<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Context-aware Trustworthiness Evaluation with Indirect Knowledge</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Santtu Toivonen</string-name>
          <email>santtu.toivonen@vtt.fi</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gabriele Lenzini</string-name>
          <email>gabriele.lenzini@telin.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilkka Uusitalo</string-name>
          <email>ilkka.uusitalo@vtt.fi</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Telematica Instituut P.</institution>
          <addr-line>O.Box 589, 7500 AN Enschede</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>VTT Technical Research Centre of Finland P.</institution>
          <addr-line>O.Box 1000, FIN-02044 VTT</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>VTT Technical Research Centre of Finland P.</institution>
          <addr-line>O.Box 1100, FIN-90571 Oulu</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Commonly, when a Trustor evaluates a Trustee's trustworthiness, it is assumed that the evaluation is based on information directly available to the Trustor. This can concern for example the reputation and recommendations characterizing the Trustee. In cases of context-aware trust, this is further restricted by concentrating mainly on information in a similar enough context as is effective at trust evaluation time. However, this information is not necessarily available to the Trustor. Surprisingly, in such scenarios the literature suggests either to wait for someone else to collect the needed experience, or to trust blindly. In this paper, we discuss solutions that help the Trustor to conduct its evaluation even if direct knowledge about the Trustee is lacking. We approach this by allowing the Trustor to make use of networks connecting the Trustor and the Trustee, as well as the context information characterizing the entities appearing in these networks.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Trust is an increasingly important phenomenon to grasp and support in open
environments, such as the Internet, where participants are not necessarily in direct contact with
each other. A common scenario is that a the subject of trust (Trustor) is searching for
a service or a product (Trustee) for a certain purpose. Semi-automatic trustworthiness
evaluation is of special relevance on the Semantic Web, where Trustors can be software
agents in addition to human beings, and Trustees are software agents or web pages
carrying information for Trustors to depend on. To perform an appropriate evaluation,
Trustors request Trustees’ credentials, often expressed in terms of profiles, reputation
descriptions, and recommendations (cf. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]). The difference between reputation and
recommendation is that reputation is based on the Trustor’s personal experiences, whereas
recommendations are communicated experiences of others.
      </p>
      <p>
        Context-awareness is also an emerging computer science trend, which takes
situational details into account. Generally, in computer science context refers to any
information characterizing the situation of any entities considered relevant to the interaction
between a user and an application, including the user and the application themselves,
as well as their surroundings [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Note that since we are operating in environments
where the entities are often software programs, it is relevant to consider their context
too [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In the scope of the Semantic Web, one important task where the notion of
context can assist is aggregation, that is, the activity of integrating data or information from
multiple sources [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In our work aggregation is not so much directed to the semantics of
descriptions characterizing various entities, but rather to combining the trustworthiness
values of these entities.
      </p>
      <p>
        Many research efforts in addition to ours also acknowledge that context information
may help to define trust credentials (cf. [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6, 7, 8</xref>
        ]). In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], we discuss context-aware
trust functions; as relevant credentials, we identified the quality attributes of a Trustee,
the context attributes (of the Trustee, Trustor, and the surrounding environment), the
Trustee’s reputation in the eye of the Trustor, as well as recommendations about the
Trustee put forward by others.
      </p>
      <p>
        Trust management frameworks operate under the assumption that the Trustor can
directly access the information he requires to complete the trustworthiness
evaluation [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In the global computing paradigm this assumption seems sometimes too
optimistic. Trustee’s credentials may not be available (e.g., when a new service is deployed,
or when this information is protected by privacy policies), or reputation data and
recommendations may refer to Trustee’s behavior in contexts which are too different from
the present one for them to be of use.
      </p>
      <p>In this paper, we study context-aware trust establishment by considering scenarios
where direct information about the Trustee is not necessarily available to the Trustor.
We claim that even in such situations there are better options for Trustors to choose from
than to trust/distrust blindly. For example, the Trustor can evaluate the trustworthiness
of another entity somehow related to the Trustee. In many real situations humans act
like this. We trust a car manufactured in a certain country, if our previous experiences
with cars manufactured in that particular country are good, even if we have no
experiences of that particular make. In many cases this kind of indirect evaluation suffices to
accomplish a fair judgment to start with.</p>
      <p>
        The particular cases we consider are the following : (i) Trustee’s behavior across
contexts is unknown to the Trustor, meaning that the Trustor has no previous
knowledge of any behavior of the Trustee; (ii) Trustee’s behavior in the current context is
unknown to the Trustor, meaning that the Trustor might know the Trustee, but not how
the Trustee behaves in the current context; (iii) Trustee’s recommender and/or
recommendations are unknown or unaccessible to the Trustor. Cases (i) and (ii) are targeted to
reputation information, as they are dependent on the Trustor’s knowledge and opinions
on past states-of-affairs. Case (iii) relies on recommendations available to the Trustor,
although the mechanisms to be considered in terms of (i) and (ii) could be plugged in it
too. Note that we consider the context to be fully observable [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] to the Trustor,
meaning that there is access to all relevant contextual information characterizing the Trustee,
the environment, as well as the Trustor. In addition, we assume that the Trustee’s quality
attributes are also available to the Trustor, meaning that we do not tackle the problem
of indirect quality attribute information, albeit it could follow the same lines of
investigation.
      </p>
      <p>The rest of the paper is organized as follows. In Section 2, we present some relevant
related work. In order to pinpoint the contribution of this paper, in Section 3 we then
present the baseline case where there is complete and direct information influencing
trustworthiness evaluation available. We also formalize operational semantics for the
trustworthiness evaluation process; it will help us later on to discuss the changes in
the trustworthiness evaluation process when only indirect information is available. In
Section 4, we delve into the scenarios where the Trustor has little or no reputation
knowledge about the Trustee. Section 5 considers the case where recommender is not
known to the Trustor. Finally, Section 6 concludes the paper and outlines some future
work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        The interaction between trust and context has attracted the attention of researchers
only recently, and from different perspectives. In the Web Services domain, for example,
context is used to anonymize the authentication procedure [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], or to decide whether
granting the access to distributed resources [
        <xref ref-type="bibr" rid="ref13 ref4">13, 4</xref>
        ]. Here, differently from our approach,
context is not used to evaluate the degree of users’ trustworthiness. Instead, users’
credentials are assumed to originate from trusted certification authorities and, together with
the context, it is checked to satisfy the access conditions.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], the authors use context in conjunction with content to label Semantic Web
data. Only trustful (vs. merely known or untrustful) data satisfies the user-defined trust
policies and is recognized by web consumers. We do not discern between trusted and
merely known data in an a-priori fashion, but instead rely on recommendations and
reputations to smooth out the negative effect of potentially malicious information in the
evaluation process.
      </p>
      <p>
        The problem of inferring trust from recommendations has appeared in the
literature for a long time. Yahalom et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] were one of the first to separate direct trust
from recommendation-based trust and to propose an algorithm to derive new trust
values given a graph of trust relationships. In [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], Beth et al. quantify trust, both direct
and recommendation-based, as probability of the Trustee to behave as expected, and
as a degree of similarity between Trustor’s and recommenders’ respective experiences
with the Trustee. Subsequent solutions are, synthetically, extensions of the previous
approaches. For example, Subjective Logic’s (SL) opinions are used to model the degree
of trust as well as the degree of distrust and uncertainty [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Alternatively, SL can be
used to aggregate trust across different recommendation paths and to concatenate trust
along recommendation chains [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>
        Richardson et al. explicitly address belief composition in the Semantic Web
domain [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. They suggest software agents to maintain a table where to store their friends’
beliefs as a group of statements (directed to Semantic Web data) and the agents’
personal trust in their friends. The belief in unknown statements is derived though iterative
merging of beliefs along paths of trust. In that work, differently from ours, there is no
distinction between trust on an entity’s opinion (direct trust) and trust on an entity in
recommending someone else’s opinion (recommendation, or referral, trust). Also, the
notion of context is not visible in that work.
      </p>
      <p>
        O’Hara et al. analyze costs and benefits in different paradigms (optimism,
pessimism, centralized, investigation, and transitivity) of dealing with trust in Semantic
Web [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. They also identify the challenges that have motivated our research. First of
all, trust must be subjective and distributed, and it also needs to be combined with
personal experiences of agents. Secondly, trust should approached as context-dependent,
and it needs a bootstrap procedure when there are not enough transactions to make
firm judgments. Our proposal of using indirect information is an attempted answer to
the bootstrap problem. It must be emphasized that existing approaches to trust
management are able to deal with incomplete knowledge and uncertainty (cf. [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ]), but they
resort mainly on the existence of recommendations. This would be impossible in case
of a completely new Trustee, for example. In this paper, we argue that a Trustor can
benefit from indirect sources to bring the trustworthiness evaluation to a start, and we
propose methods for doing it.
3
      </p>
      <p>
        Baseline: Direct Information Available to the Trustor
This section summarizes the formal definitions of context-aware trust evaluation
functions we introduced in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Additionally, it introduces and discusses an abstract
operational semantics for the trustworthiness evaluation process. The operational semantics
show the dynamics of the trustworthiness evaluation process when the Trustor has
direct access to information characterizing the Trustee. Sections 4 and 5, which capture
the main contribution of this paper, will show how this dynamics changes in reaction to
using indirect knowledge.
3.1
      </p>
      <p>
        From Context-independent to Context-aware Trust Evaluation Functions
In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] we formalized a context-independent trust evaluation function as follows:
trustA,σ : Quality × TValues × 2TValues → TValues
(1)
Here, trustA,σ is A’s subjective function that returns a measure m ∈ TValues of
A’s trust in a Trustee. The trust purpose σ (cf. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]) indicates for what target A should
trust the Trustee e.g., performing a certain task. TValues can be a set of binary values
(e.g., trusted, not trusted), or discrete (e.g., strong trust, weak trust, weak distrust, strong
distrust), or continuous in some form (e.g., measure of a probability or a belief). The
special symbol ⊥ represents an undefined trust measure. In all the examples of this
paper we will assume TValues to be the so called “triangle of opinion” [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]; thus,
a trust value is a triple (b, d, u) ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]3, and it represents the Trustor’s subjective
belief, disbelief and uncertainty respectively (with b + d + u = 1) in the Trustee to be
trustworthiness for the purpose σ.
      </p>
      <p>Function (1) inputs a description of the Trustee in terms of the following parameters:
(a) a set Q ∈ Quality of Trustee’s quality attributes; (b) a trust value m ∈ TValues;
(c) a set M ⊆ TValues of trust values. Set Q models any information that A knows
directly about Trustee, such as the Trustee’s profile. Value m models the Trustee’s
reputation in the viewpoint of A, that is a trust value stored in A’s local space. Set M
represents recommendations, which are Trustee’s trust values based on the viewpoints
of recommenders.</p>
      <p>
        It is recognized that trust changes over time [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. If we assume a discrete time-line,
A’s trust at time i + 1 can differ from A’s trust at time i. With trustiA(B) we represent
the trust that A has in B at time i ≥ 0. It results from calling (1) on the inputs available
to A at time i.
      </p>
      <p>trust0A,σ(B) := trustA,σ(Q0B, ⊥, MB0 )
trustiA,σ(B) := trustA,σ(QiB, miB, M Bi)
wmheaerseurQe,iBm∈iB Q∈uaTlViatlyueasreisthtehequreapliutytaatitotrniboufteBs (orfecBo matmtiemnedait,io⊥niisnaAn’usnvdieewfinpeodinttr)uastt
time i, and M Bi ⊆ TValues are recommendations on B at time i.</p>
      <p>
        Definitions (1) and (2) can be extended to deal with context. Their context-aware
counterpart is written as follows [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]:
ctrustA,σ : Quality × Context × TValues × 2TValues → TValues
(1′)
Here, Context models the set of context attributes, which can concern the Trustor, the
Trustee, and of their interaction. An empty context is denoted with ǫ. Following the
notation used for context-independent trust, with ctrustiA(B) we represent the result
of (1′) called on the inputs, among which the context CAiB, available to A at time i. This
is plugged in the context-independent trust evaluation as follows:
ctrustiA(B) := CAiB ⊙ trustiA(B)
i ≥ 0
(2′)
The operator ⊙, such that ǫ ⊙ m = m, returns a context-aware measure of trust,
given a context-independent trust value m and a context. In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where we assumed
TValues = [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ], the operator ⊙ updates the current trust value by processing each
contextual attributes in sequence. The amount of update depends on the weighting that
the attributes have in Trustor’s viewpoint.
3.2 Inference Rules for Context-aware Trustworthiness Evaluation
Definitions (2) and (2′) describe only partially the evolution of the trustworthiness
evaluation process. Its understanding requires an operational formalization, that we now
give in terms of an inference system. Each step of evaluation is described by an
inference rule with the premises and the conclusion as predicates in the form:
(2)
stating that, for the trust purpose4 σ, A has m degree of context-dependent ∗-trust on
B, when context is C and time is i. Here, “∗” stands for a class of trust. For example, we
distinguish between two classes of trust relation: functional trust and referral trust [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
4 In the following we assume trust always implicitly referring to the same trust purpose σ, and
we omit the subscript σ to make the notation more readable.
The former concerns A’s trust in B performing a task; the latter concerns A’s trust
in B giving a recommendation about someone else doing a task. Functional trust can
easily be reformulated in a context-dependent manner if it concerns A’s trust in B
performing a task (trust purpose) in a certain context C. Referral trust, instead, is left
context-independent: A’s trust in B as a recommender does not depend on any context
attributes. Naturally, this restriction could be relaxed too by letting the recommenders’
contexts have influence on the trustworthiness evaluation. The predicates expressing
context-dependent functional trust and referral trust, respectively, are as follows:
(i,m)
A◦−−−→ B
      </p>
      <p>C</p>
      <p>
        rt;(i,m)
A −−−−−→ B
Martinelli [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] adopts a similar notation for modeling functional and referral trust, but
without any reference to time or context. We also identify two sub-relations of
contextaware functional trust: direct and indirect trust (also pointed out in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]). Direct trust
emerges when the Trustor’s trust is based on at least some personal experiences, that
is, quality attributes and reputation; indirect trust is established when the Trustor
judgement is based on someone else’s opinions only (i.e., recommendations). We write the
predicates expressing direct and indirect functional trust, respectively, as follows:
(3)
(4)
dt;(i,m)
A◦−−−−−→ B
      </p>
      <p>C</p>
      <p>it;(i,m)
A◦−−−−−→ B</p>
      <p>R,C
Here, R is the set of recommenders whose opinion has been considered when
composing m. The semantics of context-aware trust evaluation is defined as an inference
system, as depicted in Figure 1. We now comment each rule separately.</p>
      <p>Rule (5) defines the scheme of our inference system’s axioms. If A’s subjective
evaluation of B’s qualities at time i evaluates to m and if C is the context available at
time i, then A trusts B in measure m′ = C ⊙ m, where the operator ⊙ is that of equation
(2′). Premises in brackets (e.g., [trustA(QiB )] = m) are evaluated at a meta level.</p>
      <p>
        Rules (6) formalize the operational management of recommendations. In particular,
rule (6.a) shows that an indirect trust on B derives from A’s referral trust in D and
from the (direct) trust that D already has in B; rule (6.b) and rule (6.c) show how
to concatenate referral trust along a chain of reference and how to aggregate indirect
trust across multiple paths of recommendations, respectively. Accordingly to [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], rules
(6.a)-(6.c) show that indirect trust always originates from a direct trust at the end of a
chain of references. Referral trust can be computed as stated in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]; we do not give the
specification here. In Section 5 we will show how (6) can be applied in case the Trustor
does not have a measure of referral trust in the available recommenders. Finally, rule
(6.d) formalizes our proposal of dealing with context in recommendations. Context acts
as a filter in favor of those recommendations experienced in contexts that are ≡-related
with the present context C.
      </p>
      <p>Note 1. The semantics of rules (6) are incomplete unless we give the semantics of the
two operators ⊗ and ⊕.</p>
      <p>
        Reasonably, ⊕ must be at least associative and commutative (to be order-independent)
and ⊗ at least associative (along a chain of recommendations). Some authors (e.g.,
[
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]) suggest the use of semirings [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] to deal with a network of recommendations.
Alternative solutions are described in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Throughout the paper we assume trust values
to be Subjective Logic’s opinions, and ⊕ and ⊗ to be operators on opinions called
Bayesian consensus and discounting, respectively [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Given the opinions m, m′, ω,
the opinion m ⊕ m′ reflects m and m′ in a fair and equal way, whilst ω ⊗ m is the
opinion expressing once applied the discount rate w to m.
      </p>
      <p>Note 2. Relation ≡ ⊆ Context × Context needs to be instantiated to complete the
semantics of rules (6) and (7).</p>
      <p>In its simplest form, ≡ interprets as identity: a reputation or recommendation is
adequate only if performed in the same context. Alternatively, ≡ can be an equivalence
relation between contexts—only experience performed within an equivalent context
can contribute to present trust—or ≡ can be a reflexive and symmetric relation
modeling a semantic closeness. For example, if d is a distance between contexts, ≡ can be
d(C, C′) ≤ r, where r is the radius of the neighborhood. In case ≡ is not the identity, it
is reasonable to expect the derived trust to be &lt; m ⊕ m′. Closer study of this modified
version of the rule is left as future work.</p>
      <p>Rules (7) define how to obtain direct functional trust. More specifically, rule (7.a)
models the aggregation of a direct functional trust. Rule (7.b) models our approach of
dealing with reputation as a (direct) past experience that is combined with the present
direct trust. Similarly to the recommendation rules, here context acts as a filter in favor
of those experiences occurred in a ≡-related context. Finally, rule (7.c) states that a past
experience can be used as if it was a new experience presently, at the price of some trust
decay (here represented by the constant discount ω).</p>
      <p>Note 3. In rules (7.b) and (7.c) constraints over time can guide the search strategy in the
past. Each strategy reflects a different attitude in considering reputation (e.g., choosing
a maximal j implies the consideration of most recent experience stored in the reputation
base).</p>
      <p>Rules (8) define functional trust (the goal of our proof system) as a generalization of
direct and indirect trust.</p>
      <p>As a final remark, we observe that our inference systems allows different proof
searches with different result for the same goal. Various implementations and
optimization strategies are possible, but we do not discuss them in this paper.
4</p>
    </sec>
    <sec id="sec-3">
      <title>Indirect Reputation Information</title>
      <p>So far we have implicitly assumed that the Trustee’s quality and contextual attributes
needed in order to evaluate trust are directly available to the Trustor. In real situations,
we may be obliged to relax this assumption. Consider, for example, a situation where
we would like to evaluate the quality of a new scientific conference. Due to its
newness, the conference is not ranked yet. Moreover, we will not find anyone known to us
recommending it either. In such a situation, we basically have only two alternatives: to
give up the evaluation (i.e., blindly trust/distrust), or to look for and rely on indirect
information. For example, we can evaluate the prestige of the publisher of the conference
(RECOMMENDATION-RULES)
A −r−t−;(−i,−m→) D</p>
      <p>D◦−d−t;−(i−−−1−,m−′→) B</p>
      <p>C
A◦−i−t;−(i−,m−−⊗−m−→′) B
{D},C
i &gt; 0
(b)</p>
      <p>A −r−t−;(−i,−m→) D</p>
      <p>D −r−t;−(i−,m−→′) B
A −r−t−;(−i,−m−⊗−m−→′) B
A◦−i−t;−(i−,m−→) B A◦−i−t;−(i−,m−→′) B</p>
      <p>R,C R′,C</p>
      <p>A◦−i−t;−(i−,m−−⊕−m−′→) B</p>
      <p>R∪R′,C
(d)</p>
      <p>A◦−d−t−;(−i,−m→) B</p>
      <p>C</p>
      <p>A◦−i−t;−(i−,m−′→) B [C′ ≡ C]</p>
      <p>R,C′
A◦−d−t−;(−i,−m−⊕−m−→′) B</p>
      <p>C
(a)</p>
      <p>A◦−d−t−;(−i,−m→) B A◦−d−t;−(i−,m−→′) B</p>
      <p>C C
A◦−d−t−;(−i,−m−⊕−m−→′) B</p>
      <p>C
(b)</p>
      <p>A◦−d−t−;(−i,−m→) B</p>
      <p>C</p>
      <p>A◦−d−t−;(−j,−m−→′) B [C′ ≡ C]</p>
      <p>C′
A◦−d−t−;(−i,−m−⊕−m−′→) B</p>
      <p>C
(ADDITIONAL-RULES)
(a)</p>
      <p>A◦−d−t−;(−i,−m→) B</p>
      <p>C
A◦−(−i,−m→) B</p>
      <p>C
j &lt; i</p>
      <p>(c)
(b)</p>
      <p>A◦−i−t;−(i−,m−→) B</p>
      <p>R,C
A◦−(−i,−m→) B</p>
      <p>C</p>
      <p>A◦−d−t−;(−i−−1−,m−→) B</p>
      <p>C
A◦−d−t−;(−i,ω−⊗−−m→) B</p>
      <p>C
i &gt; 0
(5)
(6)
(7)
(8)
proceedings, or we can look for the reputation of its program chairs and committees.
In the case of a new workshop colocated with a conference having a history, we can
also consider the quality of the conference when evaluating the workshop. This section
studies how trust can be evaluated in such situations.
If we come across a Trustee not known to us, that is, we possess no prior reputation
information about the Trustee, how should we go about evaluating the trustworthiness?
One well-known solution in the literature is to ask for recommendations. In Section 5
we discuss recommendations and how to deal with them. Here, instead, we analyze
a complementary solution, namely utilizing direct information of entities known to the
Trustor and “related” to the Trustee (see Figure 2 (a)). Let us consider again the example
about evaluating the trustworthiness of a new scientific conference. Due to the absence
of any information about the conference, we can find it satisfactory to evaluate the
trustworthiness of the conference proceedings publisher, as well as those of the program
chairs and committee members.</p>
      <p>From a formal point of view, the previous solution is expressed by the following
additional (to the INIT-RULE) inference rule (9) where a trust relationship with B in a
certain context C is deduced by a trust relationship with another Trustee “related” to B
in the same context.</p>
      <p>dt;(i,m)
A◦−−−−−→ D</p>
      <p>C</p>
      <p>
        [D ∼ B]
Here, the semantics of the rule requires us to instantiate the relation ∼; it can be an
equivalence relation, or a reflexive and symmetric relation among Trustees that defines
the concept of entity neighborhood. For example, Figure 2 (a) suggests the use of a
measure of closeness among entities (see also Section 5). In this case A ∼ B if and only
if cls(A, B) ≥ th where th is a threshold. In the following, we assume the closeness
metric ranging in [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] where 1 stands for maximal closeness. In (9) we constrained
m′ to be at most m; more solutions are possible, so we left the way to calculate it
unspecified. Reasonably m′ depends on m and on the nature of the relationship between
D and B. For example, m′ = ωs⊗m where the opinion ωs = (s, 1−s, 0) is the discount
that reflects the closeness s = cls(D, B) between D and B.
Here, m′ can be computed either as ⊕kmk (e.g., the consensus among all the trust
values) or as the trust value of the entity, amongst D1, . . . , DN that has maximal closeness
with B.
This section describes the case, where the Trustor wishes to evaluate the trustworthiness
of a Trustee so that albeit knowing the Trustee beforehand, the Trustor has no idea of
how the Trustee will behave in the current context. The Trustor has the possibility of
adopting the same approach as presented above, namely, considering entities which are
close enough to the Trustee and utilize their behavior as a guideline for evaluating the
trustee tr
trustor
cls(tr,Ex)≥th
trustee
      </p>
      <p>C
trusworthiness of the Trustee (Figure 2 (a)). However, it is envisaged that often more
appropriate results can be obtained by considering the Trustee itself, and its behavior in
contexts which are similar enough with the current one (Figure 2 (b)).</p>
      <p>Let us continue with the scientific conference example, but this time from the
conference chair’s point of view. Suppose that the chair is gathering a program committee
for the new conference. Here subject areas of the conference call for papers constitute
the relevant attributes, which guide the conference chair in inviting appropriate
members for the program committee. More specifically, the chair has two major options:
In the case of previous conference chair experience in similar enough conferences, the
chair can go about evaluating the performance of the PC members in those conferences
and make up his mind based on that. Alternatively, the chair can look up other good and
similar enough conferences, and count the most frequent PC members and invite them
to join.</p>
      <p>From a formal point of view, the previous solution is expressed by the following
additional rule (as part of REPUTATION-RULES):</p>
      <p>dt;(i,m)
A◦−−−−−→ B</p>
      <p>C′</p>
      <p>[C′ ≡ C]
Again, ≡ can be an equivalence relation, or a reflexive and symmetric relation among
contexts that defines the concept of context neighborhood. Figure 2(b) suggests one
implementation of relation ≡ based on context similarity; C ≡ C′ when cls(C, C′) is
greater than a threshold th. The inferred trust value m′, here left unspecified, reasonably
depends on m and on the nature of the relationship between C′ and C. For example,
m′ = ωs ⊗ m where ωs = (s, 1 − s, 0) is the discount build from s = cls(C, C′)
between C and C′.
Here, m′ can be computed either as ⊕kmk (e.g., the consensus among all the trust
values) or as the trust value of the context that has maximal similarity with C.</p>
    </sec>
    <sec id="sec-4">
      <title>5 Indirect Recommendation Information</title>
      <p>In rules (6) recommendations carry the context C′ they relate to. Recommendations are
considered only if ≡-related with the current context C. Dealing with recommendations
in this way is possible only if the Trustor knows the recommenders. We now loosen
this requirement. In essence, we allow entities not directly known to the Trustor to
be included in the trustworthiness evaluation process as recommenders. In this case, a
Trustor may deduce indirect trust directly from an entity, if the entity is “close enough”
to the Trustor. In other words, referral trust is approximated by the semantic distance
between entities, with the intuitive meaning that “the closer, the more trusted”. Formally,
this new evaluation step is synthesized by the following variant of rule (6.a):
(10′)</p>
      <p>dt;(i−1,m)
D◦−−−−−−−→ B</p>
      <p>C
it;(i,m′)
A◦−−−−−→ B
{D},C
Here, the calculus of m′ depends on the nature of the relation between A and D; for
example, m′ = ωs ⊗ m where ωs is the discount (s, 1 − s, 0) that reflects the closeness s
between A and D. The relative importance of a given recommender is estimated based
on its relation with the Trustor.</p>
      <p>The closeness between two entities can be grounded on the number of links between
the Trustor and the recommender. Figure 3 depicts this. Note that there can be multiple
parallel paths from the Trustor to the recommender, and they can be taken into account
in differing ways. Only the shortest path can be considered, or alternatively all (or some
reasonable amount of the) paths can be included in the calculation. The underlying idea
is that the more paths there are between the Trustor and the recommender and the shorter
they are, the more relevant the recommender is in the eye of the Trustor. Closeness is
expressed by the following formula:
cls(A, D) = X
k∈I</p>
      <p>1
trustee</p>
      <p>recommender
recommends
trustor
avg(rec x L x E)
links
L={L1,L2,...,Ln}}
where p1, p2, ..., pn ∈ P is the ordered set of alternative parallel paths found between
the Trustor and the recommender so that |p1| indicates the number of links in the
shortest path, |p2| in the second-shortest, and so on.</p>
      <p>Note that there can be multiple paths that have the same amount of links. As a
representative for each set of paths that have an equal amount of links we choose the
path with the smallest index. An ordered set of indexes I is created so that only the
indexes of the representatives ∈ I. If all paths ∈ P have a different amount of links,
then I = {1, . . . , n}. With ♯|pk| (for all k ∈ I) we mark the number of paths, in the
set of equal length paths, represented by pk.</p>
      <p>As an illustrative example, consider again the conference chair as Trustor A and the
proposed PC member’s colleague or boss as recommender D and two paths between
them. One of the paths has one link and the other two. (If only the shortest path was
considered, the closeness metric of the recommender would be 211 = .5). The closeness
metric taking into account both paths is 211 + 312 = 23 ≈ .6·7, and I = {1, 2}. If
we add yet another path to the picture, this· time ·with five links, the closeness metric
is 21·1 + 31·2 + 61·3 = 1183 ≈ .72. Here I = {1, 2, 3}. Now, consider there are three
paths between the Trustor A and Trustee D, two having one link each and one having
five links. The set of indexes becomes I = {1, 3} and the closeness metric becomes
√212·1 + 61·3 ≈ .76</p>
      <p>Two main approaches concerning different link kinds can be distinguished. In the
first of these approaches, all link kinds L1, L2, ..., Ln ∈ L—be they based on
profession, kin, plain acquaintance, and so on—are considered as equally important with
regard to the trustworthiness evaluation. The second, in turn, makes distinctions
between different link kinds and values some over others. For example, with regard to
the program committee membership, professional links can be put more emphasis than
acquaintanceships or family relations.</p>
      <p>To make distinctions between different link kinds ∈ L we add a weighting to them.
Let wpkj ∈ R be a weighting for a link in path pk, where j = 1, . . . , |pk|. The mean
link weight for path pk is defined as</p>
      <p>Wpk =</p>
      <p>P|jp=ki| wpkj .</p>
      <p>
        |pk|
For a set of paths P = p1, p2, . . . , pn, we normalize the path weights Wpk to [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] as
follows:
      </p>
      <p>Wp′k =</p>
      <p>Wpk
max{Wpj | j = 1, . . . , n}
.</p>
      <p>In case there are paths that have an equal amount of links, the mean of their normalized
path weights is used. Finally, the weighted closeness metric wcls(A, D) becomes
wcls(A, D) = X
k∈I</p>
      <p>Wp′k</p>
      <p>Let us continue with the conference example. Suppose we have the same two paths
between the Trustor A and recommender D as earlier. But now the shorter path consists
of one link of type “family relation”, weighted at 2.5, whereas the path with two links
consists of professional links with corresponding weights 4 and 6. The mean link weight
for the shorter path is 2.5, and 5 for the longer path. The normalized link weights are
1
thus 12 and 1, respectively. The weighted closeness metric of these paths is 221 + 312 =
152 ≈ .42. Suppose that at a later time the family member whose relation was· weig·hted
at 2.5 becomes an assistant, and the weight of this relation is 4. In this case the weighted
4
distance metric of these paths becomes 251 + 312 = 1370 ≈ .57.</p>
      <p>· ·
6</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions and Future Work</title>
      <p>We described and formalized means for evaluating trustworthiness in cases where the
Trustor does not possess direct information about the Trustee. We considered both the
absence of direct reputation information, that is, lack of Trustor’s personal experiences
of the Trustee, and the absence of direct recommendation information, that is, lack
of recommendations transmitted to the Trustor by entities known to the Trustor. We
discussed cases where the Trustee/Recommender is unknown to the Trustor across
contexts, meaning that the Trustor has no knowledge whatsoever about the actions taken
by the Trustee/Recommender. In addition, we considered cases where the Trustor has
some knowledge about the Trustee/Recommender, but not in the current context.</p>
      <p>As a solution we propose to use measures of similarities among entities, and among
contexts. Similar entities to the Trustee and a recommender can be used instead, in case
Trustee and/or recommenders are unreachable to the Trustor. Additionally, the Trustor
can search for a Trustee’s reputation in a similar context, if information concerning the
Trustee’s reputation in the present context is missing. Whilst formalizing our approach,
we illustrated its usage via a running example.</p>
      <p>Our future work around the area includes further investigating the relationships
between the Trustor and the Trustee. Research questions are for example comparing
different similarity metrics connecting the Trustor with the Trustee (via multiple paths
containing recommenders and other acquaintances, as well as varying contexts). In
addition, we plan to empirically test and evaluate these metrics.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This work has been supported by the EU-ITEA project “Trust4All”. In addition to the
project consortium and financiers, the authors would like to thank the anonymous
reviewers of the 2nd International Semantic Web Policy Workshop (SWPW’06), as well
as Sami Kauppinen for his useful comments on the final version of the paper.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Shmatikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Talcott</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Reputation-based trust management</article-title>
          .
          <source>Journal of Computer Security</source>
          <volume>13</volume>
          (
          <issue>1</issue>
          ) (
          <year>2005</year>
          )
          <fpage>167</fpage>
          -
          <lpage>190</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salber</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abowd</surname>
          </string-name>
          , G.:
          <article-title>A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications</article-title>
          . Human-Computer
          <source>Interaction (HCI) Journal</source>
          <volume>16</volume>
          ((
          <issue>2-4</issue>
          )) (
          <year>2001</year>
          )
          <fpage>97</fpage>
          -
          <lpage>166</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3] Bre´zillon, P.:
          <article-title>Focusing on context in human-centered computing</article-title>
          .
          <source>IEEE Intelligent Systems</source>
          <volume>18</volume>
          (
          <issue>3</issue>
          ) (
          <year>2003</year>
          )
          <fpage>62</fpage>
          -
          <lpage>66</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Putting web services in context</article-title>
          .
          <source>Electronic Notes in Theoretical Computer Science</source>
          <volume>146</volume>
          (
          <issue>1</issue>
          ) (
          <year>2006</year>
          )
          <fpage>3</fpage>
          -
          <lpage>16</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Guha</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McCool</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fikes</surname>
          </string-name>
          , R.:
          <article-title>Contexts for the semantic web</article-title>
          . In
          <string-name>
            <surname>McIlraith</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
          </string-name>
          , D., van
          <string-name>
            <surname>Harmelen</surname>
          </string-name>
          , F., eds.
          <source>: Proceedings of the International Semantic Web Conference (ISWC</source>
          <year>2004</year>
          ). Volume
          <volume>3298</volume>
          of Lecture Notes in Computer Science., Berlin, Germany, Springer-Verlag (
          <year>2004</year>
          )
          <fpage>32</fpage>
          -
          <lpage>46</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Mostefaoui</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hirsbrunner</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Context aware service provisioning</article-title>
          .
          <source>In: Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS</source>
          <year>2004</year>
          ), IEEE (
          <year>2004</year>
          )
          <fpage>71</fpage>
          -
          <lpage>80</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Robinson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beigl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Trust context spaces: An infrastructure for pervasive security in context-aware environments</article-title>
          . In Hutter, D., et al., eds.: Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14,
          <year>2003</year>
          ,
          <string-name>
            <given-names>Revised</given-names>
            <surname>Papers</surname>
          </string-name>
          . Volume
          <volume>2802</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2004</year>
          )
          <fpage>157</fpage>
          -
          <lpage>172</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Toivonen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Denker</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>The impact of context on the trustworthiness of communication: An ontological approach</article-title>
          . In Golbeck, J.,
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nejdl</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olmedilla</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winslett</surname>
          </string-name>
          , M., eds.
          <source>: Proceedings of the Trust, Security, and Reputation on the Semantic Web workshop, held in conjunction with the 3rd International Semantic Web Conference (ISWC</source>
          <year>2004</year>
          ), Hiroshima, Japan, November 7,
          <year>2004</year>
          . Volume 127 of CEUR Workshop Proceedings., CEUR-WS.org (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Toivonen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lenzini</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uusitalo</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Context-aware trust evaluation functions for dynamic reconfigurable systems</article-title>
          .
          <source>In: Proceedings of the Models of Trust for the Web workshop (MTW'06)</source>
          <article-title>, held in conjunction with the 15th</article-title>
          <source>International World Wide Web Conference (WWW2006) May</source>
          <volume>22</volume>
          ,
          <year>2006</year>
          , Edinburgh, Scotland. CEUR Workshop Proceedings, CEURWS.org (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Blaze</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feigenbaum</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lacy</surname>
          </string-name>
          , J.:
          <article-title>Decentralized trust management</article-title>
          .
          <source>In: Proc. of the 1996 IEEE Symposium on Security and Privicay</source>
          , Oakland, CA, USA,
          <fpage>6</fpage>
          -8
          <source>May</source>
          <year>1996</year>
          , IEEE Computer Society (
          <year>1996</year>
          )
          <fpage>164</fpage>
          -
          <lpage>173</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Russell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Norvig</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Artificial Intelligence:
          <string-name>
            <given-names>A Modern</given-names>
            <surname>Approach.</surname>
          </string-name>
          Prentice-Hall, Englewood Cliffs, NJ (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Hulsebosch</surname>
            ,
            <given-names>R.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salden</surname>
            ,
            <given-names>A.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bargh</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ebben</surname>
            ,
            <given-names>P.W.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reitsma</surname>
          </string-name>
          , J.:
          <article-title>Context sensitive access control</article-title>
          .
          <source>In: Proc. of SACMAT '05: Proceedings of the 10th ACM symposium on Access control models and technologies (SACMAT 05)</source>
          , June 1-3,
          <year>2005</year>
          , Stockholm, Sweden, ACM Press (
          <year>2005</year>
          )
          <fpage>111</fpage>
          -
          <lpage>119</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Bhatti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bertino</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghafoor</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A trust-based context-aware access control model for web-services</article-title>
          .
          <source>Distributed and Parallel Databases</source>
          <volume>18</volume>
          (
          <issue>1</issue>
          ) (
          <year>2005</year>
          )
          <fpage>83</fpage>
          -
          <lpage>105</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>da Almendra</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schwabe</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Real-world trust policies</article-title>
          . In Kagal, L.,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendler</surname>
            ,
            <given-names>J.A</given-names>
          </string-name>
          ., eds.
          <source>: Proc. of the International Semantic Web and Policy Worshop, Nov. 7</source>
          ,
          <issue>2005</issue>
          , Galway, Irland, UMBC eBiquity (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Yahalom</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Trust relationships in secure systems-A distributed authentication perspective</article-title>
          .
          <source>In: Proc of the IEEE Computer Society Symposium on Research in Security and Privacy, May 24-26</source>
          ,
          <year>1993</year>
          , Oakland, California, IEEE Computer Society (
          <year>1993</year>
          )
          <fpage>150</fpage>
          -
          <lpage>163</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Beth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borcherding</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Valuation of trust in open networks</article-title>
          .
          <source>In: Proc. 3rd European Symposium on Research in Computer Security - ESORICS</source>
          , Brighton,
          <string-name>
            <surname>UK</surname>
          </string-name>
          , November 7-
          <issue>9</issue>
          ,
          <year>1994</year>
          . Volume 875 of LNCS., Springer (
          <year>1994</year>
          )
          <fpage>3</fpage>
          -
          <lpage>18</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Jøsang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gray</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinateder</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Simplification and analysis of transitive trust networks</article-title>
          .
          <source>Web Intelligence and Agent Systems Journal</source>
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2006</year>
          )
          <fpage>139</fpage>
          -
          <lpage>161</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M.P.</given-names>
          </string-name>
          :
          <article-title>Trust representation and aggregation in a distributed agent system</article-title>
          .
          <source>In: Proc. of the Twenty-First National Conference on Artificial Intelligence and the Eighteenth Innovative Applications of Artificial Intelligence Conference (AAAI)</source>
          ,
          <source>July 16-20</source>
          ,
          <year>2006</year>
          , Boston, Massachusetts, USA, AAAI Press (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Richardson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Domingos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Trust management for the semantic web</article-title>
          . In Fensel, D.,
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          , J., eds.
          <source>: Proc. of the International Semantic Web Conference (ISWC</source>
          <year>2003</year>
          ), Sanibel Island, FL, USA,
          <fpage>20</fpage>
          -
          <lpage>23</lpage>
          October
          <year>2003</year>
          .
          <article-title>Volume 2870 of LNCS</article-title>
          ., Springer-Verlag (
          <year>2003</year>
          )
          <fpage>351</fpage>
          -
          <lpage>368</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O</given-names>
            <surname>'Hara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Alani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Kalfoglou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Shadbolt</surname>
          </string-name>
          , N.:
          <article-title>Trust strategies for the semantic web</article-title>
          . In volbeck, J.,
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nejdl</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olmedilla</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winslett</surname>
          </string-name>
          , M., eds.
          <source>: Proceedings of the Trust, Security, and Reputation on the Semantic Web workshop, held in conjunction with the 3rd International Semantic Web Conference (ISWC</source>
          <year>2004</year>
          ), Hiroshima, Japan, November 7,
          <year>2004</year>
          . Volume 127 of CEUR Workshop Proceedings., CEUR-WS.org (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Jøsang</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ismail</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boyd</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A survey of trust and reputation systems for online service provision. Decision Support Systems (</article-title>
          <year>2005</year>
          )
          <article-title>(available on line on ScienceDirect</article-title>
          ) in press.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Ruohomaa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutvonen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Trust management survey</article-title>
          .
          <source>In: Proceedings of the iTrust 3rd International Conference on Trust Management</source>
          ,
          <fpage>23</fpage>
          -
          <lpage>26</lpage>
          , May,
          <year>2005</year>
          , Rocquencourt, France. Volume
          <volume>3477</volume>
          of LNCS., Springer-Verlag (
          <year>2005</year>
          )
          <fpage>77</fpage>
          -
          <lpage>92</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Abdul-Rahman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hailes</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Supporting trust in virtual communities</article-title>
          . In Society, I.C., ed.
          <source>: Proc. of the 334rd Hawaii International Conference on System Sciences (HICSS33)</source>
          , (CD/ROM), Maui, Hawaii, 4
          <article-title>-7 January 2000</article-title>
          .
          <article-title>Volume 6 of HICSS Digital Library</article-title>
          ., IEEE Computer Society (
          <year>2000</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Jøsang</surname>
            ,
            <given-names>A.:</given-names>
          </string-name>
          <article-title>A logic for uncertain probabilities</article-title>
          .
          <source>International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3)</source>
          (
          <year>2001</year>
          )
          <fpage>279</fpage>
          -
          <lpage>312</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Grandison</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sloman</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A survey of trust in internet applications</article-title>
          .
          <source>IEEE Communications and Survey, Forth Quarter</source>
          <volume>3</volume>
          (
          <issue>4</issue>
          ) (
          <year>2000</year>
          )
          <fpage>2</fpage>
          -
          <lpage>16</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Martinelli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Towards an integrated formal analysis for security and trust</article-title>
          . In Steffen,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Zavattaro</surname>
          </string-name>
          , G., eds.
          <source>: Proc. of the Formal Methods for Open Object-Based Distributed Systems, 7th IFIP WG 6</source>
          .1 International Conference,
          <string-name>
            <surname>FMOODS</surname>
          </string-name>
          <year>2005</year>
          , Athens, Greece, June 15-17,
          <year>2005</year>
          . Volume 3535 of LNCS., Springer-Verlag (
          <year>2005</year>
          )
          <fpage>115</fpage>
          -
          <lpage>130</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Theodorakopoulos</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baras</surname>
            ,
            <given-names>J.S.:</given-names>
          </string-name>
          <article-title>Trust evaluation in ad-hoc networks</article-title>
          .
          <source>In: Proc. of the 2004 ACM workshop on Wireless security (WiSe</source>
          <year>2004</year>
          ),
          <source>1st October</source>
          <year>2004</year>
          , Philadelphia, PA, USA, New York, NY, USA, ACM Press (
          <year>2004</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Semirings for Soft Comstraint Solving and Programming</article-title>
          . Volume
          <volume>2962</volume>
          <source>of LNCS</source>
          . Springer-Verlag (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>