Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Bounding trust in reputation systems with incomplete information

Gong, Xi and Yu, Ting and Lee, Adam J (2012) Bounding trust in reputation systems with incomplete information. In: Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. ACM, New York, 125 - 132. ISBN 978-1-4503-1091-8

[img] Plain Text (licence)
Available under License : See the attached license file.

Download (1kB)

Abstract

Reputation mechanisms represent a major class of techniques for managing trust in decentralized systems. Quite a few reputation-based trust functions have been proposed in the literature for use in many different application domains. However, in many situations, one cannot always obtain all of the information required by the trust evaluation process. For example, access control restrictions or high collection costs might limit one's ability to gather every possible feedback that could be aggregated. Thus, one key question is how to analytically quantify the quality of reputation scores computed using incomplete information. In this paper, we start a first effort towards answering the above question by studying the following problem: given the existence of certain missing information, what are the worst and best trust scores (i.e., the bounds of trust) a target entity can be assigned by a given reputation function? We formulate this problem based on a general model of reputation systems, and then examine the ability to bound a collection representative trust functions in the literature. We show that most existing trust functions are monotonic in terms of direct missing information about the target of a trust evaluation, which greatly simplifies this process. The problem of trust bounding with the presence of indirect missing information is much more complicated. We show that many well-known trust functions are not monotonic regarding indirect missing information, which means that a case-by-case analysis needs to be conducted for each trust function in order to bound an entity's trust.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: Book Section
Status: Published
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Gong, Xi
Yu, Ting
Lee, Adam Jadamlee@pitt.eduADAMLEE
Date: 2012
Date Type: Publication
Publisher: ACM
Place of Publication: New York
Page Range: 125 - 132
DOI or Unique Handle: 10.1145/2133601.2133617
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Refereed: Yes
ISBN: 978-1-4503-1091-8
Title of Book: Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12
Official URL: http://dx.doi.org/10.1145/2133601.2133617
Date Deposited: 27 Nov 2012 18:42
Last Modified: 25 Aug 2017 05:05
URI: http://d-scholarship.pitt.edu/id/eprint/16472

Metrics

Monthly Views for the past 3 years

Plum Analytics

Altmetric.com


Actions (login required)

View Item View Item