. Technical Report. North Dakota State University.Google ScholarGoogle Scholar
  94. S. D. Kamvar, M. T. Schlosser, and H. G. Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference. Budapest, Hungary, 640--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. S. Keung and N. Griffiths. 2008. Using recency and relevance to assess trust and reputation. In Proceedings of the AISB Symposium on Behavior Regulation in Multi-Agent Systems (BRMAS’08). Aberdeen, UK.Google ScholarGoogle Scholar
  96. A. Kittur, B. Suh, and E. H. Chi. 2008. Can you ever trust a wiki?: Impacting perceived trustworthiness in Wikipedia. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW’08). San Diego, CA, USA, 477--480. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. R. M. Kramer. 1999. Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology 50 (Feb. 1999), 569--598.Google ScholarGoogle Scholar
  98. A. H. Kydd. 2005. A blind spot of philosophy. Trust and Mistrust in International Relations. Princeton University Press.Google ScholarGoogle Scholar
  99. B. Lahno. 1999. Olli lagerspetz: Trust. The tacit demand. Ethical Theory and Moral Practice 2, 4 (1999), 433--435.Google ScholarGoogle ScholarCross RefCross Ref
  100. G. Q. Lana and C. B. Westphall. 2008. User maturity based trust management for grid computing. In Proceedings of the 7th International Conference on Networking. Cancun, Mexico, 758--761. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. R. S. Lazarus, J. R. Averill, and E. M. Opton. 1970. Towards a cognitive theory of emotion. In Feelings and Emotions, M. B. Arnold (Ed.). Academic Press, New York, 207--232. The Loyola Symposium.Google ScholarGoogle Scholar
  102. J. D. Lee and N. Moray. 1992. Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35, 10 (1992), 1243--1270.Google ScholarGoogle ScholarCross RefCross Ref
  103. J. D. Lee and K. A. See. 2006. Trust in automation: Designing for appropriate reliance. Human Factors 40, 1 (Spring 2006), 50--80.Google ScholarGoogle Scholar
  104. K. C. Lee and N. Chung. 2009. Understanding factors affecting trust in and satisfaction with mobile banking in Korea: A modified DeLone and McLeans model perspective. Interacting with Computers 21, 5--6 (2009), 385--392. Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. M. Lesani and S. Bagheri. 2006. Fuzzy trust inference in trust graphs and its application in semantic web social networks. In Proceedings of the World Automation Congress (WAS’06). Budapest, Hungary, 1--6.Google ScholarGoogle Scholar
  106. R. J. Lewicki and B. B. Bunker. 1995. Trust in relationships: A model of development and decline. In Conflict, Cooperation, and Justice: Essays Inspired by the Work of Morton Deutsch, Barbara Benedict Bunker and Jeffrey Z. Rubin (Eds.). Jossey-Bass Inc., San Francisco, CA, 133--173. he Jossey-Bass conflict resolution series.Google ScholarGoogle Scholar
  107. J. David Lewis and A. Weigert. 1985. Trust as a social reality. Social Forces 63, 4 (1985), 967--985.Google ScholarGoogle ScholarCross RefCross Ref
  108. J. Li, R. Li, and J. Kato. 2008. Future trust management framework for mobile Ad Hoc networks. IEEE Communications Magazine 46, 4 (April 2008), 108--114. Security in Mobile Ad Hoc and Sensor Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Q. Li, S. Zhu, and G. Cao. 2010. Routing in socially selfish delay tolerant networks. In Proceedings of the IEEE INFOCOM. San Diego, CA, 1--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Y. Li, M. Chen, Q. Li, and W. Zhang. 2012. Enabling multilevel trust in privacy preserving data mining. IEEE Transactions on Knowledge and Data Engineering 24, 9 (2012), 1598--1612. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Z. Liang and W. Shi. 2010. TRECON: A trust-based economic framework for efficient internet routing. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40, 1 (2010), 52--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. H. Liao, Q. Wang, and G. Li. 2009. A fuzzy logic-based trust model in grid. In Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC’09). Wuhan, Hubei, China, 608--614. Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. D. Liben-Nowell and J. Kleinberg. 2003. The link prediction problem for social networks. In Proceedings of the 12th International Conference on Information and Knowledge Management. 556--559. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. L. Lin and J. Huai. 2009. QGrid: An adaptive trust aware resource management framework. IEEE Systems Journal 3, 1 (2009), 78--90.Google ScholarGoogle ScholarCross RefCross Ref
  115. L.-Y. Lin and C.-Y. Lu. 2010. The influence of corporate image, relationship marketing, and trust on purchase intention: The moderating effects of word-of-mouth. Tourism Review 65, 3 (2010), 16--34.Google ScholarGoogle ScholarCross RefCross Ref
  116. C. Lioma, B. Larsen, H. Schuetze, and P. Ingwersen. 2010. A subjective logic formalisation of the principle of polyrepresentation for information needs. In Proceedings of the 3rd Symposium on Information Interaction in Context. 125--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. N. Luhmann. 1979. Trust and Power. John Wiley & Sons Inc.Google ScholarGoogle Scholar
  118. N. Luhmann. 1990. Familiarity, confidence, trust: problems and alternatives. In Trust, D. Gambetta (Ed.). Blackwell.Google ScholarGoogle Scholar
  119. J. Luo, X. Liu, Y. Zhang, D. Ye, and Z. Xu. 2008. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. In Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN’08). Montreal, Que, 305--311.Google ScholarGoogle Scholar
  120. S. Ma, J. He, F. Gao, and J. Xu. 2010. A trust quantification algorithm based on fuzzy comprehensive evaluation. In Proceedings of the International Symposium on Intelligence Information Processing and Trusted Computing (IPTC’10). Huanggang, China, 196--199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. G. Mahoney, W. Myrvold, and G. C. Shoja. 2005. Generic reliability trust model. In Proceedings of Annual Conference on Privacy, Security and Trust. 113--120.Google ScholarGoogle Scholar
  122. O. Malacka, J. Samek, and F. Zboril. 2010. Event driven multi-context trust model. In Proceedings of the 10th International Conference on Intelligent Systems Design and Applications. Cairo, Egypt, 912--917.Google ScholarGoogle Scholar
  123. D. W. Manchala. 1998. Trust metrics, models and protocols for electronic commerce transactions. In Proceedings of the 18th IEEE International Conference on Distributed Computing Systems. Amsterdam, Netherlands, 312--321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. S. Manna, T. Gedeon, and B. S. U. Mendis. 2010. Enhancement of subjective logic for semantic document analysis using hierarchical document signature. In Neural Information Processing: Theory and Algorithms, Vol. 6443. 298--306. The Series Lecture Note in Computer Science. Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. P. V. Marsden. 2002. Egocentric and sociocentric measures of network centrality. Social Networks 24, 4 (Oct. 2002), 407--422.Google ScholarGoogle ScholarCross RefCross Ref
  126. S. Marsh and P. Briggs. 2009. Examining trust, forgiveness and regret as computational concepts. In Computing with Social Trust, J. Golbeck (Ed.). Springer, 9--43. Human-Computer Interaction Series.Google ScholarGoogle Scholar
  127. S. P. Marsh. 1994. Formalizing Trust as a Computational Concept. Ph.D. Dissertation. University of Stirling.Google ScholarGoogle Scholar
  128. S. P. Marsh and M. R. Dibben. 2005. Trust, untrust, distrust and mistrust: An exploration of the dark(er) side. In Proceedings of the 3rd International Conference on Trust Management (iTrust’05), V. Jennings P. Herrmann, and S. Shiu (Eds.). Vol. 3477. Springer, 17--33. The series Lecture Notes in Computer Science. Google ScholarGoogle ScholarDigital LibraryDigital Library
  129. I. Matei, J. S. Baras, and T. Jiang. 2009. A composite trust model and its application to collaborative distributed information fusion. In Proceedings of the 12th International Conference on Information Fusion. Seattle, WA, 1950--1957.Google ScholarGoogle Scholar
  130. R. C. Mayer, J. H. Davis, and F. D. Schoorman. 1995. An integrative model of organizational trust. Academy of Management Review 20, 3 (1995), 709--734.Google ScholarGoogle ScholarCross RefCross Ref
  131. B. McGuinness and A. Leggatt. 2006. Information trust and distrust in a sensemaking task. In Proceedings of the 11th International Command and Control Research and Technology Symposium. San Diego, CA.Google ScholarGoogle Scholar
  132. Merriam and Webster Dictionary. 2015. (2015).Google ScholarGoogle Scholar
  133. U. F. Minhas, J. Zhang, T. Tran, and R. Cohen. 2010. Intelligent agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty. In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT’10). Toronto, Canada, 243--247. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. N. Moray, T. Inagaki, and M. Itoh. 2000. Adaptive automation, trust, and self-confidence in fault management of time-critical tasks. Journal of Experimental Psychology: Applied 6, 1 (2000), 44--58.Google ScholarGoogle ScholarCross RefCross Ref
  135. B. M. Muir. 1994. Trust in automation. Part I. theoretical issues in the study of trust and human intervention in automated systems. Ergonomics 37, 11 (1994), 1905--1922.Google ScholarGoogle ScholarCross RefCross Ref
  136. B. M. Muir and N. Moray. 1996. Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39, 3 (May 1996), 429--460.Google ScholarGoogle ScholarCross RefCross Ref
  137. M. Nagy, M. Vargas-Vera, and E. Motta. 2008. Multi agent trust for belief combination on the semantic web. In Proceedings of the 4th International Conference on Intelligent Computer Communication and Processing. 261--264.Google ScholarGoogle Scholar
  138. S. Nefti, F. Meziane, and K. Kasiran. 2005. A fuzzy trust model for e-commerce. In Proceedings of the 7th IEEE International Conference on E-Commerce Technology. 401--404. Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. D. A. Nevell, S. R. Maskell, P. R. Horridge, and H. L. Barnett. 2010. Fusion of data from sources with different levels of trust. In Proceedings of the 13th Conference on Information Fusion. 1--7.Google ScholarGoogle Scholar
  140. M. E. J. Newman. 2001. Clustering and preferential attachment in growing networks. Physical Review E 64, 2 (July 2001), 020101:1--020101:4.Google ScholarGoogle ScholarCross RefCross Ref
  141. M. E. J. Newman. 2005. A measure of betweenness centrality based on random walks. Social Networks 27, 1 (Jan. 2005), 39--54.Google ScholarGoogle ScholarCross RefCross Ref
  142. T. J. Norman and C. Reed. 2010. A logic of delegation. Artificial Intelligence 174, 1 (Jan. 2010), 51--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. N. Oren, T. J. Norman, and A. Preece. 2007. Subjective logic and arguing with evidence. Artificial Intelligence 171, 10--15 (July 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. R. Parasuraman, T. B. Sheridan, and C. D. Wickens. 2008. Situation awareness, mental workload, and trust in automation: Viable, empirically supported cognitive engineering constructs. Journal of Cognitive Engineering and Decision Making 2, 2 (Summer 2008), 140--160.Google ScholarGoogle ScholarCross RefCross Ref
  145. S. Peng, W. Jia, and G. Wang. 2008. Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Shanghai, China, 3--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. C. Pereitra. 2009. Distrust is not always the complement of trust (Position Paper). Normative Multi-Agent Systems, Guido Boella, Pablo Noriega, Gabriella Pigozzi, and Harko Verhagen (Eds.). Dagstuhl, Germany. Dagstuhl Seminar Proceedings.Google ScholarGoogle Scholar
  147. P. Pong and S. Challa. 2007. Empirical analysis of generalised uncertainty measures with dempster shafer fusion. In Proceedings of the 10th International Conference on Information Fusion. Quebec, Que., 1--9.Google ScholarGoogle Scholar
  148. T. M. Porter. 1995. Trust in Numbers: The Pursuit of Objectivity in Science and Public Life. Princeton University Press, UK.Google ScholarGoogle Scholar
  149. R. D. Putnam. 2000. Bowling Alone. Simon and Schuster, New York.Google ScholarGoogle Scholar
  150. D. Quercia, S. Hailes, and L. Capra. 2006. B-trust: Bayesian trust framework for pervasive computing. In Proceedings of the 4th International Conference on Trust Management. Springer, 298--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. R. J. Rabeloa, L. M. Camarinha-Matos, and H. Afsarmaneshc. 1999. Multi-agent-based agile scheduling. Robotics and Autonomous Systems, Multi-Agent Systems Applications 27, 1--2 (April 1999), 15--28.Google ScholarGoogle Scholar
  152. J. K. Rempel, J. G. Holmes, and M. P. Zanna. 1985. Trust in close relationships. Journal of Personality and Social Psychology 49, 1 (July 1985), 95--112.Google ScholarGoogle ScholarCross RefCross Ref
  153. S. Y. Rieh and D. R. Danielson. 2007. Credibility: A multidisciplinary framework. Annual Review of Information Science and Technology 41, 1 (2007), 307--364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. D. M. Romano. 2003. The Nature of Trust: Conceptual and Operational Clarification. Ph.D. Dissertation. Department of Psychology, Louisiana State University.Google ScholarGoogle Scholar
  155. J. B. Rotter. 1980. Interpersonal trust, trustworthiness, and gullibility. American Psychologist 35, 1 (Jan. 1980), 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  156. J. Sabater and C. Sierra. 2002. Reputation and social network analysis in multi-agent systems. In ACM Proceedings of International Joint Conference on Autonomous Agents and Multiagent Systems. 475--482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. G. Sabidussi. 1966. The centrality index of a graph. Psychometrika 31, 4 (1966), 581--603.Google ScholarGoogle ScholarCross RefCross Ref
  158. G. Shafer. 1976. A Mathematical Theory of Evidence. Princeton University Press, Princeton, NJ.Google ScholarGoogle Scholar
  159. R. A. Shaikh, H. Jameel, B. J. d’Auriol, H. Lee, S. Lee, and Y.-J. Song. 2009. Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 20, 11 (Nov. 2009), 1698--1712. Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. C. E. Shannon. 1948. The mathematical theory of communication. Bell System Technical Journal 27, 3 (1948), 379--423.Google ScholarGoogle ScholarCross RefCross Ref
  161. L. Shapley. 1953. A value for n-person games. Annals of Mathematical Studies 28 (1953), 307--317.Google ScholarGoogle Scholar
  162. B. Shelat and F. N. Egger. 2002. What makes people trust online gambling sites? In ACM Proceedings of Conference on Human Factors in Computing Systems. 852--853. Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. D. Shen, G. Chen, K. Pham, and E. Blasch. 2011. A trust-based sensor allocation algorithm in cooperative space search problems. In Proceedings of SPIE, Khanh D. Pham, Henry Zmuda, Joseph Lee Cox, and Greg J. Meyer (Eds.), Vol. 8044.Google ScholarGoogle Scholar
  164. A. Shimbel. 1953. Structural parameters of communication networks. Bulletin of Mathematical Biophysics 15, 4 (Dec. 1953), 501--507.Google ScholarGoogle ScholarCross RefCross Ref
  165. S. Sikdar, S. Adal ı, M. Amin, T. Abdelzaher, K. Chan, J. H. Cho, B. Kang, and J. O’Donovan. 2014. Finding true and credible information on twitter. In Proceedings of the IEEE 17th International Conference on Information Fusion (FUSION). Salamanca, Spain, 1--8.Google ScholarGoogle Scholar
  166. P. Slovic. 1993. Perceived risk, trust, and democracy. Risk Analysis 13, 6 (Dec. 1993), 675--682.Google ScholarGoogle ScholarCross RefCross Ref
  167. P. Smets and R. Kennes. 1994. The transferable belief model. Artificial Intelligence 66, 2 (April 1994), 191--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. B. Solhaug, D. Elgesem, and K. Stolen. 2007. Why trust is not proportional to risk? In Proceedings of the 2nd International Conference on Availability, Reliability, and Security (ARES’07). Vienna, Austria, 11--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  169. W. Stallings. 1995. The PGP web of trust. BYTE 20, 2 (Feb. 1995), 161--162.Google ScholarGoogle Scholar
  170. D. Stampouli, M. Brown, and G. Powell. 2010. Fusion of soft information using TBM. In Proceedings of the 13th Conference on Information Fusion. Edinburgh, Scotland, 1--8.Google ScholarGoogle Scholar
  171. A. N. Steinberg, C. L. Bowman, and F. E. White. 1999. Revisions to the JDL data fusion model. In Proceedings of SPIE (Sensor Fusion: Architectures, Algorithms, and Applications III), Vol. 3919. 235--251.Google ScholarGoogle Scholar
  172. Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu. 2006. Information theoretic framework of trust modeling and evaluation for ad hoc networks. Proceedings of the IEEE Journal on Selected Areas in Communications 24, 2 (Feb. 2006), 305--317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. M. Szomszor, P. Kostkova, and C. St. Louis. 2011. Twitter informatics: Tracking and understanding public reaction during the 2009 Swine Flu Pandemic. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. Lyon, France, 320--323. Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. S. Trifunovic, F. Legendre, and C. Anastasiades. 2010. Social trust in opportunistic networks. In Proceedings of the IEEE INFOCOM Workshop. San Diego, CA.Google ScholarGoogle Scholar
  175. R. Trivers. 1971. The evolution of reciprocal altruism. The Quarterly Review of Biology 46, 1 (March 1971), 35--57.Google ScholarGoogle ScholarCross RefCross Ref
  176. R. Trivers. 1985. Social Evolution. Benjamin-Cummings Pub Co, Cummings, CA, USA.Google ScholarGoogle Scholar
  177. P. B. Velloso, R. P. Laufer, D. O. Cunha, O. C. Duarte, and G. Pujolle. 2010. Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Transactions on Network and Service Management 7, 3 (2010), 172--185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. K. Wang and M. Wu. 2007. A trust approach for node cooperation in MANET. Mobile Ad-Hoc and Sensor Networks, Lecture Notes in Computer Science 4864 (2007), 481--491. Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. Y. Wang, I.-R. Chen, J. H. Cho, K. S. Chan, and A. Swami. 2013. Trust-based service composition and binding for tactical networks with multiple objectives. In Proceedings of the IEEE MILCOM. San Diego, CA, 1862--1867.Google ScholarGoogle Scholar
  180. Y. Wang, Y. C. Lu, I. R. Chen, J. H. Cho, A. Swami, and C. T. Lu. 2014. LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In Proceedings of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT’14). Cambridge, MA, USA.Google ScholarGoogle Scholar
  181. Y. Wang and M. Singh. 2010. Evidence-based trust: A mathematical model geared for multiagent systems. ACM Transactions on Autonomous and Adaptive Systems 5, 3 (Sept. 2010), 1--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Y. Wang and J. Vassileva. 2003. Bayesian network trust model in peer-to-peer networks. In Proceedings of the 2nd International Workshop Peers and Peer-to-Peer Computing. Springer, 23--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. Y. D. Wang and H. H. Emurian. 2005. An overview of online trust: Concepts, elements and implications. Computers in Human Behavior 21 (2005), 105--125.Google ScholarGoogle ScholarCross RefCross Ref
  184. L. Wen, P. Lingdi, W. Chunming, and J. Ming. 2010. Distributed Bayesian network trust model in virtual network. In Proceedings of the 2nd International Conference on Network Security Wireless Communications and Trusted Computing (NSWCTC’10). Wuhan, Hubei, China, 71--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. Wikipedia. 2015. Definition of Cognition. Retrieved from http://en.wikipedia.org/wiki/Cognition.Google ScholarGoogle Scholar
  186. Y. Wu, S. Tang, P. Xu, and X.-Y. Li. 2010. Dealing with selfishness and moral hazard in noncooperative wireless networks. IEEE Transactions on Mobile Computing 9, 3 (2010), 420--434. Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. Y. Yamamoto. 1990. A morality based on trust: Some reflections on japanese morality. Philosophy East and West 40, 4 (October 1990), 451--469. Understanding Japanese Values.Google ScholarGoogle ScholarCross RefCross Ref
  188. Z. Yan, P. Zhang, and T. Virtanen. 2003. Trust evaluation based security solutions in ad hoc networks. In Proceedings of the 7th Nordic Workshop on Security IT Systems (NordSec’03). Gjodotvik, Norway, 1--10.Google ScholarGoogle Scholar
  189. Z. Yang, Y. Fan, and B. Zhang. 2010. A fusion model of overall trust relationship from multiple attributes in trusted networks based on dynamic entropy gain. In Proceedings of the IEEE International Conference on Information Theory and Information Security. Beijing, China, 323--326.Google ScholarGoogle Scholar
  190. L. A. Zadeh. 1965. Fuzzy sets. Information and Control 8, 3 (June 1965), 338--353.Google ScholarGoogle ScholarCross RefCross Ref
  191. L. A. Zadeh. 1983. The role of fuzzy logic in the management of uncertainty in expert systems. Fuzzy Sets and Systems 11, 1--3 (March 1983), 197--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  192. J. Zhang, A. A. Ghorbani, and R. Cohen. 2006. An improved familiarity measurement for formalization of trust in e-commerce based multi-agent systems. In Proceedings of 2006 International Conference on Privacy, Security, and Trust: Bridge the Gap Between PST Technologies and Business Services. Google ScholarGoogle ScholarDigital LibraryDigital Library
  193. Y. Zheng, R. Kantola, and P. Zhang. 2011. A research model for human-computer trust interaction. In Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11). Changsha, China, 274--281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  194. C.-N. Zieglera and J. Golbeck. 2007. Investigating interactions of trust and interest similarity. Decision Support Systems 43, 2 (March 2007), 460--475. Emerging Issues in Collaborative Commerce. Google ScholarGoogle ScholarDigital LibraryDigital Library
  195. C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas. 2005. Quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of the 3rd ACM Workshop on Security for Ad Hoc and Sensor Networks. Alexandria, VA, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey on Trust Modeling

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 48, Issue 2
        November 2015
        615 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/2830539
        • Editor:
        • Sartaj Sahni
        Issue’s Table of Contents

        Copyright © 2015 ACM

        © 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2015
        • Accepted: 1 August 2015
        • Revised: 1 July 2015
        • Received: 1 January 2014
        Published in csur Volume 48, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader