<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>New Concepts for Trust Propagation in Knowledge Processing Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Markus Jager</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Josef Kung</string-name>
          <email>josef.kuengg@jku.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Application Oriented Knowledge Processing (FAW) Faculty of Engineering and Natural Sciences (TNF) Johannes Kepler University Linz (JKU)</institution>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Everybody has a sense of trusting people or institutions, but how is trust de ned? It always depends on the speci c eld of research and application and is di erent most of the time, which makes it hard to answer this question in general at a computational level. Thinking on knowledge processing systems we have this question twice. How can we de ne and calculate trust values for the input data and, much more challenging, what is the trust value of the output? Meeting this challenge we rst investigate appropriate ways of de ning trust. Within this paper we consider three di erent existing trust models and a self developed one. Then we show ways, how knowledge processing systems can handle these trust values and propagate them through a network of processing steps in a way that the nal results are representative. Therefore we show the propagation of trust with the three existing trust models and with a recently self developed approach, where also precision- and importancevalues are considered. With these models, we can give insights to the topic of de ning and propagating trust in knowledge processing systems.</p>
      </abstract>
      <kwd-group>
        <kwd>Trust</kwd>
        <kwd>Propagation</kwd>
        <kwd>Knowledge Processing Systems</kwd>
        <kwd>Trust Metrics</kwd>
        <kwd>Trust Models</kwd>
        <kwd>Precision</kwd>
        <kwd>Fusion</kwd>
        <kwd>Knowledge</kwd>
        <kwd>Provenance</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The main subject of our research is the topic of how knowledge processing
systems can work with trust values. While going deeper into this research eld,
several questions arise.</p>
      <p>In our work, we try to gure out, how trust can be de ned and
measured and in particular the question of how knowledge processing systems
can deal with trust? Furthermore we investigate the topic of how several
trust values can be combined (in general and in knowledge
processing) and how can trust values be propagated through several steps of
a knowledge processing system?</p>
      <p>We try to give answers to these questions by investigating possibilities of
trust measurement, combination and propagation and try to propose a sound
and all-encompassing way of handling these topics.</p>
      <p>The rest of this paper is structured as following: section 2 de nes common
terminologies and shows related work in our eld of research.</p>
      <p>As the term "trust" has a signi cant high importance in our research, we
dedicated an extra section for de ning trust in knowledge processing - section 3.
In this section, we investigate di erent models of measuring or determining trust.
We brie y introduce our recently developed and already published approach,
where trust- and precision values are handled, processed and propagated by
taking into account several importances in section 4.</p>
      <p>Section 5 examines the question, how trust can be propagated through
knowledge processing systems. Here we cover the di erent trust measuring models,
which were introduced in section 3 and 4 and how trust can be propagated in
these di erent models. Section 6 shows the application of the presented trust
propagation models in a scenario. We close this paper with section 7 by giving
a summary of our work and an outlook for further research.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>In this section we provide some insights into important terms which are relevant
to our work.Furthermore we discuss the fusion of sensor precision values.
2.1</p>
      <p>
        Trust
The meaning of the term "Trust" always depends on the speci c environment
and eld of research and application. In a recent publication about trust, we
state: "The question of 'How can we trust anything/anybody?' is discussed since
the beginning of mankind, but what does this topic mean in context to today's
technology age and especially for the information technology?" [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        The three main types of applicable trust by Rousseau et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] are (1)
trusting beliefs, (2) trusting intentions, and (3) trusting behaviours, where these
three types are connected to each other.
      </p>
      <p>
        Another point of view is the similarity of trusting people and trusting
technology, especially information technology, where the main di erence is within
the application of trust in the speci c area [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Also a very interesting publication about trust in information sources is from
Hertzum et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. They compare the concept of trust between people and virtual
agents, based on two empirical studies. Some relational aspects concerning trust
in the industrial marketing and management sector can be found in "Concerning
trust and information" from Denize et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
2.2
      </p>
      <p>
        Provenance
When we come into trust concerning trusting in data and trusting the sources
of data, the term "Data Provenance" comes into account. It means the origin
and complete processing history of any kind of data. A quite good introduction
and overview can be found in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Several problems concerning data provenance are covered in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Recent research work on provenance can be found in the following literature:
"Trust Evaluation Scheme of Web Data Based on Provenance in Social Semantic
Web Environments" [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and "Transparently tracking provenance information in
distributed data systems" [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        "Research of Data Resource Description Method oriented Provenance" [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
and "A semantic Foundation for Provenance Management" [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] provide more
theoretical and conceptual foundations for the usage of provenance.
2.3
      </p>
      <p>Risk
Risk in general addresses the potential of losing something with a special personal
value. It is also seen as an intentional interaction with uncertainty, where the
outcome is hard to predict.</p>
      <p>
        Rousseau et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] say that "Risk is the perceived probability of loss, as
interpreted by a decision maker [...]. The path-dependent connection between trust
and risk taking arises from a reciprocal relationship: risk creates an opportunity
for trust, which leads to risk taking."
2.4
      </p>
      <p>
        Precision &amp; Multi Data Sensor Fusion
The link on related work of fusion precision values in sensor networks can be
found in our recent publication "Focussing on Precision- and Trust-Propagation
in Knowledge Processing Systems" [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The concluding ndings are, that sensor
fusion is motivated to avoid problems which come from the use of single sensors
(e.g. sensor deprivation, limited spatial and temporal coverage, imprecision and
uncertainty). Fusion processes in the sensor domain are often categorized in three
levels: (1) raw data fusion (low level), (2) feature fusion (medium level), and (3)
decision fusion (high level).
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>De ning Trust in Knowledge Processing</title>
      <p>The main question in our work is, how knowledge processing systems can handle
and work with trust. In this context, the rst step is to nd a de nition of trust,
which is suitable for this scienti c domain. In this section we investigate di erent
applicable models of measuring or determining trust. Therefore we describe three
existing ways: the binary trust model, the probabilistic trust model and the
opinion-space trust model.
3.1</p>
      <p>
        Trust, Certainty and Precision in Knowledge Processing
To the best knowledge of the authors, there is no related work dealing with this
topic directly { neither for processing trust and certainty, nor for the aggregation
of trust, (un)certainty or precision. A good approach for measuring trust is given
in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Recent research on modeling uncertainty is given in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The propagation/fusion of (sensor) precision values has been evaluated in
recent publications, as stated in section 2.4. Some of the investigated
propagation/fusion methods of sensor precision values seem quite promising also for
the application on trust. Nevertheless we focus on models that cover only trust
values, as presented in the following sections.</p>
      <p>Another approach is the refactoring of a trust value from a given precision,
which will be covered in our future work.
3.2</p>
      <p>Binary Trust Model
One of the easiest ways to represent trust values in an understandable and
applicable way is the usage of a binary trust model. In this model the possible
trust values can either be 0 or 1. Therefore the only di erentiation is to fully
trust a subject (trust = 1) or not (trust = 0).</p>
      <p>In our opinion, the model is very hard to apply in a real world domain because
it is very hard to get a trust value of 1 anyway. The de nition of possible states
in the binary trust model, can be seen in formula 1.</p>
      <p>T = 0 _ 1
(1)
Formula 1: Boundaries for the scope of trust in the binary trust model.
3.3</p>
      <p>Probabilistic Trust Model
A very application oriented and realistic way of representing trust is the usage of
a probabilistic trust model. In this model the possible trust values range from 0
to 1 and can, for example be seen as a type of percentage view. The value of not
trusting a subject (trust = 0) and fully trusting a subject (trust = 1 or 100%)
is like in the binary trust model, but here the grading can be more precise, as
there are (theoretically) in nite states of trust between 0 and 1 (or 100%). The
range of possible states of trust in the probabilistic trust model can be seen in
formula 2.</p>
      <p>0</p>
      <p>T
1
(2)
Formula 2: Boundaries for the scope of trust in the probabilistic trust model.
3.4</p>
      <p>
        Opinion-Space Trust Model
A very well developed model for measuring trust values is the opinion-space
model by Audun J sang and S.J. Knapskog from 1998: "A Metric for Trusted
Systems" [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>They introduce an evidence space and an opinion space which are two
equivalent models for representing human beliefs, which can be summarized as trust
in their model. We focus on the opinion-space trust model, which consists of
the values belief b, disbelief d, and uncertainty u. These three values represent
the trust, which is determined. The sum of the three values is always 1, so the
interpretation of trust has to be clari ed for the current domain of application.
The opinion-space trust model can be seen in gure 1.</p>
      <p>b + d + u = 1; fb; d; ug 2 [0; 1]3
(3)
Formula 3: Boundaries for the scope of trust in the opinion-space model.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Speci cation of our Approach</title>
      <p>
        In our recent research, we designed a convenient approach for propagating trust
and precision values through multi-step knowledge processing systems, where
also a factor importance was introduced and considered in the calculation. Our
approach was evaluated and published in several conferences before e.g. in [
        <xref ref-type="bibr" rid="ref10 ref12 ref13">10,
12, 13</xref>
        ] and tested on some arti cial and real world scenarios.
4.1
      </p>
      <p>Principle Idea
Following, we describe the idea of our approach. The main components are:
{ any Source (S), which provides data; there can be multiple sources.
{ any Data (D), which is provided by one source; for our model, every source
usually provides one or more data (elements).
{ any Knowledge Processing System (KPS), which processes data from one or
more sources; each KPS itself produces new data as output.</p>
      <p>The main values in our approach are:
{ Trust value (T) of source (S), which de nes how trustable the source is. The
system has to be seen as a whole environment, hence the trust level for one
source should always be the same.
{ Precision value (P) of data (D), which describes how precise, reliable, con
dent or steady the provided data is.
{ Importance value (I) of one input data (D), decided by the current knowledge
processing system (KPS) for the current step of computation.</p>
      <p>Our approach is sketched in gure 2.
{ Trust T of source S, for each S, has to be greater than 0 and less or equal
than 1, where each value of T for each S has to be the same (if used multiple
times) - a higher value represents higher trust:
0 &lt; T
0 &lt; P
1
1
{ Precision P of data D, for each D, has to be greater than 0 and less or equal
than 1, where each value of P for each D has to be the same (if used multiple
times) - a higher value represents higher precision:
{ Importance I of data D, decided by the knowledge processing system:
0.5 for values which are not very important
1.0 for regular values, where no special impact on importance is given
1.5 for very important values, concerning the current data processing
(4)
(5)
I = 0.5 j 1 j 1.5
(6)</p>
    </sec>
    <sec id="sec-5">
      <title>Propagation of Trust in Knowledge Processing Systems</title>
      <p>In this section we compare di erent methods of fusing and propagating trust
values in knowledge processing systems.
5.1</p>
      <p>Propagating Trust in the Binary Trust Model
As simple the determination of trust in the binary trust model is, as simple is
the propagation of of these values. The only way of a reasonable propagation
of binary trust values, is to take the results of the logical conjunction over all
values. This means, if only one input value is 0, the output is 0 as well. This
can be explained, because it is not justi able to trust an output of a processing
where one input value wasn't trusted.
(7)
(8)
(9)
n
Tnew = ^ Ti
i=1
n
Tnew = Y Ti
i=1
Formula 8: Calculating Tnew over all T1-n in the probabilistic trust model.
5.3</p>
      <p>Propagating Trust in the Opinion-Space Trust Model
In this model, a reasonable way of propagation is to consider all input values in
the opinion-space trust model. This means that the values of belief, disbelief and
uncertainty have to be propagated through the system in a way that the output
can again be identi ed with separate belief, disbelief and uncertainty values
again. We propose a very clear way of propagating the three values through a
knowledge processing system: using the arithmetic mean for all three separated
values to gain the new output values.</p>
      <p>Formula 7: Calculating Tnew over all T1-n in the binary trust model.
5.2</p>
      <p>Propagating Trust in the Probabilistic Trust Model
In the probabilistic trust model, several trust values can be fused by multiplying
them, presupposed the providing sources are independent.</p>
      <p>bnewjdnewjunew = n1 Xn (bijdijui)
i=1
Formula 9: Calculating bdunew over all bdu1 n in the opinion-space trust model.</p>
      <p>Propagating Trust in the Arithmetic Mean Trust Model
This model of propagation is based on our approach, which is presented in
section 4. It calculates the propagated trust value based on the input values from
the sources, weighted with di erent important values, which are decided by the
knowledge processing system itself individually for every step of processing.
The scenario is a complex environment and consists of several knowledge
processing systems, where multiple processing steps are taken and where some output
values are used as new input values. We introduce six sources (S1 to S6) with
di erent trust values (T1 to T6), each providing one or two data with di erent
precision values for multiple knowledge processing systems (KPSA to KPSE),
which weight the di erent importances. All following calculated propagation
models consider the trust values. The usage of the precision- and importance
values is only considered in the arithmetic mean trust model of our approach.</p>
      <p>Propagation with the binary trust model Table 1 shows the initial trust
values in the scenario for propagation with the binary trust model.
By applying formula 7 in the calculations 14 and 15 from the propagation of
trust in the binary trust model, the result is Tnew=0. Here we notice again the
problem of the binary trust model, where only one untrusted input (T6) ruins
the trust in the overall system.</p>
      <p>
        Propagation with the probabilistic trust model Table 2 shows the initial
trust values in the scenario for propagation with the binary trust model.
By applying formula 8 in the calculations 19 and 20 from the propagation of
trust in the probabilistic trust model, the result is Tnew=0.07287 or 7.287%.
Again, we recognize the problem of inputs with "lower" trust values (T4 and
T5) which lead to very low overall trusting outcome, especially in multi step
knowledge processing systems.
Propagation with the opinion-space trust model Table 3 shows the initial
values for belief, disbelief and uncertainty in the scenario for propagation with
the opinion-space trust model.
By applying formula 9 in the calculations 30-35 from the propagation of trust in
the opinion-space trust model, the result is bnew=0:59166, dnew=0:23055, and
dnew=0:177. A very mean and realistic result in particular, when we observe the
well distributed input values. In our opinion, the outcome is very representative.
Propagation with the arithmetic mean trust model Table 4 shows the
initial trust values in the scenario for propagation with the weighted arithmetic
mean trust model.
The calculation steps for this scenario can be found in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The results are
Tnew=0.6625 and Pnew=0.6875, which are very promising and realistic.
      </p>
      <p>D11: P11=0.9
D2 : P2 =0.3
D31: P31=0.8
D32: P32=0.5
D4 : P4 =0.2
D51: P51=1.0
D52: P52=0.7
D6 : P6 =1.0</p>
      <p>KPSA: IA1=0.5
KPSA: IA2=1.0
KPSA: IA3=1.5
KPSB: IB1=1.0
KPSB: IB2=1.5
KPSB: IB3=0.5
KPSP: IP1=1.0
KPSC: IC2=1.0
Because the scenario from the last subsection is completely arti cial, we applied
our approach in the course of a project in the agricultural domain funded by the
European Union, to have comparable computations.</p>
      <p>
        Therefore, we are now referring to the DPM (Disease Pressure Model, used
in the Project CLAFIS [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]) for calculating an accurate daily risk value. This
shows how certain a speci c disease outbreak for a speci c agricultural eld can
be. The DPM uses input values from a FMIS (farm management information
system), which stores information such as this year's and last year's crop as
well as the used tillage method. The needed weather data comes from several
weather stations, which gathers information, such as temperature, relative
humidity, amount of rainfall, and wind speed is gathered. This was a very practical
scenario for the application of our approach, where several di erent trustable
sources where used as input. This application of our approach (the weighted
arithmetic mean trust propagation model) was evaluated by experts from the
agricultural domain and showed very good results. The detailed calculation and
evaluation can be found in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
7
      </p>
    </sec>
    <sec id="sec-6">
      <title>Summary &amp; Outlook</title>
      <p>We addressed the question of how to determine trust values in general and how
knowledge processing systems can handle these values in particular.
Additionally, we investigated several models for the de nition of trust and presented our
recently developed approach. Furthermore we showed ways to propagate trust
values from the investigated trust models through multi step knowledge
processing systems and also a new way of trust propagation from our approach. We gave
example calculations on a scenario with all propagation models and compared
the results.</p>
      <p>Our approach was evaluated in a real world scenario in the frame of a
cooperation project with colleagues from practice. An evaluation was done by
interviewing experts from this scienti c and application domain and the results
were encouraging. Our aim is to develop a complete model for incorporating
trust, precision and importance values into knowledge processing systems. This
approach then could be applied to all other processing systems as well. Such a
system, which could be used in a broad variety of applications, de nitively would
be very useful in practice.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgment</title>
      <p>The research leading to these results, has received funding partly from the
European Union Seventh Framework Programme (FP7/2007-2013) under grant
agreement no.604659 in the project CLAFIS and partly from the federal county
of Upper Austria.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. CLAFIS:
          <article-title>Crop, livestock and forests integrated system for intelligent automation,</article-title>
          <year>2013</year>
          -
          <fpage>2016</fpage>
          .
          <article-title>EU Seventh Framework Programme NMP</article-title>
          .
          <year>2013</year>
          .
          <volume>3</volume>
          .0-
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Peter</given-names>
            <surname>Buneman and Susan B Davidson</surname>
          </string-name>
          .
          <article-title>Data provenance{the foundation of data quality</article-title>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Peter</given-names>
            <surname>Buneman</surname>
          </string-name>
          , Sanjeev Khanna, and
          <string-name>
            <surname>Wang-Chiew Tan</surname>
          </string-name>
          .
          <article-title>Data provenance: Some basic issues</article-title>
          .
          <source>In Sanjiv Kapoor and Sanjiva Prasad</source>
          , editors,
          <source>FST TCS</source>
          <year>2000</year>
          , volume
          <volume>1974</volume>
          <source>of Lecture Notes in Computer Science</source>
          . Springer Berlin Heidelberg,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>P.C.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pistoia</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Ponzo</surname>
          </string-name>
          .
          <article-title>Transparently tracking provenance information in distributed data systems, August 7 2014</article-title>
          . US Patent App.
          <volume>13</volume>
          /761,
          <fpage>916</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Wang</surname>
          </string-name>
          chiew Tan.
          <article-title>Research problems in data provenance</article-title>
          .
          <source>IEEE Data Engineering Bulletin</source>
          ,
          <volume>27</volume>
          :
          <fpage>45</fpage>
          {
          <fpage>52</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Gianpaolo</given-names>
            <surname>Cugola</surname>
          </string-name>
          , Alessandro Margara, Matteo Matteucci, and
          <string-name>
            <given-names>Giordano</given-names>
            <surname>Tamburrelli</surname>
          </string-name>
          .
          <article-title>Introducing uncertainty in complex event processing: model, implementation, and validation</article-title>
          .
          <source>Computing</source>
          ,
          <volume>97</volume>
          (
          <issue>2</issue>
          ):
          <volume>103</volume>
          {
          <fpage>144</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Chenyun</given-names>
            <surname>Dai</surname>
          </string-name>
          , Dan Lin, Elisa
          <string-name>
            <surname>Bertino</surname>
            , and
            <given-names>Murat</given-names>
          </string-name>
          <string-name>
            <surname>Kantarcioglu</surname>
          </string-name>
          .
          <article-title>An approach to evaluate data trustworthiness based on data provenance</article-title>
          .
          <source>In Proceedings of the 5th VLDB Workshop on Secure Data Management, SDM '08</source>
          . Springer-Verlag,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Sara</given-names>
            <surname>Denize</surname>
          </string-name>
          and
          <string-name>
            <given-names>Louise</given-names>
            <surname>Young</surname>
          </string-name>
          .
          <article-title>Concerning trust and information</article-title>
          .
          <source>Industrial Marketing Management</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Morten</given-names>
            <surname>Hertzum</surname>
          </string-name>
          ,
          <string-name>
            <surname>Hans H.K Andersen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Verner Andersen</surname>
          </string-name>
          , and Camilla B Hansen.
          <article-title>Trust in information sources: seeking information from people, documents, and virtual agents</article-title>
          .
          <source>Interacting with Computers</source>
          ,
          <volume>14</volume>
          (
          <issue>5</issue>
          ):
          <volume>575</volume>
          {
          <fpage>599</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Markus</surname>
          </string-name>
          <article-title>Jager and Josef Kung. Introducing the factor importance to trust of sources and certainty of data in knowledge processing systems - a new approach for incorporation and processing</article-title>
          .
          <source>In Proceedings of the 50th HICSS</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Markus</surname>
          </string-name>
          <article-title>Jager, Stefan Nadschlager, and Nhan Trong Phan. Towards the trustworthiness of data, information, knowledge and KPS in smart homes</article-title>
          ,
          <source>IDIMT</source>
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. Markus Jager, Jussi Nikander, Stefan Nadschlager, Van Quoc Phuong Huynh, and
          <article-title>Josef Kung. Focussing on precision- and trust-propagation in knowledge processing systems</article-title>
          .
          <source>4th Future Data and Security Engineering</source>
          . Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Markus</surname>
          </string-name>
          <article-title>Jager, Trong Nhan Phan, Christian Huber, and Josef Kung. Incorporating trust, certainty and importance of information into knowledge processing systems - an approach</article-title>
          .
          <source>3rd Future Data and Security Engineering</source>
          . Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Audun</surname>
            <given-names>J</given-names>
          </string-name>
          sang and
          <string-name>
            <given-names>S.J.</given-names>
            <surname>Knapskog</surname>
          </string-name>
          .
          <article-title>A metric for trusted systems</article-title>
          .
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Alexander</surname>
            <given-names>Karlsson</given-names>
          </string-name>
          , Bjorn Hammarfelt, H. Joe Steinhauer, Goran Falkman, Nasrine Olson, Gustaf Nelhans, and
          <string-name>
            <given-names>Jan</given-names>
            <surname>Nolin</surname>
          </string-name>
          .
          <article-title>Modeling uncertainty in bibliometrics and information retrieval: an information fusion approach</article-title>
          . Scientometrics,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>D. Harrison McKnight</surname>
          </string-name>
          .
          <article-title>Trust in Information Technology. The Blackwell Encyclopedia of Management: Operations management</article-title>
          .
          <source>Blackwell Pub</source>
          .,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>Sudha</given-names>
            <surname>Ram</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jun</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <article-title>A semantic foundation for provenance management</article-title>
          .
          <source>Journal on Data Semantics</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <volume>11</volume>
          {
          <fpage>17</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Denise</surname>
            <given-names>Rousseau</given-names>
          </string-name>
          , Sim Sitkin, Ronald Burt, and
          <string-name>
            <given-names>Colin</given-names>
            <surname>Camerer</surname>
          </string-name>
          .
          <article-title>Not so di erent after all: A cross-discipline view of trust</article-title>
          .
          <source>Academy of Management Review</source>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Sangwon</surname>
            <given-names>Yoon</given-names>
          </string-name>
          , Kitae Choi, Jaeyeol Park, Jongtae Lim, Kyoungsoo Bok, and
          <string-name>
            <given-names>Jaesoo</given-names>
            <surname>Yoo</surname>
          </string-name>
          .
          <article-title>Trust evaluation scheme of web data based on provenance in social semantic web environments</article-title>
          .
          <source>Journal of KIISE</source>
          ,
          <volume>43</volume>
          (
          <issue>1</issue>
          ):
          <volume>106</volume>
          {
          <fpage>118</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Yan-peng Zhao</surname>
          </string-name>
          ,
          <article-title>Chao-fan Dai, and Xiao-yu Zhang. Research of data resource description method oriented provenance</article-title>
          .
          <source>In Proceedings of the 22nd Int. Conf. on Industrial Engineering and Engineering Management</source>
          <year>2015</year>
          . Springer,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>