Towards content trust of web resources

Trust is an integral part of the Semantic Web architecture. Most prior work on trusts focuses on entity-centered issues such as authentication and reputation and does not take into account the content, i.e., the nature and use of the information being exchanged. This paper defines content trust and discusses it in the context of other trust measures that have been previously studied. We introduce several factors that users consider in deciding whether to trust the content provided by a Web resource. Our goal is to discern which of these factors could be captured in practice with minimal user interaction in order to maximize the quality of the system's trust estimates. We present results on a study to determine which factors were more important to capture, and describe a simulation environment that we have designed to study alternative models of content trust.

[1]  James A. Hendler,et al.  A Framework for Web Science , 2006, Found. Trends Web Sci..

[2]  Tim Berners-Lee,et al.  Weaving The Web: The Original Design And Ultimate Destiny of the World Wide Web , 1999 .

[3]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[4]  Andrzej Skowron,et al.  Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence , 2005 .

[5]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[6]  Jennifer Golbeck,et al.  Inferring Reputation on the Semantic Web , 2004, WWW 2004.

[7]  Deborah L. McGuinness,et al.  IWTrust: Improving User Trust in Answers from the Web , 2005, iTrust.

[8]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[9]  Fabien L. Gandon,et al.  Semantic web technologies to reconcile privacy and context awareness , 2003, Journal of Web Semantics.

[10]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[11]  Wolfgang Nejdl,et al.  Personalized Reputation Management in P2P Networks , 2004, ISWC Workshop on Trust, Security, and Reputation on the Semantic Web.

[12]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[13]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[14]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[15]  Paul Resnick,et al.  PICS: Internet access controls without censorship , 1996, CACM.

[16]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[17]  Piero A. Bonatti,et al.  Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[18]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[19]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[20]  Timothy W. Finin,et al.  A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.

[21]  Yolanda Gil,et al.  Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.

[22]  Yolanda Gil,et al.  TRELLIS: An Interactive Tool for Capturing Information Analysis and Decision Making , 2002, EKAW.

[23]  Marianne Winslett,et al.  PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.

[24]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[25]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[26]  Jeffrey M. Bradshaw,et al.  KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[27]  Paolo Massa,et al.  Page-reRank: using trusted links to re-rank authority , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).

[28]  S. Braynov,et al.  Detecting malicious groups of agents , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[29]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[30]  Yolanda Gil,et al.  Incremental formalization of document annotations through ontology-based paraphrasing , 2004, WWW '04.

[31]  Fabien L. Gandon,et al.  Context-awareness, privacy and mobile access: a web semantic and multiagent approach , 2004, UbiMob.

[32]  Angelos D. Keromytis,et al.  A secure active network environment architecture: realization in SwitchWare , 1998, IEEE Netw..

[33]  Jon Kleinberg,et al.  Authoritative sources in a hyperlinked environment , 1999, SODA '98.