skip to main content
10.1145/1739268.1739270acmotherconferencesArticle/Chapter ViewAbstractPublication PagesubimobConference Proceedingsconference-collections
research-article

L'Elimination de la subjectivité dans la recommandation de confiance

Published: 07 July 2009 Publication History

Abstract

In ubiquitous environments, a party who wishes to make a transaction often requires that it has a certain level of trust in the other party. It is frequently the case that the parties are unknown to each other and thus share no preexisting trust. Trust-based systems enable users to establish trust in unknown users through trust recommendation from known users. For example, Bob may choose to trust an unknown user Carol when he receives a recommendation from his friend Alice that Carol's trustworthiness is 0.8 on the interval [0, 1].
In this paper we highlight the problem that when a trust value is recommended by one user to another it may lose its real meaning due to subjectivity. Bob may regard 0.8 as a very high value of trust but it is possible that Alice perceived this same value as only average. We present a solution for the elimination of subjectivity from trust recommendation. We run experiments to compare our subjectivity-eliminated trust recommendation method with the unmodified method. In a random graph based web of trust with high subjectivity, it is observed that the novel method can give better results up to 95% of the time.

References

[1]
Albert, R., and Barabasi, A.-L. Statistical mechanics of complex networks. Reviews of Modern Physics, 74, January 2002.
[2]
Bollobas, B. Random Graphs. Cambridge University Press, 2001.
[3]
Boon, S. D., and Holmes, J. G. Cooperation and Prosocial Behaviour, chapter The Dynamics of Interpersonal Trust: Resolving Uncertainty in the Face of Risk. Cambridge Univ. Press, 1991.
[4]
Capra, L. Engineering human trust in mobile system collaborations. In Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Newport Beach, CA, USA, 2004.
[5]
Christie, R., and Geis, F. L. Studies in Machiavellianism. Academic Press, New York, 1970.
[6]
Fog, A. Branch prediction in the pentium family. http://x86.org/articles/branch/branchprediction.htm, 2008. Retrieved January 5, 2009.
[7]
Gambetta, D. Trust: Making and Breaking Cooperative Relatioins, chapter Can We Trust Trust?, pages 213--237. Department of Sociology, University of Oxford, 2000.
[8]
Golbeck, J., and Hendler, J. Filmtrust: Movie recommendations using trust in web-based social networks. In Proceedings of the 3rd IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, NV, USA, 2006.
[9]
Griffiths, N. Task delegation using experience based multidimensional trust. In Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, The Netherlands, 2005.
[10]
Hasan, O., Pierson, J.-M., and Brunie, L. Access control for ubiquitous environments based on subjectivity eliminated trust propagation. In Proc. of the 3rd Intl. Symposium on TRUST, in conjunction with the 2008 IEEE/IFIP Intl. Conf. on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 2008.
[11]
Hirsh, H., Basu, C., and Davison, B. D. Learning to personalize. Communications of the ACM, 43(8): 102--106, August 2000.
[12]
Hoffman, K., Zage, D., and Nita-Rotaru, C. A survey of attack and defense techniques for reputation systems. Technical Report CSD TR 07--013, Department of Computer Science, Purdue University, IN, USA, 2007.
[13]
Hung, L. X., Giang, P. D., Zhung, Y., Phuong, T. V., Lee, S., and Lee, Y.-K. A trust-based security architecture for ubiquitous computing systems. In Proc. of the IEEE Intl. Conf. on Intelligence and Security Informatics (ISI 2006), San Diego, CA, USA, May 2006.
[14]
Kagal, L., Finin, T., and Joshi, A. Trust-based security in pervasive computing environments. IEEE Computer, December 2001.
[15]
Kaluscha, E. A. The Importance of Initial Consumer Trust in B2C Electronic Commerce - A Structural Equation Modeling Approach. PhD thesis, Univ. of Klagenfurt, Austria, 2004.
[16]
Langley, P. Adaptive user interfaces and personalization. http://www.isle.org/langley/adapt.html, 2008. Retrieved January 5, 2009.
[17]
Marsh, S. P. Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, Scotland, UK, 1994.
[18]
McCord, M., and Ratnasingam, P. The impact of trust on the technology acceptance model in business to consumer e-commerce. In Proc. of the Intl. Conf. of the Information Resources Mgmt. Association: Innovations Through IT, New Orleans, LA, USA, May 2004.
[19]
McKnight, D. H., Choudhury, V., and Kacmar, C. Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3): 334--359, September 2002.
[20]
Meng, K., Zhang, X., chun Xiao, X., and du Zhang, G. A bi-rating based personalized trust management model for virtual communities. In Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC '06), 2006.
[21]
National Institute of Standards and Technology (NIST). Nist/sematech e-handbook of statistical methods - percentiles. http://www.itl.nist.gov/div898/handbook/prc/section2/prc252.htm, 2008. Retrieved January 5, 2009.
[22]
Resnick, P., and Zeckhauser, R. Trust among strangers in internet transactions: Empirical analysis of ebay's reputation system. The Economics of the Internet and E-Commerce, 11, 2002.
[23]
Rotter, J. B. A new scale for the measurement of interpersonal trust. Journal of Personality, 35(4):651--665, December 1967.
[24]
Rotter, J. B. Generalized expectancies for interpersonal trust. American Psychologist, 26(5): 443--452, 1971.
[25]
Saadi, R., Pierson, J.-M., and Brunie, L. Authentication and access control using trust collaboration in pervasive grid environment. In Proceedings of the International Conference on Grid and Pervasive Computing (GPC 2007), 2007.
[26]
Shin, K., and Yasuda, H. Practical anonymous access control protocols for ubiquitous computing. Journal of Computers, 1(8), December 2006.
[27]
Toivonen, S., Lenzini, G., and Uusitalo, I. Context-aware trust evaluation functions for dynamic reconfigurable systems. In Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), May 2006.
[28]
Watts, D. J., and Strogatz, S. H. Collective dynamics of 'small-world' networks. Nature, 393, June 1998.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
UbiMob '09: Proceedings of the 5th French-Speaking Conference on Mobility and Ubiquity Computing
July 2009
98 pages
ISBN:9781605586229
DOI:10.1145/1739268
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 July 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. social networks
  2. subjectivity
  3. trust
  4. ubiquitous environments

Qualifiers

  • Research-article

Conference

UbiMob'09

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 102
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media