Bounding trust under uncertain topology information in reputation-based trust systems

Xi Gong, Ting Yu, Adam J. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Reputation-based trust evaluation relies on the feedback of an entity's past interactions to estimate its trustworthiness for future behavior. Past work commonly assumes that all the information needed in trust evaluation is always available, which, unfortunately, often does not hold in practice, due to a variety of reasons. A key problem is thus to study the quality of trust evaluation in the presence of incomplete information. In this paper, we investigate techniques to bound the output of a trust evaluation under uncertain graph topologies of a reputation system. We present a rigorous formalism of the problem, and establish connections between uncertain topology information and missing feedback information through a property called edge reducibility. We show that the trust bounding problem can be efficiently solved if a trust function is edge reducible.

Original languageEnglish
Title of host publicationWeb-Age Information Management - 14th International Conference, WAIM 2013, Proceedings
PublisherSpringer Verlag
Pages643-648
Number of pages6
ISBN (Print)9783642385612
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event14th International Conference on Web-Age Information Management, WAIM 2013 - Beidaihe, China
Duration: 14 Jun 201316 Jun 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7923 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Web-Age Information Management, WAIM 2013
Country/TerritoryChina
CityBeidaihe
Period14/06/1316/06/13

Keywords

  • Reputation
  • Trust Bounding
  • Trust management

Fingerprint

Dive into the research topics of 'Bounding trust under uncertain topology information in reputation-based trust systems'. Together they form a unique fingerprint.

Cite this