Skip to main content
Log in

Propagation Models for Trust and Distrust in Social Networks

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abdul-Rahman A, Hailes S. A distributed trust model. In: New Security Paradigms Workshop, Cumbria, UK, September 1997:48–60.

  • Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Maui, HW, USA, January 2000.

  • Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. In Paques H, Liu L, and Grossman D (eds.) Proceedings of the Tenth International Conference on Information and Knowledge Management, ACM Press, 2001:310–317.

  • Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proceedings of the 1994 European Symposium on Research in Computer Security, 1994:3–18.

  • Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of the 17th Symposium on Security and Privacy, Oakland, CA, USA. IEEE Computer Society Press 1996:164–173.

  • Ceglowski M, Coburn A, Cuadrado J. Semantic search of unstructured data using contextual network graphs, June 2003.

  • Chen R, Yeager W. Poblano: A distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems, Santa Clara, CA, USA, February 2003.

  • Dumbill E. Finding friends with XML and RDF, June 2002. IBM's XML Watch.

  • Eschenauer L, Gligor V, Baras J. On trust establishment in mobile ad-hoc networks. Technical Report MS 2002-10, Institute for Systems Research, University of Maryland, MD, USA, October 2002.

  • Ford L, Fulkerson R. Flows in Networks. Princeton, NJ, USA:Princeton University Press, 1962.

    Google Scholar 

  • Gans G, Jarke M, Kethers S, Lakemeyer G. Modeling the impact of trust and distrust in agent networks. In: Proceedings of the Third International Bi-Conference Workshop on Agent-oriented Information Systems, Montreal, Canada, May 2001.

  • Gil Y, Ratnakar V. Trusting information sources one citizen at a time. In: Proceedings of the First International Semantic Web Conference, Sardinia, Italy, June 2002.

  • Golbeck J, Parsia B, Hendler J. Trust networks on the semantic web. In: Proceedings of Cooperative Intelligent Agents, Helsinki, Finland, August 2003.

  • Gray E, Seigneur J-M, Chen Y, Jensen C. Trust propagation in small worlds. In Nixon P, and Terzis S (eds.), Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, Springer-Verlag, 2003:239–254.

  • Guha R. Open rating systems. Technical report, Stanford Knowledge Systems Laboratory, Stanford, CA, USA, 2003.

  • Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In: Proceedings of the Thirteenth International World Wide Web Conference, New York, NY, USA, May 2004. ACM Press, 2004.

  • Hartmann K, Strothotte T. A spreading activation approach to text illustration. In: Proceedings of the 2nd International Symposium on Smart Graphics, Hawthorne, NY, USA: ACM Press, 2002:39–46.

  • Heider F. The Psychology of Interpersonal Relations. New York, NY, USA, Wiley, 1958.

    Google Scholar 

  • Holland P, Leinhardt S. Some evidence on the transitivity of positive interpersonal sentiment. American Journal of Sociology, 1972;77:1205–1209.

    Article  Google Scholar 

  • Housely R, Ford W, Polk W, Solo D. Internet X.509 public key infrastructure, January 1999. Internet Engineering Task Force RFC 2459.

  • Jøsang A, Gray E, Kinateder M. Analysing topologies of transitive trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust, Pisa, Italy, September 2003.

  • Kahan J, Koivunen M-R, Prud' Hommeaux E, Swick R. Annotea - an open RDF infrastructure for shared web annotations. In: Proceedings of the Tenth International World Wide Web Conference, Hong Kong, China, May 2001:623–632.

  • Kamvar S, Schlosser M, Garcia-Molina H. The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary, May 2003.

  • Kinateder M, Pearson S. A privacy-enhanced peer-to-peer reputation system. In: Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, volume 2378 of LNCS, Prague, Czech Republic, September 2003. Springer-Verlag.

  • Kinateder M, Rothermel K. Architecture and algorithms for a distributed reputation system. In Nixon P, Terzis S (eds.), Proceedings of the First International Conference on Trust Management, volume 2692 of LNCS, Springer-Verlag, 2003:1–16.

  • Levien R. Attack Resistant Trust Metrics. PhD thesis, UC Berkeley, Berkeley, CA, USA, 2003.

  • Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 1998.

  • Levien R, Aiken A. An attack-resistant, scalable name service, 2000. Draft submission to the Fourth International Conference on Financial Cryptography.

  • Lewicki R, McAllister D, Bies R. Trust and distrust: New relationships and realities. Academy of Management Review, 1998;23(12):438–458.

    Google Scholar 

  • Luhmann N. Trust and Power. Chichester, UK: Wiley, 1979.

    Google Scholar 

  • Marsh S. Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK, 1994a.

  • Marsh S. Optimism and pessimism in trust. In Ramirez J (eds.), Proceedings of the Ibero-American Conference on Artificial Intelligence, Caracas, Venezuela, McGraw-Hill, 1994.

  • Maurer U. Modelling a public key infrastructure. In Bertino E, editor, Proceedings of the 1996 European Symposium on Research in Computer Security, volume 1146 of LNCS, Springer-Verlag, 1996:325–350.

  • McKnight H, Chervany N. The meaning of trust. Technical Report MISRC 96-04, Management Informations Systems Research Center, University of Minnesota, MN, USA, 1996.

  • Milgram S. The small world problem. In Sabini J, and Silver M (eds.), The Individual in a Social World—Essays and Experiments 2nd edition. New York, NY, USA, McGraw-Hill, 1992.

    Google Scholar 

  • Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation. In: Proceedings of the 35th Hawaii International Conference on System Sciences, Big Island, HI, USA, January 2002:188–196.

  • Page L, Brin S, Motwani R, Winograd T. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.

  • Quillian R. Semantic memory. In Minsky M, (ed.), Semantic Information Processing, Boston, MA, USA, MIT Press, 1968:227–270.

    Google Scholar 

  • Rapoport A. Mathematical models of social interaction. In Luce D, Bush R, and Galanter E (eds.), Handbook of Mathematical Psychology, volume 2. New York, NY, USA Wiley, 1963.

    Google Scholar 

  • Reiter M, Stubblebine S. Path independence for authentication in large-scale systems. In: ACM Conference on Computer and Communications Security, 1996:57–66.

  • Reiter M, Stubblebine S. Toward acceptable metrics of authentication. In: Proceedings of the IEEE Symposium on Security and Privacy, 1997:10–20.

  • Richardson M, Agrawal R, Domingos P. Trust management for the semantic web. In: Proceedings of the Second International Semantic Web Conference, Sanibel Island, FL, USA, September 2003.

  • Sankaralingam K, Sethumadhavan S, Browne J. Distributed pagerank for P2P systems. In: Proceedings of the Twelfth International Symposium on High Performance Distributed Computing, Seattle, WA, USA, June 2003.

  • Smith E, Nolen-Hoeksema S, Fredrickson B, Loftus G. Atkinson and Hilgards's Introduction to Psychology. Thomson Learning, Boston, MA, USA, 2003.

    Google Scholar 

  • Twigg A, Dimmock N. Attack-resistance of computational trust models. In: Proceedings of the Twelfth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises: Enterprise Security (Special Session on Trust Management), Linz, Austria, June 2003:275–280.

  • Wiese R, Eiglsperger M, Kaufmann M. yfiles—visualization and automatic layout of graphs. In: Proceedings of the 9th International Symposium on Graph Drawing, volume 2265 of LNCS, Heidelberg, Germany, Springer-Verlag, January 2001:453–454.

  • Ziegler C-N. Semantic web recommender systems. In Lindner W, and Perego A (eds.), Proceedings of the Joint ICDE/EDBT Ph.D. Workshop 2004, Heraklion, Greece. Crete University Press, March 2004.

  • Ziegler C-N, Lausen G. Analyzing correlation between trust and user similarity in online communities. In: Jensen C, Poslad S, and Dimitrakos T (eds.), Proceedings of the 2nd International Conference on Trust Management, volume 2995 of LNCS, Oxford, UK, March 2004. Springer-Verlag, 251–265.

  • Zimmermann P. The Official PGP User's Guide. Boston, MA, USA, MIT Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cai-Nicolas Ziegler.

Additional information

Cai-Nicolas Ziegler is a post-doctoral researcher at DBIS, the Databases and Information Systems group of the University of Freiburg, Germany. He studied Computer Science at the University of Passau, Germany, and Université Laval, Québec, receiving his Diploma (equivalent to MSc) in 2003. Cai-Nicolas obtained his PhD in Computer Science from the University of Freiburg in 2005.

His primary research interests cover collaborative filtering applications and recommender systems, as well as computational trust models on the verge of human-computer interaction.

Georg Lausen is head of the research group on Databases and Information Systems (DBIS) at the University of Freiburg, Germany. He received his Diploma in Industrial Engineering in 1978, PhD in 1982, and his postdoctoral lecture qualification (Habilitation) in 1985 from the University of Karlsruhe (TH). He was associate professor for Information Technology and Integration Problems at the Technical University of Darmstadt from 1986 to 1987. From 1987 to 1994 he was full professor for databases and informations systems at the University of Mannheim, and since 1994 at the University of Freiburg.

His current research interests comprise information integration, internet technologies, and Web services.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ziegler, CN., Lausen, G. Propagation Models for Trust and Distrust in Social Networks. Inf Syst Front 7, 337–358 (2005). https://doi.org/10.1007/s10796-005-4807-3

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-005-4807-3

Navigation