Computing with Trust: Definition, Properties, and Algorithms

Trust is an important facet of relationships in social networks. Whether it is for use in security, determining data access, or recommender systems, the definition of trust guides the development of algorithms to make computations over the trust relationships. In this paper, we present a definition of trust based on sociological foundations. We then describe several properties of trust, including transitivity and composability, that follow from the definition and research in the social sciences, to help guide the methods used for computing with trust, and we discuss the range of values used for expressing trust. We then present a review of algorithms that compute trust in social networks

[1]  Georg Lausen,et al.  Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[2]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[3]  Bobby Bhattacharjee,et al.  Using Trust in Recommender Systems: An Experimental Analysis , 2004, iTrust.

[4]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[5]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.

[6]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[7]  Kirsten Swearingen,et al.  Beyond Algorithms: An HCI Perspective on Recommender Systems , 2001 .

[8]  Rino Falcone,et al.  Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).

[9]  Jennifer Golbeck,et al.  Generating Predictive Movie Recommendations from Trust in Social Networks , 2006, iTrust.

[10]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[11]  Georg Lausen,et al.  Analyzing Correlation between Trust and User Similarity in Online Communities , 2004, iTrust.

[12]  Yaniv,et al.  Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.

[13]  Yong Chen,et al.  Trust Propagation in Small Worlds , 2003, iTrust.

[14]  Rashmi R. Sinha,et al.  Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.

[15]  Jonathan L. Herlocker,et al.  Evaluating collaborative filtering recommender systems , 2004, TOIS.

[16]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[17]  Paolo Avesani,et al.  Trust-Aware Collaborative Filtering for Recommender Systems , 2004, CoopIS/DOA/ODBASE.

[18]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[19]  P. Oscar Boykin,et al.  Personal Email Networks: An Effective Anti-Spam Tool , 2004, ArXiv.

[20]  Catholijn M. Jonker,et al.  Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.

[21]  P. Sztompka Trust: A Sociological Theory , 2000 .

[22]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[23]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[24]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[25]  R. Golembiewski,et al.  The centrality of interpersonal trust in group processes , 1975 .

[26]  K. Suzanne Barber,et al.  Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources , 2000, Trust in Cyber-societies.

[27]  K. Cook Trust in Society , 2001 .

[28]  J. Golbeck,et al.  FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[29]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[30]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .