The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2011 vol.4)
pp: 257-271
Yan Wang , Macquarie University, Sydney
Lei Li , Macquarie University, Sydney
In most existing trust evaluation studies, a single value is computed based on the ratings given to a service provider to indicate the current trust level. This is useful but may not represent the trust features well under certain circumstances. Alternatively, a complete set of trust ratings can be transferred to a service client for local trust calculation. But this obviously creates a big overhead in communication as the data set usually has a large size covering a long service history. In this paper, we present a novel two-dimensional aggregation approach consisting of both vertical and horizontal aggregations of trust ratings. The vertical aggregation calculates the aggregated rating representing the trust level for the services delivered in a small time period. The horizontal aggregation applies our proposed optimal algorithm to determine the minimal number of time intervals, within each of which a trust vector with three values can be calculated to represent all the ratings in that time interval and retain the trust features well. Hence, a small set of trust vectors can represent a large set of trust ratings. This is significant for large-scale trust rating transmission and trust evaluation. Experiments have been conducted to illustrate the properties of our proposed approach.
Service trust, reputation-based trust, trust evaluation, trust rating aggregation, trust vector.
Yan Wang, Lei Li, "Two-Dimensional Trust Rating Aggregations in Service-Oriented Applications", IEEE Transactions on Services Computing, vol.4, no. 4, pp. 257-271, October-December 2011, doi:10.1109/TSC.2010.39
[1] eBay, http:/, 2011.
[2] GNutella, http:/, 2009.
[3] World Wide Web Consortium (W3C), http:/, 2011.
[4] E. Damiani, S.D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. ACM Conf. Computer and Comm. Security (CCS '02), pp. 207-216, 2002.
[5] E. Damiani, S.D.C. di Vimercati, P. Samarati, and M. Viviani, "A Wowa-Based Aggregation Technique on Trust Values Connected to Metadata," Electronic Notes in Theoretical Computer Science, vol. 157, no. 3, pp. 131-142, 2006.
[6] E.W. Dijkstra, "A Note on Two Problems in Connexion with Graphs," Numerische Mathematik, vol. 1, pp. 269-271, 1959.
[7] N. Griffiths, "Task Delegation Using Experience-Based Multi-Dimensional Trust," Proc. Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS '05), pp. 489-496, 2005.
[8] J. Han and M. Kamber, Data Mining: Concepts and Techniques. Morgan Kaufmann, 2000.
[9] W.W. Hines, D.C. Montgomery, D.M. Goldsman, and C.M. Borror, Probability and Statistics in Engineering. John Wiley & Sons, 2003.
[10] N. Hu, P.A. Pavlou, and J. Zhang, "Can Online Reviews Reveal a Product's True Quality?: Empirical Findings and Analytical Modeling of Online Word-of-Mouth Communication," Proc. ACM Conf. Electronic Commerce (EC '06), pp. 324-330, 2006.
[11] T.D. Huynh, N.R. Jennings, and N.R. Shadbolt, "An Integrated Trust and Reputation Model for Open Multi-Agent Systems," Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, pp. 119-154, 2006.
[12] A. Jøsang, "Subjective Evidential Reasoning," Proc. Int'l Conf. Information Processing and Management of Uncertainty (IPMU '02), 2002.
[13] A. Jøsang, R. Ismail, and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
[14] R. Jurca and B. Faltings, "Minimum Payments that Reward Honest Reputation Feedback," Proc. ACM Conf. Electronic Commerce (EC '06), pp. 190-199, 2006.
[15] R. Jurca and B. Faltings, "Collusion-Resistant, Incentive-Compatible Feedback Payments," Proc. ACM Conf. Electronic Commerce (EC '07), pp. 200-209, 2007.
[16] S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, "The Eigentrust Algorithm for Reputation Management in P2P Networks," Proc. Int'l Conf. World Wide Web (WWW '03), pp. 640-651, 2003.
[17] D.H. Knight and N.L. Chervany, "The Meaning of Trust," Technical Report WP9604, Management Information Systems Research Center, Univ. of Minnesota, 1996.
[18] R.F. Korte, "Biases in Decision Making and Implications for Human Resource Development," Advances in Developing Human Resources, vol. 5, no. 4, pp. 440-457, 2003.
[19] L. Li and Y. Wang, "A Trust Vector Approach to Service-Oriented Applications," Proc. Int'l Conf. Web Services (ICWS '08), pp. 270-277, 2008.
[20] L. Li and Y. Wang, "Subjective Trust Inference in Composite Services," Proc. AAAI Conf. Artificial Intelligence (AAAI '10), July 2010.
[21] L. Li, Y. Wang, and V. Varadharajan, "Fuzzy Regression Based Trust Prediction in Service-Oriented Applications," Proc. Int'l Conf. Autonomic and Trusted Computing (ATC '09), pp. 221-235, 2009.
[22] K.-J. Lin, H. Lu, T. Yu, and C. en Tai, "A Reputation and Trust Management Broker Framework for Web Applications," Proc. IEEE Int'l Conf. e-Technology, e-Commerce and e-Service (EEE '05), pp. 262-269, 2005.
[23] M.P. Papazoglou, "Web Services and Business Transactions," World Wide Web, vol. 6, no. 1, pp. 49-91, 2003.
[24] I. Ray and S. Chakraborty, "A Vector Model of Trust for Developing Trustworthy Systems," Proc. Ninth European Symp. Research Computer Security, pp. 260-275, 2004.
[25] W.T.L. Teacy, J. Patel, N.R. Jennings, and M. Luck, "Travos: Trust and Reputation in the Context of Inaccurate Information Sources," Autonomous Agents and Multi-Agent Systems, vol. 12, no. 2, pp. 183-198, 2006.
[26] L.-H. Vu, M. Hauswirth, and K. Aberer, "QoS-Based Service Selection and Ranking with Trust and Reputation Management," Proc. Cooperative Information System Conf. (CoopIS '05), pp. 466-483, 2005.
[27] Y. Wang and E.-P. Lim, "The Evaluation of Situational Transaction Trust in E-Service Environments," Proc. IEEE Int'l Conf. e-Business Eng. (ICEBE '08), pp. 265-272, 2008.
[28] Y. Wang and K.-J. Lin, "Reputation-Oriented Trustworthy Computing in E-Commerce Environments," IEEE Internet Computing, vol. 12, no. 4, pp. 55-59, July/Aug. 2008.
[29] Y. Wang, K.-J. Lin, D.S. Wong, and V. Varadharajan, "Trust Management towards Service-Oriented Applications," Service Oriented Computing and Applications, vol. 3, no. 2, pp. 129-146, 2009.
[30] Y. Wang and V. Varadharajan, "Interaction Trust Evaluation in Decentralized Environments," Proc. Int'l Conf. E-Commerce and Web Technologies (EC-Web '04), pp. 144-153, 2004.
[31] L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, July 2004.
[32] B. Yu and M.P. Singh, "An Evidential Model of Distributed Reputation Management," Proc. Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS '02), pp. 294-301, 2002.
[33] G. Zacharia and P. Maes, "Trust Management through Reputation Mechanisms," Applied Artificial Intelligence, vol. 14, no. 9, pp. 881-907, 2000.
[34] H. Zhao and X. Li, "Vectortrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks," Proc. 18th Int'l Conf. Computer Comm. and Networks, pp. 1-6, 2009.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool