Trust Models for Community Aware Identity Management

The contemporary Web is heading towards its next stage of evolution. From a clump of unorganised information spaces, the Web is becoming more focused on the meaning of information (the Semantic Web) and on community awareness (Web 2.0). One of the key concepts in this new Web is that of social networking, where both sophisticated trust modelling and personal identity/reputation management are required for the creation of social networks and for the exchange of information in these networks. The Web has many instances of sites and services where reputation management and trust form the basis of social and commercial interaction between members of those sites. However, there are few systems that enable users to share their credentials among many websites. It is also important that systems should provide strong security and protect user identities, but all of these features should also be transparent from a user's perspective. In this article we begin by detailing how trust can be modelled within online communities. We present methods for constructing community-aware identity management systems and for computing trust levels between users of a social network, using a novel trust model that takes advantage of both the capabilities of the Semantic Web and of a distributed topology. We also describe how the trust of a particular person relies on the separate social networks that they are members of. Finally, we evaluate our research against current studies in the psychology domain.

[1]  J. Golbeck,et al.  FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[2]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[3]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[4]  Stefan Decker,et al.  Semantic Social Collaborative Filtering with FOAFRealm , 2005, Semantic Desktop Workshop.

[5]  L. Jean Camp,et al.  Designing for Trust , 2002, Trust, Reputation, and Security.

[6]  Roger Anderson,et al.  Homeland Security , 2004, Gov. Inf. Q..

[7]  L. Festinger,et al.  A Theory of Cognitive Dissonance , 2017 .

[8]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[9]  Sebastian Ryszard Kruk,et al.  D-FOAF - Security Aspects in Distributed User Management System , 2005 .

[10]  John T. Cacioppo,et al.  The Elaboration Likelihood Model of Persuasion , 1986, Advances in Experimental Social Psychology.

[11]  R. B. Redmon,et al.  Identity , 2021, Notre Dame J. Formal Log..

[12]  James A. Hendler,et al.  Trust Networks on the Semantic Web , 2003, WWW.

[13]  M. Sherif,et al.  The psychology of attitudes. , 1946, Psychological review.

[14]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[15]  D. Bem Self-Perception Theory , 1972 .

[16]  Ling Liu,et al.  Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .

[17]  Caroline Haythornthwaite,et al.  Studying Online Social Networks , 2006, J. Comput. Mediat. Commun..

[18]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[19]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .