skip to main content
research-article

Evidence-based trust: A mathematical model geared for multiagent systems

Published:19 November 2010Publication History
Skip Abstract Section

Abstract

An evidence-based account of trust is essential for an appropriate treatment of application-level interactions among autonomous and adaptive parties. Key examples include social networks and service-oriented computing. Existing approaches either ignore evidence or only partially address the twin challenges of mapping evidence to trustworthiness and combining trust reports from imperfectly trusted sources. This article develops a mathematically well-formulated approach that naturally supports discounting and combining evidence-based trust reports.

This article understands an agent Alice's trust in an agent Bob in terms of Alice's certainty in her belief that Bob is trustworthy. Unlike previous approaches, this article formulates certainty in terms of evidence based on a statistical measure defined over a probability distribution of the probability of positive outcomes. This definition supports important mathematical properties ensuring correct results despite conflicting evidence: (1) for a fixed amount of evidence, certainty increases as conflict in the evidence decreases and (2) for a fixed level of conflict, certainty increases as the amount of evidence increases. Moreover, despite a subtle definition of certainty, this work (3) establishes a bijection between evidence and trust spaces, enabling robust combination of trust reports and (4) provides an efficient algorithm for computing this bijection.

References

  1. Abdul-Rahman, A. and Hailes, S. 2000. Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii International Conference on Systems Science. IEEE Computer Society Press. CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Carbone, M., Nielsen, M., and Sassone, V. 2003. Formal model for trust in dynamic networks. In Proceedings of the 1st International Conference on Software Engineering and Formal Methods (SEFM). IEEE Computer Society, CA, 54--63.Google ScholarGoogle Scholar
  3. Casella, G. and Berger, R. L. 1990. Statistical Inference. Duxbury Press, Pacific Grove, CA.Google ScholarGoogle Scholar
  4. Castelfranchi, C., Falcone, R., and Marzo, F. 2006. Being trusted in a social network: Trust as relational capital. In Proceedings of the iTrust Workshop Trust Management. Lecture Notes in Computer Science, vol. 3986. Springer, 19--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dellarocas, C. 2005. Online reputation mechanisms. In Practical Handbook of Internet Computing, M. P. Singh, Ed. Chapman Hall & CRC Press, Baton Rouge, FL. (Chapter 20).Google ScholarGoogle Scholar
  6. Despotovic, Z. and Aberer, K. 2005. Probabilistic prediction of peers' performances in P2P networks. Int. J. Engin. Appl. Artif. Intell. 18, 7, 771--780. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fullam, K. and Barber:, K. S. 2006. Learning trust strategies in reputation exchange networks. In Proceedings of the 5th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS). ACM Press, New York, 1241--1248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fullam, K. and Barber, K. S. 2007. Dynamically learning sources of trust information: Experience vs. reputation. In Proceedings of the 6th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS). IFAAMAS, 1062--1069. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fullam, K., Klos, T. B., Muller, G., Sabater, J., Schlosser, A., Topol, Z., Barber, K. S., Rosenschein, J. S., Vercouter, L., and Voss, M. 2005. A specification of the agent reputation and trust (ART) testbed: Experimentation and competition for trust in agent societies. In Proceedings of the 4th International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS). ACM Press, New York, 512--518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Guha, R., Kumar, R., Raghavan, P., and Tomkins, A. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web. ACM Press, New York, 403--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Halpern, J. Y. and Pucella, R. 2006. A logic for reasoning about evidence. J. Artif. Intell. 26, 1--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hang, C.-W., Wang, Y., and Singh, M. P. 2009. Operators for propagating trust and their evaluation in social networks. In Proceedings of the 8th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS). IFAAMAS, 1025--1032. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Huynh, T. D., Jennings, N. R., and Shadbolt, N. R. 2006. An integrated trust and reputation model for open multi-agent systems. J. Auton. Agents MultiAgent Syst. 13, 2 119--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ioannidis, J. and Keromytis, A. D. 2005. Distributed trust. In Practical Handbook of Internet Computing, M. P. Singh, Ed. Chapman Hall & CRC Press, Baton Rouge, FL. (Chapter 20).Google ScholarGoogle Scholar
  15. Jaynes, E. T. 2003. Probability Theory: The Logic of Science. Cambridge University Press, Cambridge, UK.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jøsang, A. 1998. A subjective metric of authentication. In Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS). Lecture Notes in Computer Science, vol. 1485. Springer, 329--344. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jøsang, A. 2001. A logic for uncertain probabilities. J. Uncert. Fuzz. Knowl.-Based Syst. 9, 279--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Jurca, R. and Faltings, B. 2007. Obtaining reliable feedback for sanctioning reputation mechanisms. J. Artif. Intell. Res. 29, 391--419. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kuter, U. and Golbeck, J. 2007. SUNNY: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22st National Conference on Artificial Intelligence (AAAI). AAAI Press, 1377--1382. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Li, M., Yu, B., Rana, O., and Wang, Z. 2008. Grid service discovery with rough sets. IEEE Trans. Knowl. Data Engin. 20, 6, 851--862. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Maximilien, E. M. and Singh, M. P. 2004. Toward autonomic web services trust and selection. In Proceedings of the 2nd International Conference on Service-Oriented Computing (ICSOC). ACM, New York, 212--221. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Quercia, D., Hailes, S., and Capra, L. 2007. Lightweight distributed trust propagation. In Proceedings of the 7th IEEE International Conference on Data Mining (ICDM). IEEE Computer Society, Los Alamitos, CA, 282--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Reece, S., Rogers, A., Roberts, S., and Jennings, N. R. 2007. Rumours and reputation: Evaluating multi-dimensional trust within a decentralised reputation system. In Proceedings of the 6th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS). IFAAMAS, 1063--1070. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Ristad, E. S. 1995. A natural law of succession. Tech. rep. TR 495-95, Department of Computer Science, Princeton University.Google ScholarGoogle Scholar
  25. Sabater, J. and Sierra, C. 2002. Reputation and social network analysis in multi-agent systems. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). ACM Press, New York, 475--482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Schweitzer, C. M., Carvalho, T. C. M. B., and Ruggiero, W. V. 2006. A distributed mechanism for trust propagation and consolidation in ad hoc networks. In Proceedings of the International Conference on Information Networking, Advances in Data Communications and Wireless Networks (ICOIN). Lecture Notes in Computer Science, vol. 3961. Springer, 156--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sen, S. and Sajja, N. 2002. Robustness of reputation-based trust: Boolean case. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). ACM Press, New York, 288--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Sentz, K. and Ferson, S. 2002. Combination of evidence in Dempster Shafer theory. Tech. rep. TR 0835, Sandia National Laboratories, Albuquerque, NM.Google ScholarGoogle Scholar
  29. Shannon, C. E. 1948. The mathematical theory of communication. Bell Syst. Tech. J. 27, 3, 379--423.Google ScholarGoogle ScholarCross RefCross Ref
  30. Sierra, C. and Debenham, J. K. 2007. Information-based agency. In Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI). MI, 1513--1518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Smith, J. D. H. 2001. Some observations on the concepts of information-theoretic entropy and randomness. Entropy 3, 1--11.Google ScholarGoogle ScholarCross RefCross Ref
  32. Taleb, N. N. 2007. The Black Swan: The Impact of the Highly Probable. Random House, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Teacy, L., Patel, J., Jennings, N., and Luck, M. 2005. Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model. In Proceedings of the 4th International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS). ACM Press, New York, 997--1004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Wang, Y. and Singh, M. P. 2006. Trust representation and aggregation in a distributed agent system. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI). AAAI Press, 1425--1430. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Wang, Y. and Singh, M. P. 2007. Formal trust model for multiagent systems. In Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI). MI, 1551--1556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Weeks, S. 2001. Understanding trust management systems. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, CA, 94--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Weisstein, E. W. 2003. Mean deviation. http://mathworld.wolfram.com/MeanDeviation.html.Google ScholarGoogle Scholar
  38. WoT. 2009. Web of trust. http://www.lysator.liu.se/jc/wotsap/wots2/.Google ScholarGoogle Scholar
  39. Yolum, P. and Singh, M. P. 2003. Emergent properties of referral systems. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS). ACM Press, New York, 592--599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Yu, B. and Singh, M. P. 2002. Distributed reputation management for electronic commerce. Comput. Intell. 18, 4, 535--549.Google ScholarGoogle ScholarCross RefCross Ref
  41. Yu, B. and Singh, M. P. 2003. Detecting deception in reputation management. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS). ACM Press, New York, 73--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Zadeh, L. A. 1979. On the validity of Dempster's rule of combination. Tech. rep. TR 79/24, Department of Computer Science, University of California, Berkeley.Google ScholarGoogle Scholar
  43. Ziegler, C.-N. and Lausen, G. 2004. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE). IEEE Computer Society, CA, 83--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Zimmermann, P. 1995. PGP Source Code and Internals. MIT Press, Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Evidence-based trust: A mathematical model geared for multiagent systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 5, Issue 4
      November 2010
      117 pages
      ISSN:1556-4665
      EISSN:1556-4703
      DOI:10.1145/1867713
      Issue’s Table of Contents

      Copyright © 2010 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 November 2010
      • Accepted: 1 January 2010
      • Revised: 1 November 2008
      • Received: 1 July 2008
      Published in taas Volume 5, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!