The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Transactional Security for a Distributed Reputation Management System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Proceedings of the International Workshop on Security Protocols
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Trust Metrics, Models and Protocols for Electronic Commerce Transactions
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Spreading Activation Models for Trust Propagation
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
A survey of trust and reputation systems for online service provision
Decision Support Systems
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Efficient distributed reputation scheme for peer-to-peer systems
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
Conditional deduction under uncertainty
ECSQARU'05 Proceedings of the 8th European conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty
Towards a generic trust model – comparison of various trust update algorithms
iTrust'05 Proceedings of the Third international conference on Trust Management
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
On Relating and Integrating Two Trust Management Frameworks
Electronic Notes in Theoretical Computer Science (ENTCS)
Managing Trustworthiness in Component-based Embedded Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS
Electronic Notes in Theoretical Computer Science (ENTCS)
Delegations guided by trust and autonomy
Web Intelligence and Agent Systems
Agent Methods for Network Intrusion Detection and Response
HoloMAS '07 Proceedings of the 3rd international conference on Industrial Applications of Holonic and Multi-Agent Systems: Holonic and Multi-Agent Systems for Manufacturing
Trust Modeling with Context Representation and Generalized Identities
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
Trust-Based Classifier Combination for Network Anomaly Detection
CIA '08 Proceedings of the 12th international workshop on Cooperative Information Agents XII
Combining Trust and Reputation Management for Web-Based Services
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
CellTrust: a reputation model for C2C commerce
Electronic Commerce Research
Context-Dependent Reputation Management for Soft Security in Multi Agent Systems
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
An interoperable context sensitive model of trust
Journal of Intelligent Information Systems
Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities
Trust in Agent Societies
Electronic Notes in Theoretical Computer Science (ENTCS)
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Dynamics, Robustness and Fragility of Trust
Formal Aspects in Security and Trust
Personalizing Trust in Online Auctions
Proceedings of the 2006 conference on STAIRS 2006: Proceedings of the Third Starting AI Researchers' Symposium
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
Towards Trustworthy Delegation in Role-Based Access Control Model
ISC '09 Proceedings of the 12th International Conference on Information Security
Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
A framework for trust enabled software asset retrieval
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Quantifying and qualifying trust: spectral decomposition of trust networks
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Trust maximization in social networks
SBP'11 Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction
Argumentation-based reasoning in agents with varying degrees of trust
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Some thoughts on using argumentation to handle trust
CLIMA'11 Proceedings of the 12th international conference on Computational logic in multi-agent systems
Transitive trust in mobile scenarios
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Exploring different types of trust propagation
iTrust'06 Proceedings of the 4th international conference on Trust Management
An algebra for trust dilution and trust fusion
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Information Sciences: an International Journal
Reasoning about trust using argumentation: a position paper
ArgMAS'10 Proceedings of the 7th international conference on Argumentation in Multi-Agent Systems
Circle of friend query in geo-social networks
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part II
A social network-based trust-aware propagation model for P2P systems
Knowledge-Based Systems
Generating trusted graphs for trust evaluation in online social networks
Future Generation Computer Systems
Hi-index | 0.00 |
When transacting and interacting through open computer networks, traditional methods used in the physical world for establishing trust can no longer be used. Creating virtual network substitutes with which people, organisations and software agents can derive trust in other parties requires computerised analysis of the underlying trust networks. This article describes an approach to trust network analysis using subjective logic (TNA-SL), that consists of the three following elements. Firstly it uses a concise notation with which trust transitivity and parallel combination of trust paths can be expressed. Secondly it defines a method for simplifying complex trust networks so that they can be expressed in this concise form. Finally it allows trust measures to be expressed as beliefs, so that derived trust can be automatically and securely computed with subjective logic. We compare our approach with trust derivation algorithms that are based on normalisation such as PageRank and EigenTrust. We also provide a numerical example to illustrates how TNA-SL can be applied.