Filters








2,908 Hits in 6.0 sec

Reasoning about user trustworthiness with non-binary advice from peers

John Finnson, Robin Cohen, Jie Zhang, Thomas T. Tran, Umar Farooq Minhas
2012 User Modeling, Adaptation, and Personalization  
Typically, trust modeling frameworks have reasoned with binary reports from peers (i.e. trustworthy or not).  ...  In this paper we outline an approach for reasoning about the trustworthiness of users when advice from peers is provided and a majority opinion is central to the overall calculation.  ...  In conclusion, we offer an approach for supporting reasoning about agent trust with advice from peers, whose trustworthiness is then also modeled, when non-numeric reports are provided and have shown the  ... 
dblp:conf/um/FinnsonCZTM12 fatcat:3unrezvn3bhh7pwgdg6kyqyhyy

A trust-based framework for vehicular travel with non-binary reports and its validation via an extensive simulation testbed

Robin Cohen, Jie Zhang, John Finnson, Thomas Tran, Umar F Minhas
2014 Journal of Trust Management  
Distinct from earlier work, we clarify the need for specifying the conditions under which reports are exchanged and for processing non-binary reports, culminating in a proposed algorithm to achieve that  ...  about traffic.  ...  reports from peers whose trustworthiness has been modeled.  ... 
doi:10.1186/s40493-014-0010-0 fatcat:h7k5imeamnfffmj3g2zarb3fse

A trust-based framework for vehicular travel with non-binary reports and its validation via an extensive simulation testbed

Robin Cohen, Jie Zhang, John Finnson, Thomas Tran, Umar F Minhas
2014 Journal of Trust Management  
Distinct from earlier work, we clarify the need for specifying the conditions under which reports are exchanged and for processing non-binary reports, culminating in a proposed algorithm to achieve that  ...  about traffic.  ...  reports from peers whose trustworthiness has been modeled.  ... 
doi:10.1186/preaccept-2109906221111115 fatcat:yu7mhcqthfe2bgfeamkzxlhsb4

How I Learned to be Secure

Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We find evidence of a "digital divide" in security: the advice sources of users with higher skill levels and socioeconomic status differ from those with fewer resources.  ...  -census-representative survey of 526 users, we present an overview of the prevalence of respondents' advice sources, reasons for accepting and rejecting advice from those sources, and the impact of these  ...  How do these beliefs about the usefulness and trustworthiness of digital-security advice, as well as demographic and knowledge factors, impact from where users take advice?  ... 
doi:10.1145/2976749.2978307 dblp:conf/ccs/RedmilesKM16 fatcat:zj6x6ahfr5htjpzmuhfaj37xuu

Axiomatic and Behavioural Trust [chapter]

Clark Thomborson
2010 Lecture Notes in Computer Science  
This congruent extension suggests some ways in which a computerised system might, appropriately, inspire trust in its non-technical users.  ...  Security theorists routinely use a definition of trust which, apparently, has little in common with any of the definitions of trust that appear in the sociological and psychological literature.  ...  The Gov't may accept advice from the Lobbyist, and the client may accept advice from the professional .  ... 
doi:10.1007/978-3-642-13869-0_26 fatcat:65gvru4inrcrnfvtuyvsgiz4bm

Extensive Experimental Validation of a Personalized Approach for Coping with Unfair Ratings in Reputation Systems

Jie Zhang
2011 Journal of Theoretical and Applied Electronic Commerce Research  
The unfair rating problem exists when a buying agent models the trustworthiness of selling agents by also relying on ratings of the sellers from other buyers in electronic marketplaces, that is in a reputation  ...  lack personal experience with sellers, sellers may vary their behavior, and buyers may provide a large number of ratings.  ...  For example, when sellers submit bids, they may do so trying to incorporate reasoning about the trustworthiness of their competitors (as well as their view of their own trustworthiness).  ... 
doi:10.4067/s0718-18762011000300005 fatcat:hjvgyk75tzg75o5psnwgfxhuwq

A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems

Jie Zhang, Murat Sensoy, Robin Cohen
2008 2008 Sixth Annual Conference on Privacy, Security and Trust  
The unfair rating problem exists when a buying agent models the trustworthiness of selling agents by also relying on ratings of the sellers from other buyers.  ...  Different probabilistic approaches have been proposed to cope with this issue. In this paper, we first summarize these approaches and provide a detailed categorization of them.  ...  A buying agent asks advice about a selling agent from an advisor only when it lacks personal experience with the seller.  ... 
doi:10.1109/pst.2008.16 dblp:conf/pst/ZhangSC08 fatcat:r5hfc64f3nefhce6doggsrhkla

A SUPER-AGENT-BASED FRAMEWORK FOR REPUTATION MANAGEMENT AND COMMUNITY FORMATION IN DECENTRALIZED SYSTEMS

Yao Wang, Jie Zhang, Julita Vassileva
2014 Computational intelligence  
We describe this framework in the context of web service selection where agents with more capabilities act as super-agents.  ...  In addition, superagents can maintain communities and build community-based reputation for a service based on the opinions from all community members that have similar interests and judgement criteria  ...  This simplification is reasonable because the total number of trustworthy super-agents providing advice to a consumer agent about a service is not expected to be large.  ... 
doi:10.1111/coin.12026 fatcat:rb4m3t7terhldbn2plfpmym46i

A subjective model for trustworthiness evaluation in the social Internet of Things

Michele Nitti, Roberto Girau, Luigi Atzori, Antonio Iera, Giacomo Morabito
2012 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC)  
We define a subjective models for trustworthiness management starting from the solutions proposed for P2P networks.  ...  Accordingly, each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the friends in common with the potential service providers.  ...  In the rater-based storage approach [9] , each peer stores trustworthiness information about the peers it has observed and can then decrease the possibility of tampering with the reputation information  ... 
doi:10.1109/pimrc.2012.6362662 dblp:conf/pimrc/NittiGAIM12 fatcat:rriqarktqzcwrgtlcf2mszbicm

Trustworthiness Management in the Social Internet of Things

Michele Nitti, Roberto Girau, Luigi Atzori
2014 IEEE Transactions on Knowledge and Data Engineering  
We define two models for trustworthiness management starting from the solutions proposed for P2P and social networks.  ...  Index Terms-Internet of things, social networks, trustworthiness management • The authors are with the  ...  advice.  ... 
doi:10.1109/tkde.2013.105 fatcat:ypnovpuitvehdopuwy65rr5g6m

Reputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy [chapter]

Loubna Mekouar, Youssef Iraqi, Raouf Boutaba
2009 Handbook of Peer-to-Peer Networking  
In reputation-based P2P systems, reputation is used to build trust among peers based on their past transactions and feedbacks from other peers.  ...  Trust is required in file sharing peer-to-peer (P2P) systems to achieve better cooperation among peers and reduce malicious uploads.  ...  Even non malicious peers may advertise a large number of non popular or useless files and still benefit from the system.  ... 
doi:10.1007/978-0-387-09751-0_24 fatcat:6vhpb2ag5veijf6pzoxjkn7p3y

What the health? Information sources and maternal lifestyle behaviours (Preprint)

Emilie Mass Dalhaug, Lene Annette Hagen Haakstad
2018 Interactive Journal of Medical Research  
On the other side, receiving advice from friends and family on weight gain was significantly associated with gaining weight above the IOM guidelines compared with gaining within the guidelines (OR 12.0  ...  trustworthy sources of information during pregnancy.  ...  We also thank Knut Eirik Dalene for assistance with the statistical analysis. Conflict of Interest The authors declare that they have no conflict of interest.  ... 
doi:10.2196/10355 pmid:31278731 pmcid:PMC6640074 fatcat:ykgmvrmmczco5gbfmiimrdri6m

A probabilistic trust model for semantic peer to peer systems

G. H. Nguyen, P. Chatalic, M. C. Rousset
2008 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems - DaMaP '08  
We claim that it is well appropriate to the dynamics of P2P networks and to the freedom of each peer within the network to have different viewpoints towards the peers with which it interacts.  ...  Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos, data, services) based  ...  One may also, as often in real life, take some advice from more experienced peers.  ... 
doi:10.1145/1379350.1379359 dblp:conf/edbt/NguyenCR08 fatcat:bzfoeypxnzftpau3mrkqtnnpgm

Iron Mask: Trust-Preserving Anonymity on the Face of Stigmatization in Social Networking Sites [chapter]

Hamman Samuel, Osmar Zaïane
2017 Lecture Notes in Computer Science  
When users share content about sensitive health topics, such as sexual dysfunction, infertility, or STDs, they may wish to do so anonymously to avoid stigmatization and the associated negative effects  ...  We evaluate the proposed algorithm using datasets from Quora, a question-answering social networking site, and demonstrate the efficacy of our algorithm with satisfactory recall and survey feedback results  ...  It is known that users have been increasingly using the internet for sharing personal experiences and seeking advice about various personal issues, which increases the likelihood of stigmatization from  ... 
doi:10.1007/978-3-319-64483-7_5 fatcat:3kijzjvpvjf4pisd3sful7zmve

Personalized multi-faceted trust modeling to determine trust links in social media and its potential for misinformation management [article]

Alexandre Parmentier, Robin Cohen, Xueguang Ma, Gaurav Sahu, Queenie Chen
2021 arXiv   pre-print
We conclude with a reflection on a particularly vulnerable user base, older adults, in order to illustrate the value of reasoning about groups of users, looking to some future directions for integrating  ...  known preferences with insights gained through data analysis.  ...  to reason about which messages should be shown to which users.  ... 
arXiv:2111.06440v1 fatcat:cgheigrqmjf2rl6n5ly5yudywm
« Previous Showing results 1 — 15 out of 2,908 results