Strategies for incorporating knowledge defects and path length in trust aggregation

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation provides this ability by identifying paths that connect users in the network, and by merging trust opinions expressed by users along these paths. However, as individual trust opinions are not always based on perfect knowledge, and since the quality of a trust estimation propagated along a given path may diminish as its length increases, mechanisms are needed to handle these imperfections. In this paper, we propose a set of trust aggregation operators that take into account knowledge defects and path length. We investigate their properties, and discuss how they may be implemented in practice, taking into account characteristics of the network such as the availability of a central authority, or the need to preserve users' privacy by not publically disclosing their trust information. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Verbiest, N., Cornelis, C., Victor, P., & Herrera-Viedma, E. (2010). Strategies for incorporating knowledge defects and path length in trust aggregation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6098 LNAI, pp. 450–459). https://doi.org/10.1007/978-3-642-13033-5_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free