This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Credibility: How Agents Can Handle Unfair Third-Party Testimonies in Computational Trust Models
September 2010 (vol. 22 no. 9)
pp. 1286-1298
Jianshu Weng, Singapore Management University, Singapore
Zhiqi Shen, Nanyang Technological University, Singapore
Chunyan Miao, Nanyang Technological University, Singapore
Angela Goh Eck Soong, Nanyang Technological University, Singapore
Cyril Leung, The University of British Columbia, Vancouver
Usually, agents within multiagent systems represent different stakeholders that have their own distinct and sometimes conflicting interests and objectives. They would behave in such a way so as to achieve their own objectives, even at the cost of others. Therefore, there are risks in interacting with other agents. A number of computational trust models have been proposed to manage such risk. However, the performance of most computational trust models that rely on third-party recommendations as part of the mechanism to derive trust is easily deteriorated by the presence of unfair testimonies. There have been several attempts to combat the influence of unfair testimonies. Nevertheless, they are either not readily applicable since they require additional information which is not available in realistic settings, or ad hoc as they are tightly coupled with specific trust models. Against this background, a general credibility model is proposed in this paper. Empirical studies have shown that the proposed credibility model is more effective than related work in mitigating the adverse influence of unfair testimonies.

[1] M. He, N.R. Jennings, and H. Leung, "On Agent-Mediated Electronic Commerce," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 985-1003, July/Aug. 2003.
[2] M. Wooldridge, An Introduction to MultiAgent System. John Wiley & Sons, 2002.
[3] N.R. Jennings, "An Agent-Based Approach for Building Complex Software Systems," Comm. ACM, vol. 44, no. 4, pp. 35-41, 2001.
[4] N.R. Jennings, K. Sycara, and M. Wooldridge, "A Roadmap of Agent Research and Development," Autonomous Agents and Multi-Agent Systems, vol. 1, no. 1, pp. 7-38, 1998.
[5] K.S. Barber and J. Kim, "Soft Security: Isolating Unreliable Agents," Proc. Fifth Workshop Deception, Fraud, and Trust in Agent Societies (AAMAS '02), pp. 8-17, 2002.
[6] S.D. Ramchurn, D. Huynh, and N.R. Jennings, "Trust in Multi-Agent Systems," The Knowledge Eng. Rev., vol. 19, no. 1, pp. 1-25, 2004.
[7] A. Jøsang, R. Ismail, and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support System, vol. 43, no. 2, pp. 618-644, 2007.
[8] D.H. McKnight and N.L. Chervany, "The Meanings of Trust," MISRC Working Paper Series, http://misrc.umn.edu/wpaperwp96-04.htm, 1996.
[9] M. Deutsch, "Cooperation and Trust: Some Theoretical Notes," Proc. Nebraska Symp. Motivation, M.R. Jones, ed., pp. 275-319, 1962.
[10] R.S. Burt and M. Knez, "Kinds of Third-Party Effects on Trust," Rationality and Soc., vol. 7, no. 3, pp. 255-292, 1995.
[11] R. Jurca and B. Faltings, "Towards Incentive-Compatible Reputation Management," Trust, Reputation and Security: Theories and Practice, L.K.R. Falcone, S. Barber, and M. Singh, eds., pp. 138-147, Springer-Verlag, 2003.
[12] J. Sabater-Mir, "Trust and Reputation for Agent Societies," PhD dissertation, Inst. d'Investigació en Intel.ligència Artificial, 2003.
[13] A. Whitby, A. Jøsang, and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," Proc. Workshop Trust in Agent Soc. at the Third Int'l Joint Conf. Autonomous Agents and Multi Agent Systems (AAMAS '04), 2004.
[14] A. Jøsang and R. Ismail, "The Beta Reputation System," Proc. 15th Bled Conf. Electronic Commerce, 2002.
[15] B. Yu and M.P. Singh, "Detecting Deception in Reputation Management," Proc. Second Int'l Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS '03), pp. 73-80, 2003.
[16] N. Littlestone and M.K. Warmuth, "The Weighted Majority Algorithm," Information and Computation, vol. 108, no. 2, pp. 212-261, Feb. 1994.
[17] D. Gambetta, "Can We Trust Trust?" Trust: Making and Breaking Cooperative Relations, ch. 13. Basil Blackwell, 1988.
[18] L.A. Goodman and W.H. Kruskal, "Measures of Association for Cross Classifications," J. Am. Statistical Assoc., vol. 49, no. 268, pp. 732-764, 1954.
[19] W.T.L. Teacy, J. Patel, N.R. Jennings, and M. Luck, "TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources," Autonomous Agents and Multi-Agent Systems, vol. 12, no. 2, pp. 183-198, 2006.
[20] B. Yu, M.P. Singh, and K. Sycara, "Developing Trust in Large-Scale Peer-to-Peer Systems," Proc. First IEEE Symp. Multi-Agent Security and Survivability, pp. 1-10, 2004.
[21] P. Resnick and R. Zeckhauser, "Trust among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System," The Economics of the Internet and E-Commerce, M.R. Baye, ed., vol. 11, pp. 127-157, Elsevier, 2002.
[22] E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 207-216, 2002.
[23] B. Alunkal, I. Veljkovic, G. von Laszewski, and K. Aminand, "Reputation-Based Grid Resource Selection," Proc. Workshop Adaptive Grid Middleware (AGridM '03), 2003.
[24] J. Weng, C. Miao, and A. Goh, "Trust-Based Agent Community for Collaborative Recommendation," Proc. 2006 Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS), 2006.
[25] P. Yolum and M.P. Singh, "Engineering Self-Organizing Referral Networks for Trustworthy Service Selection," IEEE Trans. Systems, Man, and Cybernetics, Part A, vol. 35, no. 3, pp. 396-407, May 2005.

Index Terms:
Agent, trust, credibility, unfair testimonies.
Citation:
Jianshu Weng, Zhiqi Shen, Chunyan Miao, Angela Goh Eck Soong, Cyril Leung, "Credibility: How Agents Can Handle Unfair Third-Party Testimonies in Computational Trust Models," IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 9, pp. 1286-1298, Sept. 2010, doi:10.1109/TKDE.2009.138
Usage of this product signifies your acceptance of the Terms of Use.