A Discussion on Trust Requirements for a Social Network of Eahoukers

A social network of eahoukers is intended to benefit from the socially generated knowledge to deal with the home appliances in a domestic environment. The entire system being developed in the SandS project has diverse facets, in this paper we focus on a discussion of the trust requirements from several points of view. Trust has been studied for a long time in different contexts. In this paper we review some definitions and ideas related to trust, as a basis for the desired discussion, as a first step previous to any implementation.

[1]  Lance J. Hoffman,et al.  Trust beyond security: an expanded trust model , 2006, CACM.

[2]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[3]  David W. Chadwick,et al.  Merging and extending the PGP and PEM trust models-the ICE-TEL trust model , 1997, IEEE Netw..

[4]  Ling Liu,et al.  RLM: A General Model for Trust Representation and Aggregation , 2012, IEEE Transactions on Services Computing.

[5]  Sheikh Iqbal Ahamed,et al.  Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..

[6]  Kamal Kant Bharadwaj,et al.  Fuzzy computational models for trust and reputation systems , 2009, Electron. Commer. Res. Appl..

[7]  K. Blomqvist The many faces of trust , 1997 .

[8]  Leonard Barolli,et al.  Survey of Trust Management on Various Networks , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.

[9]  Steffen Staab,et al.  The Pudding of Trust , 2004, IEEE Intell. Syst..

[10]  Samir Kouro,et al.  Unidimensional Modulation Technique for Cascaded Multilevel Converters , 2009, IEEE Transactions on Industrial Electronics.

[11]  Farookh Khadeer Hussain,et al.  A Methodology for Maintaining Trust in Industrial Digital Ecosystems , 2013, IEEE Transactions on Industrial Electronics.

[12]  Yong Li,et al.  Formal Definitions for Trust in Trusted Computing , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[13]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[14]  Athanasios V. Vasilakos,et al.  A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[15]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[16]  W. J. Adams,et al.  Calculating a node's reputation in a mobile ad hoc network , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[17]  Jennifer Golbeck,et al.  Computing with Trust: Definition, Properties, and Algorithms , 2006, 2006 Securecomm and Workshops.

[18]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Zhaoyu Liu,et al.  A Formal Definition for Trust in Distributed Systems , 2005, ISC.

[20]  Daniel W. Manchala E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..

[21]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.