Trust beyond reputation: A computational trust model based on stereotypes
نویسندگان
چکیده
منابع مشابه
Trust beyond reputation: A computational trust model based on stereotypes
Models of computational trust support users in taking decisions. They are commonly used to guide users’ judgements in online auction sites; or to determine quality of contributions in Web 2.0 sites. However, most existing systems require historical information about the past behavior of the specific agent being judged. In contrast, in real life, to anticipate and to predict a stranger’s actions...
متن کاملA Computational Model of Trust and Reputation
Despite their many advantages, e-Businesses lag behind brick and mortar businesses in several fundamental respects. This paper concerns one of these: relationships based on trust and reputation. Recent studies on simple reputation systems for eBusinesses such as eBay have pointed to the importance of such rating systems for deterring moral hazard and encouraging trusting interactions. However, ...
متن کاملGTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملReputation Based Trust Model in Cloud Computing
Cloud computing offers cost-effective dynamic, scalable and shared services for enterprises from remote data centre. The data stored in cloud storage is increasing day by day dramatically. Though the problem of trusting cloud computing is a highest concern for most enterprises in such a way that trust is widely regarded as one of the top obstacles for the adoption and growth of cloud computing....
متن کاملReputation-based trust management
We propose a formal model for reputation-based trust management. In contrast to credential-based trust management, in our framework an agent’s reputation serves as the basis for trust. For example, an access control policy may consider the agent’s reputation when deciding whether to offer him a license for accessing a protected resource. The underlying semantic model is an event semantics inspi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Commerce Research and Applications
سال: 2013
ISSN: 1567-4223
DOI: 10.1016/j.elerap.2012.07.001