Abstract
The concept of trust and/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships based on cooperation and collaboration. Even if substantial research effort has been dedicated to addressing trust-based mechanisms or trust metrics (or computation) in diverse contexts, prior work has not clearly solved the issue of how to model and quantify trust with sufficient detail and context-based adequateness. The issue of trust quantification has become more complicated as we have the need to derive trust from complex, composite networks that may involve four distinct layers of communication protocols, information exchange, social interactions, and cognitive motivations. In addition, the diverse application domains require different aspects of trust for decision making such as emotional, logical, and relational trust. This survey aims to outline the foundations of trust models for applications in these contexts in terms of the concept of trust, trust assessment, trust constructs, trust scales, trust properties, trust formulation, and applications of trust. We discuss how different components of trust can be mapped to different layers of a complex, composite network; applicability of trust metrics and models; research challenges; and future work directions.
- S. Adalı. 2013. Modeling Trust Context in Networks. Springer Briefs in Computer Science. Google ScholarDigital Library
- L. A. Adamic and E. Adar. 2003. Friends and neighbors on the web. Social Networks 25, 3 (July 2003), 211--230.Google ScholarCross Ref
- G. Adomavicius and J. Zhang. 2010. On the stability of recommendation algorithms. In Proceedings of the 4th ACM Conference on Recommender systems (RecSys’10). Barcelona, Spain, 47--54. Google ScholarDigital Library
- R. Axelrod. 1981. The evolution of cooperation. Science 211 (1981), 1390--1396.Google ScholarCross Ref
- G. Bachi, M. Coscia, A. Monreale, and F. Giannotti. 2012. Classifying trust/distrust relationships in online social networks. In Proceedings of the 2012 International Conference on Social Computing/Privacy, Security, Risk and Trust (PASSAT’12). Amsterdam, Netherlands, 552--557. Google ScholarDigital Library
- D. P. Ballou and H. L. Pazer. 2003. Modeling completeness versus consistency tradeoffs in information decision contexts. IEEE Transactions on Knowledge and Data Engineering 15, 1 (Jan./Feb. 2003), 240--243. Google ScholarDigital Library
- J. Bank and B. Cole. 2008. Calculating the Jaccard similarity coefficient with map reduce for entity pairs in Wikipedia. Wikipedia Similarity Team. (Dec. 2008).Google Scholar
- J. S. Baras and T. Jiang. 2004. Cooperative games, phase transitions on graphs and distributed trust in MANET. In Proceedings of the 43th IEEE Conference on Decision and Control. Atlantis, Paradise Island, Bahamas.Google Scholar
- B. Barber. 1983. The Logic and Limits of Trust. Rutgers University Press, New Brunswick, NJ.Google Scholar
- M. Bedworth and J. Obrien. 2000. The omnibus model: A new model of data fusion? IEEE Aerospace and Electronic Systems Magazine 15, 4 (April 2000), 30--36.Google ScholarCross Ref
- E. Blasch. 1999. Derivation of a Belief Filter for High Range Resolution Radar Simultaneous Target Tracking and Identification. Ph.D. Dissertation. Wright State University.Google Scholar
- E. Blasch, A. Jøsang, J. Dezert, P. C. G. Costa, K. B. Laskey, and A.-L. Jousselme. 2014. URREF self-confidence in information fusion trust. In Proceedings of the IEEE 17th International Conference on Information Fusion. Salamanca, Spain, 1--8.Google Scholar
- E. Blasch, K. B. Laskey, A.-L. Joussselme, V. Dragos, P. C. G. Cost, and J. Dezert. 2013. URREF reliability versus credibility in information fusion (STANAG 2511). In IEEE 16th International Conference on Information Fusion.Google Scholar
- E. P. Blasch and S. Plano. 2002. JDL level 5 fusion model “user refinement” issues and applications in group tracking. In Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition, Vol. 4729. 270--279.Google Scholar
- E. P. Blasch, P. Valin, and E. Bosse. 2010. Measures of effectiveness for high-level fusion. In Proceedings of the IEEE International Conference on Information Fusion. Edinburgh, Scotland, 1--8.Google Scholar
- M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee. 2009. Dynamic trust management. Computers 42, 2 (2009), 44--52. Google ScholarDigital Library
- J. Bleiholder and F. Naumann. 2008. Data fusion. ACM Computing Surveys 41, 1 (Dec. 2008), Article 1. Google ScholarDigital Library
- K. Blomqvist and P. Stahle. 2000. Building organizational trust. In 16th IMP International Conference.Google Scholar
- P. F. Bonacich. 1987. Power and centrality: A family of measures. American Journal of Sociology 92, 5 (March 1987), 1170--1182.Google ScholarCross Ref
- S. Boon and J. G. Holmes. 1991. The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. In Cooperation and Prosocial Behavior, R. A. Hinde and J. Groebel (Eds.). Cambridge University Press.Google Scholar
- P. Bourdieu. 1983. Forms of capital. In Theory and Research for the Sociology of Education, R. A. Hinde and J. Groebel (Eds.). Greenwood Press, New York.Google Scholar
- J. L. Bradach and R. G. Eccles. 1989. Price, authority, and trust: From ideal types to plural forms. Annual Review of Sociology 15 (1989), 97--118.Google ScholarCross Ref
- U. Brandes. 2001. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology 25 (2001), 163--177.Google ScholarCross Ref
- J. Breese, D. Heckerman, and C. Kadie. 1998. Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann Publisher, Madison, WI, 43--52. Google ScholarDigital Library
- R. S. Burt. 2000. The network structure of social capital. Research in Organizational Behavior 22 (2000), 345--423.Google ScholarCross Ref
- S. J. Cammarata, D. J. McArthur, and R. Steeb. 1988. Strategies of cooperation in distributed problem solving. In Distributed Artificial Intelligence. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 102--105. Google ScholarDigital Library
- C. Castelfranchi. 1995. Social commitment: From individual intentions to groups and organizations. In Proceedings of the 1st International Conference on Multi-Agent Systems (ICMAS’95). AAAI-MIT Press, San Francisco, California, USA, 41--49.Google Scholar
- C. Castelfranchi. 2009. A non-reductionist approach to trust. In Computing with Social Trust, J. Golbeck (Ed.). Springer, London Limited, Human-Computer Interaction Series.Google Scholar
- C. Castelfranchi and R. Falcone. 1998a. Principles of trust for MAS: Cognitive autonomy, social importance, and quantification. In Proceedings of the International Conference of Multi-Agent Systems (ICMAS’98). Paris, France, 72--79. Google ScholarDigital Library
- C. Castelfranchi and R. Falcone. 1998b. Towards a theory of delegation for agent-based systems. Robotics and Autonomous Systems 24, 3--4 (Sept. 1998), 141--157.Google ScholarCross Ref
- C. Castelfranchi and R. Falcone. 2000. Trust and control: A dialectic link. Applied Artificial Intelligence Journal:Special Issue on Trust in Agent, Part I 14, 8 (2000), 799--823.Google Scholar
- C. Castelfranchi and R. Falcone. 2010. Trust Theory: A Socio-Cognitive and Computational Model, Michael Wooldridge (Ed.). Series in Agent Technology. Wiley. Google ScholarDigital Library
- C. Castillo, M. Mendoza, and B. Poblete. 2011. Information credibility on Twitter. In Proceedings of the 20th International Conference on World Wide Web (WWW’11). 675--684. Google ScholarDigital Library
- H. Chen, S. Yu, J. Shang, C. Wang, and Z. Ye. 2009. Comparison with several fuzzy trust methods for P2P-based system. In Proceedings of the International Conference on Information Technology and Computer Science (ITCS’09), Vol. 2. Kiev, Ukraine, 188--191. Google ScholarDigital Library
- I. R. Chen, F. Bao, M. J. Chang, and J. H. Cho. 2010. Trust management for encounter-based routing in delay tolerant networks. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’10). Miami, Florida, USA, 1--6.Google Scholar
- S. H. Chin. 2009. On application of game theory for understanding trust in networks. In Proceedings of the IEEE International Symposium on Collaborative Technologies and Systems. Baltimore, MD, 106--110. Google ScholarDigital Library
- J. H. Cho, I. R. Chen, Y. Wang, and K. S. Chan. 2013. Trust-based multi-objective optimization for node-to-task assignment in coalition networks. In Proceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS’13). Seoul, Korea, 372--379. Google ScholarDigital Library
- J. H. Cho, A. Swami, and I. R. Chen. 2009. Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In Proceedings of the International Conference on Computational Science and Engineering, Vol. 2. 641--650. Google ScholarDigital Library
- J. H. Cho, A. Swami, and I. R. Chen. 2011. A survey of trust management in mobile ad hoc networks. IEEE Communications Surveys and Tutorials 13, 4 (2011), 562--583.Google ScholarCross Ref
- P. Cofta. 2007. The dark side. In Trust, Complexity and Control: Confidence in a Convergent World. Wiley, Chichester, UK, 103--117.Google Scholar
- J. C. Coleman. 1988. Social capital in the creation of human capital. American Journal of Sociology 95 (1988), S95--S120.Google ScholarCross Ref
- A. Corradi, R. Montanari, and D. Tibaldi. 2005. Context-driven adaptation of trust relationships in pervasive collaborative environments. In Proceedings of the 2005 Symposium on Applications and the Internet Workshops. Trento, Italy, 178--181. Google ScholarDigital Library
- G. Cvetkovich, M. Siegrist, R. Murray, and S. Tragesser. 2002. New information and social trust: Asymmetry and perseverance of attributions about hazard managers. Risk Analysis 22, 2 (April 2002), 359--367.Google ScholarCross Ref
- E. M. Daly and M. Haahr. 2009. Social network analysis for information flow in disconnected delay-tolerant MANETs. IEEE Transactions on Mobile Computing 8, 5 (2009), 606--621. Google ScholarDigital Library
- R. Deepa and S. Swamynathan. 2014. A trust model for directory-based service discovery in mobile ad hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, G. Martínez Pérez et al. (Eds.). Vol. 420. Springer-Verlag Berlin Heidelberg, 115--126.Google Scholar
- Y. Desmedt, M. Fitzi, and J. B. Nielsen. 2007. Secure protocols with asymmetric trust. In Proceedings of the 13th International Conference on Theory and Application of Cryptology and Information Security. Kuching, Malaysia. Google ScholarDigital Library
- J. Dezert and F. Smarandache. 2004. Advances on DSmT. In Advances and Applications of DSmT for Information Fusion, Florentin Smarandache and Jean Dezert (Eds.). American Research Press, Rehoboth, NM, USA.Google Scholar
- R. Diestel. 2010. Graph Theory (4th. ed.). Vol. 173. Springer, Heidelberg. Graduate Texts in Mathematics.Google Scholar
- P. A. Dinda. 2004. Addressing the trust asymmetry problem in grid computing with encrypted computation. In Proceedings of the 7th Workshop on Languages, Compilers, and Run-Time Support for Scalable Systems. 1--7. Google ScholarDigital Library
- P. Dondio, L. Longo, and S. Barrett. 2008. A translation mechanism for recommendations. In Trust Management II, Y. Karabulut, J. Mitchell, P. Hermann, and C. D. Jensen (Eds.). Vol. 263. Springer, Boston, Massachusetts, USA. IFIP International Federation for Information Processing, 87--102.Google Scholar
- J. Doyle. 1997. Rational Decision Making, R. Wilson and F. Kiel (Eds.). MIT Press, Cambridge, Massachusetts. The MIT Encyclopedia of the Cognitive Sciences.Google Scholar
- J. R. Dunn and M. E. Schweitzer. 2005. Feeling and believing: The influence of emotion on trust. Journal of Personality and Social Psychology 88, 5 (2005), 736--748.Google ScholarCross Ref
- M. J. Dutta-Bergman. 2004. The impact of completeness and web use motivation on the credibility of e-health information. Journal of Communication 54, 2 (2004), 253--269.Google ScholarCross Ref
- M. R. Endsley. 1996. Automation and situation awareness. In Automation and Human Performance: Theory and Applications - Human Factors in Transportation, R. Parasuraman and M. Mouloua (Eds.). Lawrence Erlbaum Associates, Inc., Hillsdale, NJ, England.Google Scholar
- C. English, S. Terzis, W. Wagealla, H. Lowe, P. Nixon, and A. McGettrick. 2003. Trust dynamics for collaborative global computing. In Proceedings of the 12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 283--288. Google ScholarDigital Library
- M. Everett and S. P. Borgatti. 2005. Ego network betweenness. Social Networks 27, 1 (Jan. 2005), 31--38.Google ScholarCross Ref
- R. Falcone and C. Castelfranchi. 2001. The socio-cognitive dynamics of trust: does trust create trust? In Lecture Notes in Computer Science. Springer, London, UK, 55--72. Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives. Google ScholarDigital Library
- X. Fan, S. Oh, M. McNeese, J. Y. H. Cuevas, L. Strater, and M. R. Endsley. 2008. The influence of agent reliability on trust in human-agent collaboration. In Proceedings of the ACM 15th European Conference on Cognitive Ergonomics: The Ergonomics of Cool Interaction (ECCE’08). Madeira, Portugal. Google ScholarDigital Library
- H. Farrell. 2009. Distrust. In Trust, Distrust, and Power, R. Hardin (Ed.). Russell Sage Foundation, New York, 84--105.Google Scholar
- S. E. Fienberg. 2006. When did Bayesian inference become “Bayesian”? Bayesian Analysis 1, 1 (2006), 1--40.Google ScholarCross Ref
- S. Fong and W. Chen. 2010. Social network collaborative filtering framework and online trust factors: A case study on Facebook. In Proceedings of the 5th International Conference on Digital Information Management. Thunder Bay, ON, 266--273.Google Scholar
- S. Fong, Y. Zhuang, M. Yu, and I. Ma. 2012. Quantitative analysis of trust factors on social network using data mining approach. In Proceedings of the International Conference on Future Generation Communication Technology. London, UK, 70--75.Google Scholar
- L. C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry 40, 1 (March 1977), 35--41.Google ScholarCross Ref
- L. C. Freeman. 1979. Centrality in social networks: Conceptual clarification. Social Networks 1, 3 (1979), 215--239.Google ScholarCross Ref
- L. C. Freeman, S. P. Borgatti, and D. R. White. 1991. Centrality in valued graphs: A measure of betweenness based on network flow. Social Networks 13, 2 (June 1991), 141--154.Google ScholarCross Ref
- D. Gambetta. 1988. Can we trust trust? In Trust: Making and Breaking Cooperative Relations, D. Gambetta (Ed.). Basil Blackwell, New York, USA, 213--237.Google Scholar
- D. Gillies. 2000. The subjective theory. In Philosophical Theories of Probability. Routledge.Google Scholar
- K.-I. Goh, E. Oh, B. Kahng, and D. Kim. 2003. Betweenness centrality correlation in social networks. Physical Review 67, 1 (2003), 010101:1--010101:4.Google Scholar
- J. Golbeck. 2009. Introduction to computing with social trust. In Computing with Social Trust, J. Golbeck (Ed.). Springer, London, 1--5. Human-Computer Interaction Series.Google Scholar
- N. Griffiths. 2006. A fuzzy approach to reasoning with trust, distrust and insufficient trust. In Proceedings of the 10th International Workshop on Cooperative Information Agents. 360--374. Google ScholarDigital Library
- P. Hage and F. Harary. 1995. Eccentricity and centrality in networks. Social Networks 17, 1 (Jan. 1995), 57--63.Google ScholarCross Ref
- C. W. Hang and M. P. Singh. 2010. Trust-based recommendation based on graph similarity. In Proceedings of the 13th Autonomous Agents & Multi-Agent Systems Conference - Workshop on Trust in Agent Societies. Toronto, Canada.Google Scholar
- A. H. Harcourt. 1991. Help, cooperation and trust in animals. In Cooperation and Prosocial Behaviour, R. Hinde and J. Groebel (Eds.). Cambridge University Press, 15--26.Google Scholar
- R. Hardin. 2002. Trustworthiness. Trust and Trustworthiness. Russell Sage Foundation, New York, 28--53.Google Scholar
- O. Hasan, L. Brunie, J. M. Pierson, and E. Bertino. 2009. Elimination of subjectivity from trust recommendation. In 2009 IFIP Advances in Information and Communication Technology-Trust Management III. Vol. 300. Springer, Boston, USA. IFIP International Federation for Information Processing, 65--80.Google Scholar
- A. Heddaya and A. Helal. 1996. Reliability, Availability, Dependability and Performability: A User-Centered View. Technical Report. Computer Science Department, Boston University. Google ScholarDigital Library
- C. Hewitt. 1991. Open information systems semantics for distributed artificial intelligence. Artificial Intelligence 47, 1--3 (1991), 79--106. Google ScholarDigital Library
- B. Hilligoss and S. T. Rieh. 2008. Developing a unifying framework of credibility assessment: Construct, heuristics, and interaction in context. Information Processing and Management 44, 4 (2008), 1467--1484. Google ScholarDigital Library
- J. Huang and D. Nicol. 2009. A calculus of trust and its application to PKI and identity management. In Proceedings of the 8th Symposium on Identity and Trust on the Internet. 23--37. Google ScholarDigital Library
- T. D. Huynh, N. R. Jennings, and N. R. Shadbolt. 2006. An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems 13, 2 (2006), 119--154. Google ScholarDigital Library
- H. S. James. 2002. The trust paradox: A survey of economic inquiries into the nature of trust and trustworthiness. Journal of Economic Behavior and Organization 47, 3 (March 2002), 291--307.Google ScholarCross Ref
- C. Jensen, C. Potts, and C. Jensen. 2005. Privacy practices of internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies 63, 1--2 (2005), 203--227. Google ScholarDigital Library
- D. Johnson and K. Grayson. 2005. Cognitive and affective trust in service relationships. Journal of Business Research 58, 4 (April 2005), 500--507.Google ScholarCross Ref
- B. D. Jones. 1999. Bounded rationality. Annual Review of Political Science 2 (1999), 297--321.Google ScholarCross Ref
- A. Jøsang. 1999. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS’99).Google Scholar
- A. Jøsang. 2001. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9, 3 (2001), 279--311. Google ScholarDigital Library
- A. Jøsang, E. Gray, and M. Kinateder. 2003. Analyzing topologies of transitive trust. In Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust. Pisa, Italy, 9--22.Google Scholar
- A. Jøsang and R. Hankin. 2012. Interpretation and fusion of hyper opinions in subjective logic. In Proceedings of the 15th International Conference on Information Fusion. Singapore, 1225--1232.Google Scholar
- A. Jøsang, R. Hayward, and S. Pope. 2006. Trust network analysis with subjective logic. In Proceedings of the Australasian Computer Science Conference (ACSC’06). Vol. 48, 85--94. Google ScholarDigital Library
- A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (March 2007), 618--644. Google ScholarDigital Library
- A. Jøsang and S. Pope. 2005. Semantic constraints for trust transitivity. In Proceedings of the 2nd Asia-Pacific Conference of Conceptual Modeling (APCCM’05), Vol. 43. 59--68. Google ScholarDigital Library
- A. Jøsang and S. L. Presti. 2004. Analyzing the relationship between risk and trust. In Proceedings of the 2nd International Conference on Trust Management (iTrust’04), Vol. 2995. Springer, 135--145.Google Scholar
- L. R. Kalnbach and B. M. Lantz. 1997. The Effects of Optimism and Willingness to Trust on Work-Related Attitudes and Behaviors: An Application to the Commercial Vehicle Industry. Technical Report. North Dakota State University.Google Scholar
- S. D. Kamvar, M. T. Schlosser, and H. G. Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference. Budapest, Hungary, 640--651. Google ScholarDigital Library
- S. Keung and N. Griffiths. 2008. Using recency and relevance to assess trust and reputation. In Proceedings of the AISB Symposium on Behavior Regulation in Multi-Agent Systems (BRMAS’08). Aberdeen, UK.Google Scholar
- A. Kittur, B. Suh, and E. H. Chi. 2008. Can you ever trust a wiki?: Impacting perceived trustworthiness in Wikipedia. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work (CSCW’08). San Diego, CA, USA, 477--480. Google ScholarDigital Library
- R. M. Kramer. 1999. Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology 50 (Feb. 1999), 569--598.Google Scholar
- A. H. Kydd. 2005. A blind spot of philosophy. Trust and Mistrust in International Relations. Princeton University Press.Google Scholar
- B. Lahno. 1999. Olli lagerspetz: Trust. The tacit demand. Ethical Theory and Moral Practice 2, 4 (1999), 433--435.Google ScholarCross Ref
- G. Q. Lana and C. B. Westphall. 2008. User maturity based trust management for grid computing. In Proceedings of the 7th International Conference on Networking. Cancun, Mexico, 758--761. Google ScholarDigital Library
- R. S. Lazarus, J. R. Averill, and E. M. Opton. 1970. Towards a cognitive theory of emotion. In Feelings and Emotions, M. B. Arnold (Ed.). Academic Press, New York, 207--232. The Loyola Symposium.Google Scholar
- J. D. Lee and N. Moray. 1992. Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35, 10 (1992), 1243--1270.Google ScholarCross Ref
- J. D. Lee and K. A. See. 2006. Trust in automation: Designing for appropriate reliance. Human Factors 40, 1 (Spring 2006), 50--80.Google Scholar
- K. C. Lee and N. Chung. 2009. Understanding factors affecting trust in and satisfaction with mobile banking in Korea: A modified DeLone and McLeans model perspective. Interacting with Computers 21, 5--6 (2009), 385--392. Google ScholarDigital Library
- M. Lesani and S. Bagheri. 2006. Fuzzy trust inference in trust graphs and its application in semantic web social networks. In Proceedings of the World Automation Congress (WAS’06). Budapest, Hungary, 1--6.Google Scholar
- R. J. Lewicki and B. B. Bunker. 1995. Trust in relationships: A model of development and decline. In Conflict, Cooperation, and Justice: Essays Inspired by the Work of Morton Deutsch, Barbara Benedict Bunker and Jeffrey Z. Rubin (Eds.). Jossey-Bass Inc., San Francisco, CA, 133--173. he Jossey-Bass conflict resolution series.Google Scholar
- J. David Lewis and A. Weigert. 1985. Trust as a social reality. Social Forces 63, 4 (1985), 967--985.Google ScholarCross Ref
- J. Li, R. Li, and J. Kato. 2008. Future trust management framework for mobile Ad Hoc networks. IEEE Communications Magazine 46, 4 (April 2008), 108--114. Security in Mobile Ad Hoc and Sensor Networks. Google ScholarDigital Library
- Q. Li, S. Zhu, and G. Cao. 2010. Routing in socially selfish delay tolerant networks. In Proceedings of the IEEE INFOCOM. San Diego, CA, 1--9. Google ScholarDigital Library
- Y. Li, M. Chen, Q. Li, and W. Zhang. 2012. Enabling multilevel trust in privacy preserving data mining. IEEE Transactions on Knowledge and Data Engineering 24, 9 (2012), 1598--1612. Google ScholarDigital Library
- Z. Liang and W. Shi. 2010. TRECON: A trust-based economic framework for efficient internet routing. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40, 1 (2010), 52--67. Google ScholarDigital Library
- H. Liao, Q. Wang, and G. Li. 2009. A fuzzy logic-based trust model in grid. In Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC’09). Wuhan, Hubei, China, 608--614. Google ScholarDigital Library
- D. Liben-Nowell and J. Kleinberg. 2003. The link prediction problem for social networks. In Proceedings of the 12th International Conference on Information and Knowledge Management. 556--559. Google ScholarDigital Library
- L. Lin and J. Huai. 2009. QGrid: An adaptive trust aware resource management framework. IEEE Systems Journal 3, 1 (2009), 78--90.Google ScholarCross Ref
- L.-Y. Lin and C.-Y. Lu. 2010. The influence of corporate image, relationship marketing, and trust on purchase intention: The moderating effects of word-of-mouth. Tourism Review 65, 3 (2010), 16--34.Google ScholarCross Ref
- C. Lioma, B. Larsen, H. Schuetze, and P. Ingwersen. 2010. A subjective logic formalisation of the principle of polyrepresentation for information needs. In Proceedings of the 3rd Symposium on Information Interaction in Context. 125--134. Google ScholarDigital Library
- N. Luhmann. 1979. Trust and Power. John Wiley & Sons Inc.Google Scholar
- N. Luhmann. 1990. Familiarity, confidence, trust: problems and alternatives. In Trust, D. Gambetta (Ed.). Blackwell.Google Scholar
- J. Luo, X. Liu, Y. Zhang, D. Ye, and Z. Xu. 2008. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. In Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN’08). Montreal, Que, 305--311.Google Scholar
- S. Ma, J. He, F. Gao, and J. Xu. 2010. A trust quantification algorithm based on fuzzy comprehensive evaluation. In Proceedings of the International Symposium on Intelligence Information Processing and Trusted Computing (IPTC’10). Huanggang, China, 196--199. Google ScholarDigital Library
- G. Mahoney, W. Myrvold, and G. C. Shoja. 2005. Generic reliability trust model. In Proceedings of Annual Conference on Privacy, Security and Trust. 113--120.Google Scholar
- O. Malacka, J. Samek, and F. Zboril. 2010. Event driven multi-context trust model. In Proceedings of the 10th International Conference on Intelligent Systems Design and Applications. Cairo, Egypt, 912--917.Google Scholar
- D. W. Manchala. 1998. Trust metrics, models and protocols for electronic commerce transactions. In Proceedings of the 18th IEEE International Conference on Distributed Computing Systems. Amsterdam, Netherlands, 312--321. Google ScholarDigital Library
- S. Manna, T. Gedeon, and B. S. U. Mendis. 2010. Enhancement of subjective logic for semantic document analysis using hierarchical document signature. In Neural Information Processing: Theory and Algorithms, Vol. 6443. 298--306. The Series Lecture Note in Computer Science. Google ScholarDigital Library
- P. V. Marsden. 2002. Egocentric and sociocentric measures of network centrality. Social Networks 24, 4 (Oct. 2002), 407--422.Google ScholarCross Ref
- S. Marsh and P. Briggs. 2009. Examining trust, forgiveness and regret as computational concepts. In Computing with Social Trust, J. Golbeck (Ed.). Springer, 9--43. Human-Computer Interaction Series.Google Scholar
- S. P. Marsh. 1994. Formalizing Trust as a Computational Concept. Ph.D. Dissertation. University of Stirling.Google Scholar
- S. P. Marsh and M. R. Dibben. 2005. Trust, untrust, distrust and mistrust: An exploration of the dark(er) side. In Proceedings of the 3rd International Conference on Trust Management (iTrust’05), V. Jennings P. Herrmann, and S. Shiu (Eds.). Vol. 3477. Springer, 17--33. The series Lecture Notes in Computer Science. Google ScholarDigital Library
- I. Matei, J. S. Baras, and T. Jiang. 2009. A composite trust model and its application to collaborative distributed information fusion. In Proceedings of the 12th International Conference on Information Fusion. Seattle, WA, 1950--1957.Google Scholar
- R. C. Mayer, J. H. Davis, and F. D. Schoorman. 1995. An integrative model of organizational trust. Academy of Management Review 20, 3 (1995), 709--734.Google ScholarCross Ref
- B. McGuinness and A. Leggatt. 2006. Information trust and distrust in a sensemaking task. In Proceedings of the 11th International Command and Control Research and Technology Symposium. San Diego, CA.Google Scholar
- Merriam and Webster Dictionary. 2015. (2015).Google Scholar
- U. F. Minhas, J. Zhang, T. Tran, and R. Cohen. 2010. Intelligent agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty. In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT’10). Toronto, Canada, 243--247. Google ScholarDigital Library
- N. Moray, T. Inagaki, and M. Itoh. 2000. Adaptive automation, trust, and self-confidence in fault management of time-critical tasks. Journal of Experimental Psychology: Applied 6, 1 (2000), 44--58.Google ScholarCross Ref
- B. M. Muir. 1994. Trust in automation. Part I. theoretical issues in the study of trust and human intervention in automated systems. Ergonomics 37, 11 (1994), 1905--1922.Google ScholarCross Ref
- B. M. Muir and N. Moray. 1996. Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation. Ergonomics 39, 3 (May 1996), 429--460.Google ScholarCross Ref
- M. Nagy, M. Vargas-Vera, and E. Motta. 2008. Multi agent trust for belief combination on the semantic web. In Proceedings of the 4th International Conference on Intelligent Computer Communication and Processing. 261--264.Google Scholar
- S. Nefti, F. Meziane, and K. Kasiran. 2005. A fuzzy trust model for e-commerce. In Proceedings of the 7th IEEE International Conference on E-Commerce Technology. 401--404. Google ScholarDigital Library
- D. A. Nevell, S. R. Maskell, P. R. Horridge, and H. L. Barnett. 2010. Fusion of data from sources with different levels of trust. In Proceedings of the 13th Conference on Information Fusion. 1--7.Google Scholar
- M. E. J. Newman. 2001. Clustering and preferential attachment in growing networks. Physical Review E 64, 2 (July 2001), 020101:1--020101:4.Google ScholarCross Ref
- M. E. J. Newman. 2005. A measure of betweenness centrality based on random walks. Social Networks 27, 1 (Jan. 2005), 39--54.Google ScholarCross Ref
- T. J. Norman and C. Reed. 2010. A logic of delegation. Artificial Intelligence 174, 1 (Jan. 2010), 51--71. Google ScholarDigital Library
- N. Oren, T. J. Norman, and A. Preece. 2007. Subjective logic and arguing with evidence. Artificial Intelligence 171, 10--15 (July 2007). Google ScholarDigital Library
- R. Parasuraman, T. B. Sheridan, and C. D. Wickens. 2008. Situation awareness, mental workload, and trust in automation: Viable, empirically supported cognitive engineering constructs. Journal of Cognitive Engineering and Decision Making 2, 2 (Summer 2008), 140--160.Google ScholarCross Ref
- S. Peng, W. Jia, and G. Wang. 2008. Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Shanghai, China, 3--9. Google ScholarDigital Library
- C. Pereitra. 2009. Distrust is not always the complement of trust (Position Paper). Normative Multi-Agent Systems, Guido Boella, Pablo Noriega, Gabriella Pigozzi, and Harko Verhagen (Eds.). Dagstuhl, Germany. Dagstuhl Seminar Proceedings.Google Scholar
- P. Pong and S. Challa. 2007. Empirical analysis of generalised uncertainty measures with dempster shafer fusion. In Proceedings of the 10th International Conference on Information Fusion. Quebec, Que., 1--9.Google Scholar
- T. M. Porter. 1995. Trust in Numbers: The Pursuit of Objectivity in Science and Public Life. Princeton University Press, UK.Google Scholar
- R. D. Putnam. 2000. Bowling Alone. Simon and Schuster, New York.Google Scholar
- D. Quercia, S. Hailes, and L. Capra. 2006. B-trust: Bayesian trust framework for pervasive computing. In Proceedings of the 4th International Conference on Trust Management. Springer, 298--312. Google ScholarDigital Library
- R. J. Rabeloa, L. M. Camarinha-Matos, and H. Afsarmaneshc. 1999. Multi-agent-based agile scheduling. Robotics and Autonomous Systems, Multi-Agent Systems Applications 27, 1--2 (April 1999), 15--28.Google Scholar
- J. K. Rempel, J. G. Holmes, and M. P. Zanna. 1985. Trust in close relationships. Journal of Personality and Social Psychology 49, 1 (July 1985), 95--112.Google ScholarCross Ref
- S. Y. Rieh and D. R. Danielson. 2007. Credibility: A multidisciplinary framework. Annual Review of Information Science and Technology 41, 1 (2007), 307--364. Google ScholarDigital Library
- D. M. Romano. 2003. The Nature of Trust: Conceptual and Operational Clarification. Ph.D. Dissertation. Department of Psychology, Louisiana State University.Google Scholar
- J. B. Rotter. 1980. Interpersonal trust, trustworthiness, and gullibility. American Psychologist 35, 1 (Jan. 1980), 1--7.Google ScholarCross Ref
- J. Sabater and C. Sierra. 2002. Reputation and social network analysis in multi-agent systems. In ACM Proceedings of International Joint Conference on Autonomous Agents and Multiagent Systems. 475--482. Google ScholarDigital Library
- G. Sabidussi. 1966. The centrality index of a graph. Psychometrika 31, 4 (1966), 581--603.Google ScholarCross Ref
- G. Shafer. 1976. A Mathematical Theory of Evidence. Princeton University Press, Princeton, NJ.Google Scholar
- R. A. Shaikh, H. Jameel, B. J. d’Auriol, H. Lee, S. Lee, and Y.-J. Song. 2009. Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 20, 11 (Nov. 2009), 1698--1712. Google ScholarDigital Library
- C. E. Shannon. 1948. The mathematical theory of communication. Bell System Technical Journal 27, 3 (1948), 379--423.Google ScholarCross Ref
- L. Shapley. 1953. A value for n-person games. Annals of Mathematical Studies 28 (1953), 307--317.Google Scholar
- B. Shelat and F. N. Egger. 2002. What makes people trust online gambling sites? In ACM Proceedings of Conference on Human Factors in Computing Systems. 852--853. Google ScholarDigital Library
- D. Shen, G. Chen, K. Pham, and E. Blasch. 2011. A trust-based sensor allocation algorithm in cooperative space search problems. In Proceedings of SPIE, Khanh D. Pham, Henry Zmuda, Joseph Lee Cox, and Greg J. Meyer (Eds.), Vol. 8044.Google Scholar
- A. Shimbel. 1953. Structural parameters of communication networks. Bulletin of Mathematical Biophysics 15, 4 (Dec. 1953), 501--507.Google ScholarCross Ref
- S. Sikdar, S. Adal ı, M. Amin, T. Abdelzaher, K. Chan, J. H. Cho, B. Kang, and J. O’Donovan. 2014. Finding true and credible information on twitter. In Proceedings of the IEEE 17th International Conference on Information Fusion (FUSION). Salamanca, Spain, 1--8.Google Scholar
- P. Slovic. 1993. Perceived risk, trust, and democracy. Risk Analysis 13, 6 (Dec. 1993), 675--682.Google ScholarCross Ref
- P. Smets and R. Kennes. 1994. The transferable belief model. Artificial Intelligence 66, 2 (April 1994), 191--234. Google ScholarDigital Library
- B. Solhaug, D. Elgesem, and K. Stolen. 2007. Why trust is not proportional to risk? In Proceedings of the 2nd International Conference on Availability, Reliability, and Security (ARES’07). Vienna, Austria, 11--18. Google ScholarDigital Library
- W. Stallings. 1995. The PGP web of trust. BYTE 20, 2 (Feb. 1995), 161--162.Google Scholar
- D. Stampouli, M. Brown, and G. Powell. 2010. Fusion of soft information using TBM. In Proceedings of the 13th Conference on Information Fusion. Edinburgh, Scotland, 1--8.Google Scholar
- A. N. Steinberg, C. L. Bowman, and F. E. White. 1999. Revisions to the JDL data fusion model. In Proceedings of SPIE (Sensor Fusion: Architectures, Algorithms, and Applications III), Vol. 3919. 235--251.Google Scholar
- Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu. 2006. Information theoretic framework of trust modeling and evaluation for ad hoc networks. Proceedings of the IEEE Journal on Selected Areas in Communications 24, 2 (Feb. 2006), 305--317. Google ScholarDigital Library
- M. Szomszor, P. Kostkova, and C. St. Louis. 2011. Twitter informatics: Tracking and understanding public reaction during the 2009 Swine Flu Pandemic. In Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. Lyon, France, 320--323. Google ScholarDigital Library
- S. Trifunovic, F. Legendre, and C. Anastasiades. 2010. Social trust in opportunistic networks. In Proceedings of the IEEE INFOCOM Workshop. San Diego, CA.Google Scholar
- R. Trivers. 1971. The evolution of reciprocal altruism. The Quarterly Review of Biology 46, 1 (March 1971), 35--57.Google ScholarCross Ref
- R. Trivers. 1985. Social Evolution. Benjamin-Cummings Pub Co, Cummings, CA, USA.Google Scholar
- P. B. Velloso, R. P. Laufer, D. O. Cunha, O. C. Duarte, and G. Pujolle. 2010. Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Transactions on Network and Service Management 7, 3 (2010), 172--185. Google ScholarDigital Library
- K. Wang and M. Wu. 2007. A trust approach for node cooperation in MANET. Mobile Ad-Hoc and Sensor Networks, Lecture Notes in Computer Science 4864 (2007), 481--491. Google ScholarDigital Library
- Y. Wang, I.-R. Chen, J. H. Cho, K. S. Chan, and A. Swami. 2013. Trust-based service composition and binding for tactical networks with multiple objectives. In Proceedings of the IEEE MILCOM. San Diego, CA, 1862--1867.Google Scholar
- Y. Wang, Y. C. Lu, I. R. Chen, J. H. Cho, A. Swami, and C. T. Lu. 2014. LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In Proceedings of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT’14). Cambridge, MA, USA.Google Scholar
- Y. Wang and M. Singh. 2010. Evidence-based trust: A mathematical model geared for multiagent systems. ACM Transactions on Autonomous and Adaptive Systems 5, 3 (Sept. 2010), 1--25. Google ScholarDigital Library
- Y. Wang and J. Vassileva. 2003. Bayesian network trust model in peer-to-peer networks. In Proceedings of the 2nd International Workshop Peers and Peer-to-Peer Computing. Springer, 23--24. Google ScholarDigital Library
- Y. D. Wang and H. H. Emurian. 2005. An overview of online trust: Concepts, elements and implications. Computers in Human Behavior 21 (2005), 105--125.Google ScholarCross Ref
- L. Wen, P. Lingdi, W. Chunming, and J. Ming. 2010. Distributed Bayesian network trust model in virtual network. In Proceedings of the 2nd International Conference on Network Security Wireless Communications and Trusted Computing (NSWCTC’10). Wuhan, Hubei, China, 71--74. Google ScholarDigital Library
- Wikipedia. 2015. Definition of Cognition. Retrieved from http://en.wikipedia.org/wiki/Cognition.Google Scholar
- Y. Wu, S. Tang, P. Xu, and X.-Y. Li. 2010. Dealing with selfishness and moral hazard in noncooperative wireless networks. IEEE Transactions on Mobile Computing 9, 3 (2010), 420--434. Google ScholarDigital Library
- Y. Yamamoto. 1990. A morality based on trust: Some reflections on japanese morality. Philosophy East and West 40, 4 (October 1990), 451--469. Understanding Japanese Values.Google ScholarCross Ref
- Z. Yan, P. Zhang, and T. Virtanen. 2003. Trust evaluation based security solutions in ad hoc networks. In Proceedings of the 7th Nordic Workshop on Security IT Systems (NordSec’03). Gjodotvik, Norway, 1--10.Google Scholar
- Z. Yang, Y. Fan, and B. Zhang. 2010. A fusion model of overall trust relationship from multiple attributes in trusted networks based on dynamic entropy gain. In Proceedings of the IEEE International Conference on Information Theory and Information Security. Beijing, China, 323--326.Google Scholar
- L. A. Zadeh. 1965. Fuzzy sets. Information and Control 8, 3 (June 1965), 338--353.Google ScholarCross Ref
- L. A. Zadeh. 1983. The role of fuzzy logic in the management of uncertainty in expert systems. Fuzzy Sets and Systems 11, 1--3 (March 1983), 197--198. Google ScholarDigital Library
- J. Zhang, A. A. Ghorbani, and R. Cohen. 2006. An improved familiarity measurement for formalization of trust in e-commerce based multi-agent systems. In Proceedings of 2006 International Conference on Privacy, Security, and Trust: Bridge the Gap Between PST Technologies and Business Services. Google ScholarDigital Library
- Y. Zheng, R. Kantola, and P. Zhang. 2011. A research model for human-computer trust interaction. In Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11). Changsha, China, 274--281. Google ScholarDigital Library
- C.-N. Zieglera and J. Golbeck. 2007. Investigating interactions of trust and interest similarity. Decision Support Systems 43, 2 (March 2007), 460--475. Emerging Issues in Collaborative Commerce. Google ScholarDigital Library
- C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas. 2005. Quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of the 3rd ACM Workshop on Security for Ad Hoc and Sensor Networks. Alexandria, VA, 1--10. Google ScholarDigital Library
Index Terms
- A Survey on Trust Modeling
Recommendations
A trust model between cloud entities using fuzzy mathematics
Many of modern systems and applications such as cloud computing, grid computing, pervasive computing, P2P networks and even web applications have employed the concepts of trust. Trust is a level of subjective probability between two entities, a trustor (...
Effects of innovativeness and trust on web survey participation
Responding to suggestions of prior research for examining the psychological constructs involved in a decision for or against participation in web surveys, this paper investigated the effects of trust in sponsor and personal innovativeness on potential ...
National culture and consumer trust in e-commerce
The article examines how culture influences trust in e-commerce.Disposition to trust is a significant predictor of perceived trustworthiness.Disposition to trust mediates effects between national culture and trustworthiness.Long-term orientation and ...
Comments