TRUST MODEL FOR HIGH QUALITY RECOMMENDATION

G. Lenzini, N. Sahli, H. Eertink

2008

Abstract

In this paper, we propose a trust management model for decentralised systems that improves the quality of recommendations that members of a virtual community get about the trustworthiness of objects. In our system, as in well-known solutions, members of the community evaluate (i) the functional trust in an item by the analysis of the object’s qualities, past experience, and recommendations and (ii) the referral trust in a recommender by the analysis of the recommender’s qualities and reputation based on personal experience. Moreover, in our trust model, each principal debates with its recommenders about the justifications given to support a recommendation. Thus, the usefulness and the reliability of a recommendation depend also on the strength of the arguments supporting the recommendation. A measure of this strength results after the member has played an argumentation game with the recommender. Therefore, the recommendations that are taken into account are those which better match the member’s profile and way of reasoning. Our trustworthiness evaluation algorithm is context dependent and able to collect both direct and indirect information about trustees. Our trust model is part of an agent-based architecture we propose for decentralised virtual communities. This architecture provides our system with autonomy, unobtrusiveness, user mobility, and context-awareness.

References

  1. Amgoud, L. and Prade, H. (2004). Using arguments for making decisions: a possibilistic logic approach. In Proc. of the 20th conference on Uncertainty in artificial intelligence AUAI'04, Banff, Canada, pages 10- 17. AUAI Press.
  2. Barber, K. S. and Kim, J. (2002). Soft security: Isolating unreliable agents from society. In Proc. of the 5th Workshop on Deception, Fraud and Trust in Agent Societies, AAMAS 2002, July 15-19, Bologna, Italy, pages 8-17. ACM.
  3. Bentahar, J. and Meyer, J. J. C. (2007). A new quantitative trust model for negotiating agents using argumentation. Int. Journal of Computer Science & Applications, 4(2):39-50.
  4. Chesnevar, C. I., Maguitman, A. G., and Simari, G. R. (2006). Argument-based critics and recommenders: a qualitative perspective on user support systems. Data Knowl. Eng., 59(2):293-319.
  5. Garcia, A. and Simari, G. R. (2002). Defeasible logic programming: An argumentative approach. Theory and Practice of Logic Programming, 4(1):95-138.
  6. Jøsang, A., Gray, L., and Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems Journal, 4(2):139-161.
  7. Jøsang, A., Ismail, R., and Boyd, C. (2005). A survey of trust and reputation systems for online service provision. Decision Support Systems. (available on line on ScienceDirect) in press.
  8. Koolwaaij, J., Tarlano, A., Luther, M., Nurmi, P., Mrohs, B., Battestini, A., and Vaidya, R. (2006). Contextwatcher - sharing context information in everyday life. In Proc. of the IASTED Int. Conf. on Web Technologies, Applications, and Services (WTAS2006), Calgary, CA, pages 39-60. ACTA Press.
  9. Lenzini, G., Sahli, N., and Eertink, H. (2008). Agents selecting trustworthy recommenders in mobile virtual communities. In Proc. of the 11th Int. Workshop on Trust in Agent Societies (TRUST08), AAMAS 2008, pages 94-104.
  10. Miller, B., Konstan, J., and Riedl, J. (2004). Toward a personal recommender system. ACM Transactions on Information Systems, 22(3):437-476.
  11. Nute, D. (1994). Defeasible logic. In Gabbay, D., Hogger, C. J., and Robinson, J. A., editors, Handbook of Logic in Artificial Intelligence and Logic Programming, Volume 3: Nonmonotonic Reasoning and Uncertain Reasoning, pages 353-395. Oxford University Press, Oxford.
  12. Prade, H. (2007). A qualitative bipolar argumentative view of trust. In Prade, H. and Subrahmanian, V. S., editors, Proc. of the Int. Conf. on Scalable Uncertainty Management (SUM), Washington, 10-12 Oct 2007, DC, USA, volume 4472 of LNAI, pages 268-276. SpringerVerlag.
  13. Prakken, H. (2006). Formal systems for persuasion dialogue. Knowledge Engineering Review, 21(2):163- 188.
  14. Preece, J. (2000). Online Communities: Designing Usability, Supporting Sociability. John Wiley and Sons.
  15. Quercia, D., Hailes, S., and Capra, L. (2007a). Lightweight distributed trust propagation. In Proc. of the 7th IEEE International Conference on Data Mining, 28-31 Oct 2007, Omaha, NE, USA, pages 282-291. IEEE Computer Society.
  16. Quercia, D., Hailes, S., and Capra, L. (2007b). TRULLO - local trust bootstrapping for ubiquitous devices. In Proc. of the 4th IEEE International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous), Philadelphia, US.
  17. Rao, A. S. and Georgeff, M. (1995). Bdi agents : from theory to practice. In Proc. of the 1st Int. Conference on Multi-Agent Systems (ICMAS95), June 12-14, San Francisco, USA, pages 312-319. AAAI Press.
  18. Rotstein, N. D., García, A. J., and Simari, G. (2007). Reasoning from desires to intentions, a dialectical framework. In Proc. of the 22nd. AAAI Conference on Artificial Intelligence (AAAI 2007), Vancouver, Canada, 22-26 July 2007, pages 136-141. AAAI Press.
  19. Ruohomaa, S. and Kutvonen, L. (2005). Trust management survey. In Proc. of the iTrust 3rd Int. Conference on Trust Management, 23-26, May, 2005, Rocquencourt, France, volume 3477 of LNCS, pages 77-92. Springer-Verlag.
  20. Sabater, J. and Sierra, C. (2002). Social regret, a reputation model based on social relations. SIGecom Exchanges, 3(1):44-56.
  21. Sahli, N., Lenzini, G., and Eertink, H. (2008). Trustworthy agent-based recommender system in a mobile p2p environment. In Proc. of the 7th Int. Workshop on Agents and Peer-to-Peer Computing (AP2PC08), AAMAS 2008, pages 1-11.
  22. Stranders, R., de Weerdt, M., and Witteveen, C. (2007). Fuzzy argumentation for trust. In Sadri, F. and Satoh, K., editors, Proc. of the 8th Work. on Computational Logic in Multi-Agent Systems (CLIMA VIII), 10-11 Sep 2007, Porto, Portugal, LNAI. Springer-Verlag. (in press).
  23. Teacy, W., Patel, J., Jennings, N., and Luck, M. (2005). Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model. In Proc. of the 4th Int. Joint Conf. AAMAS, pages 997-1004.
  24. Toivonen, S., Lenzini, G., and Uusitalo, I. (2006). Contextaware trustworthiness evaluation with indirect knowledge. In Proc. of the 2nd Semantics Web Policy Workshop (SWPW 2006), CEUR Workshop Proceedings. CEUR-WS.org.
Download


Paper Citation


in Harvard Style

Lenzini G., Sahli N. and Eertink H. (2008). TRUST MODEL FOR HIGH QUALITY RECOMMENDATION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008) ISBN 978-989-8111-59-3, pages 518-528. DOI: 10.5220/0001921805180528


in Bibtex Style

@conference{special session on trust in pervasive systems and networks08,
author={G. Lenzini and N. Sahli and H. Eertink},
title={TRUST MODEL FOR HIGH QUALITY RECOMMENDATION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008)},
year={2008},
pages={518-528},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001921805180528},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: Special Session on Trust in Pervasive Systems and Networks, (ICETE 2008)
TI - TRUST MODEL FOR HIGH QUALITY RECOMMENDATION
SN - 978-989-8111-59-3
AU - Lenzini G.
AU - Sahli N.
AU - Eertink H.
PY - 2008
SP - 518
EP - 528
DO - 10.5220/0001921805180528