The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Social trust: a cognitive approach
Trust and deception in virtual societies
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Proceedings of the International Workshop on Security Protocols
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Trust Metrics, Models and Protocols for Electronic Commerce Transactions
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Dynamic communities in referral networks
Web Intelligence and Agent Systems
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
Simulating the effect of reputation systems on E-markets
iTrust'03 Proceedings of the 1st international conference on Trust management
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Trust based ontology integration for the community services sector
AOW '06 Proceedings of the second Australasian workshop on Advances in ontologies - Volume 72
A reputation system based on computing with words
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
An efficient and transparent transaction management based on the data workflow of HVEM DataGrid
CLADE '08 Proceedings of the 6th international workshop on Challenges of large applications in distributed environments
Bayesian memory-based reputation system
Proceedings of the 3rd international conference on Mobile multimedia communications
Combining Trust and Reputation Management for Web-Based Services
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A new evidential trust model for open communities
Computer Standards & Interfaces
Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A global security architecture for operated hybrid WLAN mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
T2D: a peer to peer trust management system based on disposition to trust
Proceedings of the 2010 ACM Symposium on Applied Computing
Evaluation of P2P search algorithms for discovering trust paths
EPEW'07 Proceedings of the 4th European performance engineering conference on Formal methods and stochastic models for performance evaluation
Foundations of security analysis and design IV
A medical data reliability assessment model
Journal of Theoretical and Applied Electronic Commerce Research
Routing in socially selfish delay tolerant networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
I rate you. you rate me. should we do so publicly?
WOSN'10 Proceedings of the 3rd conference on Online social networks
The design of a reliable reputation system
Electronic Commerce Research
Exploring different types of trust propagation
iTrust'06 Proceedings of the 4th international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Bargaining in e-business systems
ER'05 Proceedings of the 24th international conference on Perspectives in Conceptual Modeling
Circle of friend query in geo-social networks
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part II
A routing protocol for socially selfish delay tolerant networks
Ad Hoc Networks
Stereotypical trust and bias in dynamic multiagent systems
ACM Transactions on Intelligent Systems and Technology (TIST) - Special section on agent communication, trust in multiagent systems, intelligent tutoring and coaching systems
Improving trust modeling through the limit of advisor network size and use of referrals
Electronic Commerce Research and Applications
Hi-index | 0.00 |
To describe the concept of transitive trust in a simplified way, assume that agent A trusts agent B, and that agent B trusts agent C, then by transitivity, agent A trusts agent C. Trust transitivity manifests itself in various forms during real life human interaction, but can be challenging to concisely model in a formal way. In this paper we describe principles for expressing and analysing transitive trust networks, and define requirements for their validity. This framework can be used for modelling transitive trust in computerised interactions, and can be combined with algebras and algorithms for computing propagation of both trust and distrust. This is illustrated by an example where transitive trust is mathematically analysed with belief calculus.