메뉴 건너뛰기




Volumn 49, Issue 1, 2017, Pages

Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

Author keywords

A.1 introductory and survey ; Analogy; C.2.4 computer communication networks : distributed systems; Design; Management; Online social networks (OSNs); Reliability; Simplification; Trust evaluation; Trust models; Trusted graph

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; GRAPHIC METHODS; NETWORK SECURITY; ONLINE SYSTEMS; QUALITY CONTROL;

EID: 84973896642     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2906151     Document Type: Review
Times cited : (192)

References (161)
  • 3
    • 84889593981 scopus 로고    scopus 로고
    • Mining large streams of user data for personalized recommendations
    • 2012
    • X. Amatriain. 2012. Mining large streams of user data for personalized recommendations. SIGKDD Explorations 14, 2 (2012), 37-48.
    • (2012) SIGKDD Explorations , vol.14 , Issue.2 , pp. 37-48
    • Amatriain, X.1
  • 5
    • 33750998761 scopus 로고    scopus 로고
    • Social balance on networks: The dynamics of friendship and enmity
    • 2006
    • T. Antal, P. L. Krapivsky, and S. Redner. 2006. Social balance on networks: The dynamics of friendship and enmity. Physica D: Nonlinear Phenomena 224 (2006), 130-136.
    • (2006) Physica D: Nonlinear Phenomena , vol.224 , pp. 130-136
    • Antal, T.1    Krapivsky, P.L.2    Redner, S.3
  • 8
    • 70350564215 scopus 로고    scopus 로고
    • The socialtrust framework for trusted social information management: Architecture and algorithms
    • January 2010
    • J. Caverleea, L. Liu, and S. Web. 2010. The socialtrust framework for trusted social information management: Architecture and algorithms. Information Sciences 180(1) (January 2010), 95-112.
    • (2010) Information Sciences , vol.180 , Issue.1 , pp. 95-112
    • Caverleea, J.1    Liu, L.2    Web, S.3
  • 9
    • 84930863652 scopus 로고    scopus 로고
    • k-FuzzyTrust: An efficient trust computation for large-scale mobile social networks using fuzzy implicit social graph
    • 2014
    • S. Chen, G. Wang, and W. Jia. 2014. k-FuzzyTrust: An efficient trust computation for large-scale mobile social networks using fuzzy implicit social graph. Elsevier: Information Sciences. DOI information:10.1016/j.ins.2014.09.058 (2014).
    • (2014) Elsevier: Information Sciences
    • Chen, S.1    Wang, G.2    Jia, W.3
  • 14
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • 2011
    • J. Cho, A. Swami, and I. Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys Tutorials 13, 4 (2011), 562-583.
    • (2011) IEEE Communications Surveys Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 15
    • 84858050885 scopus 로고    scopus 로고
    • Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    • 2012
    • J. Cho, A. Swami, and I. Chen. 2012. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications 35(3) (2012), 1001-1012.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 1001-1012
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 16
    • 0000283893 scopus 로고    scopus 로고
    • Social Influence: Social Norms, Conformity and Compliance
    • (4th ed.). McGraw-Hill
    • B. Cialdini and R. Trost. 1998. Social Influence: Social Norms, Conformity and Compliance. The handbook of social psychology, Vol. 1 and 2 (4th ed.). McGraw-Hill.
    • (1998) The Handbook of Social Psychology , vol.1-2
    • Cialdini, B.1    Trost, R.2
  • 18
    • 85206061973 scopus 로고    scopus 로고
    • Homepage
    • Clever. 2014. Homepage. Retrieved from http://www.research.ibm.com/topics/popups/innovate/hci/html/chow.html.
    • (2014) Clever
  • 23
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multivalued mapping
    • 1967
    • A. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics 38, 2 (1967), 325-339.
    • (1967) Annals of Mathematical Statistics , vol.38 , Issue.2 , pp. 325-339
    • Dempster, A.1
  • 25
    • 68949206252 scopus 로고    scopus 로고
    • An analysis of the exponential decay principle in probabilistic trust models
    • 2009
    • E. ElSalamouny, K. Krukow, and V. Sassone. 2009. An analysis of the exponential decay principle in probabilistic trust models. Theoretical Computer Science 410, 41 (2009), 4067-4084.
    • (2009) Theoretical Computer Science , vol.410 , Issue.41 , pp. 4067-4084
    • ElSalamouny, E.1    Krukow, K.2    Sassone, V.3
  • 27
    • 0004198018 scopus 로고
    • Princeton University Press, Princeton, NJ (1962)
    • L. Ford and R. Fulkerson. 1962. Flows in Networks. Princeton University Press, Princeton, NJ (1962).
    • (1962) Flows in Networks
    • Ford, L.1    Fulkerson, R.2
  • 28
    • 1142268386 scopus 로고    scopus 로고
    • Reflections on the dimensions of trust and trustworthiness among online consumers
    • 2002
    • D. Gefen. 2002. Reflections on the dimensions of trust and trustworthiness among online consumers. SIGMIS Database 33, 3 (2002), 38-53. http://doi.acm.org/10.1145/569905.569910
    • (2002) SIGMIS Database , vol.33 , Issue.3 , pp. 38-53
    • Gefen, D.1
  • 29
    • 84871553108 scopus 로고    scopus 로고
    • The boundaries of trust and risk: The quadratic moderating role of institutional structures
    • 2012
    • D. Gefen and P. A. Pavlou. 2012. The boundaries of trust and risk: The quadratic moderating role of institutional structures. Information Systems Research 23, 3-part-2 (2012), 940-959.
    • (2012) Information Systems Research , vol.23 , Issue.3 , pp. 940-959
    • Gefen, D.1    Pavlou, P.A.2
  • 32
    • 33845467053 scopus 로고    scopus 로고
    • Inferring binary trust relationships in web-based social networks
    • 2006
    • J. Golbeck and J. Hendler. 2006. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology (TOIT) 6, 4 (2006), 497-529.
    • (2006) ACM Transactions on Internet Technology (TOIT) , vol.6 , Issue.4 , pp. 497-529
    • Golbeck, J.1    Hendler, J.2
  • 34
    • 0002572137 scopus 로고
    • Individuals, interpersonal relations and trust
    • D. Gambetta (Ed.). chapter 3 (1988), NewYork: Basil Black
    • D. Good. 1988. Individuals, interpersonal relations and trust. In Trust: Making and Breaking Cooperative Relations, D. Gambetta (Ed.). chapter 3 (1988), 31-48, NewYork: Basil Black.
    • (1988) Trust: Making and Breaking Cooperative Relations , pp. 31-48
    • Good, D.1
  • 35
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • Oct. 2000
    • T. Grandison and M. Sloman. 2000. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3, 4 (Oct. 2000), 2-16. DOI:http://dx.doi.org/10.1109/COMST.2000.5340804
    • (2000) IEEE Communications Surveys and Tutorials , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 36
    • 0000917844 scopus 로고
    • The strength of weak ties: A network theory revisited
    • 1983
    • M. Granovetter. 1983. The strength of weak ties: A network theory revisited. Sociological Theory 1 (1983), 201-233.
    • (1983) Sociological Theory , vol.1 , pp. 201-233
    • Granovetter, M.1
  • 37
    • 4544337627 scopus 로고    scopus 로고
    • Technical Report. Stanford Knowledge Systems Laboratory, Stanford, CA
    • R. Guha. 2003. Open Rating Systems. Technical Report. Stanford Knowledge Systems Laboratory, Stanford, CA.
    • (2003) Open Rating Systems
    • Guha, R.1
  • 40
    • 84875836507 scopus 로고    scopus 로고
    • Shin: Generalized trust propagation with limited evidence
    • 2013
    • C. Hang, Z. Zhang, and M. P. Singh. 2013. Shin: Generalized trust propagation with limited evidence. Computer 46, 3 (2013), 78-85.
    • (2013) Computer , vol.46 , Issue.3 , pp. 78-85
    • Hang, C.1    Zhang, Z.2    Singh, M.P.3
  • 42
    • 85206058059 scopus 로고    scopus 로고
    • Pretty good privacy (PGP)
    • T. Van, C. A. Henk, and S. Jajodia (Eds.). Springer
    • C. Heinrich. 2011. Pretty good privacy (PGP). In Encyclopedia of Cryptography and Security (2nd Ed.), T. Van, C. A. Henk, and S. Jajodia (Eds.). Springer, 955-958.
    • (2011) Encyclopedia of Cryptography and Security (2nd Ed.) , pp. 955-958
    • Heinrich, C.1
  • 43
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • 2009
    • K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. Computer Surveys 42, 1 (2009), 1-31.
    • (2009) Computer Surveys , vol.42 , Issue.1 , pp. 1-31
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 44
    • 33646262580 scopus 로고    scopus 로고
    • Reputation in auctions: Theory and evidence from eBay
    • 2006
    • D. Houser and J. Wooders. 2006. Reputation in auctions: Theory and evidence from eBay. Journal of Economics & Management Strategy 15, 2 (2006), 353-369.
    • (2006) Journal of Economics & Management Strategy , vol.15 , Issue.2 , pp. 353-369
    • Houser, D.1    Wooders, J.2
  • 48
    • 84890115875 scopus 로고    scopus 로고
    • Generating trusted graphs for trust evaluation in online social networks
    • 2014
    • W. Jiang, G. Wang, and J. Wu. 2014. Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems 31 (2014), 48-58.
    • (2014) Future Generation Computer Systems , vol.31 , pp. 48-58
    • Jiang, W.1    Wang, G.2    Wu, J.3
  • 50
    • 84962046506 scopus 로고    scopus 로고
    • Trust evaluation in online social networks using generalized flow
    • 2016
    • W. Jiang, J. Wu, F. Li, G. Wang, and H. Zheng. 2016. Trust evaluation in online social networks using generalized flow. IEEE Transactions on Computers 65(3) (2016), 952-963.
    • (2016) IEEE Transactions on Computers , vol.65 , Issue.3 , pp. 952-963
    • Jiang, W.1    Wu, J.2    Li, F.3    Wang, G.4    Zheng, H.5
  • 52
    • 84948955639 scopus 로고    scopus 로고
    • On selecting recommenders for trust evaluation in online social networks
    • 2015
    • W. Jiang, J. Wu, and G. Wang. 2015. On selecting recommenders for trust evaluation in online social networks. ACM Transactions on Internet Technology (TOIT) 15(4) (2015), Article 14.
    • (2015) ACM Transactions on Internet Technology (TOIT) , vol.15 , Issue.4
    • Jiang, W.1    Wu, J.2    Wang, G.3
  • 54
    • 84963778744 scopus 로고    scopus 로고
    • Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics
    • 2016
    • W. Jiang, J. Wu, G. Wang, and H. Zheng. 2016. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics. IEEE Transactions on Computers 65, 4 (2016), 1211-1224. DOI:10.1109/TC.2015.2444842
    • (2016) IEEE Transactions on Computers , vol.65 , Issue.4 , pp. 1211-1224
    • Jiang, W.1    Wu, J.2    Wang, G.3    Zheng, H.4
  • 57
    • 33744773886 scopus 로고    scopus 로고
    • Simplification and analysis of transitive trust networks
    • 2006
    • A. Jøsang, E. Gray, and M. Kinateder. 2006a. Simplification and analysis of transitive trust networks. Web Intelligence and Agent System 4 (2) (2006), 139-161.
    • (2006) Web Intelligence and Agent System , vol.4 , Issue.2 , pp. 139-161
    • Jøsang, A.1    Gray, E.2    Kinateder, M.3
  • 59
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • 2007
    • A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618-644.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 60
    • 84868142548 scopus 로고    scopus 로고
    • Dempster's rule as seen by little colored balls
    • 2012
    • A. Jøsang and S. Pope. 2012. Dempster's rule as seen by little colored balls. Computational Intelligence 28, 4 (2012), 453-474.
    • (2012) Computational Intelligence , vol.28 , Issue.4 , pp. 453-474
    • Jøsang, A.1    Pope, S.2
  • 61
    • 0014178927 scopus 로고
    • A new scale for the measurement of interpersonal trust
    • 1967
    • B. R. Julian.1967. A new scale for the measurement of interpersonal trust. Journal of Personality 4 (1967), 651-665.
    • (1967) Journal of Personality , vol.4 , pp. 651-665
    • Julian, B.R.1
  • 64
    • 80051470135 scopus 로고    scopus 로고
    • Strategies for predicting local trust based on trust propagation in social networks
    • 2011
    • Y. A. Kim and H. S. Song. 2011. Strategies for predicting local trust based on trust propagation in social networks. Knowledge-Based Systems 24(8) (2011), 1360-1371.
    • (2011) Knowledge-Based Systems , vol.24 , Issue.8 , pp. 1360-1371
    • Kim, Y.A.1    Song, H.S.2
  • 65
    • 84893721621 scopus 로고    scopus 로고
    • Hubs, authorities, and communities
    • 1999
    • J. M. Kleinberg. 1999. Hubs, authorities, and communities. Computer Surveys 31, 4es, Article 5 (1999).
    • (1999) Computer Surveys , vol.31 , Issue.4
    • Kleinberg, J.M.1
  • 66
    • 36349011319 scopus 로고    scopus 로고
    • Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models
    • 2007
    • U. Kuter and J. Golbeck. 2007. Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence (2007), 1377-1382.
    • (2007) Proceedings of the 22nd National Conference on Artificial Intelligence , pp. 1377-1382
    • Kuter, U.1    Golbeck, J.2
  • 68
    • 65349083748 scopus 로고    scopus 로고
    • Fuzzy trust aggregation and personalized trust inference in virtual social networks
    • 2009
    • M. Lesani and N. Montazeri. 2009. Fuzzy trust aggregation and personalized trust inference in virtual social networks. Computational Intelligence 25 (2) (2009), 51-83.
    • (2009) Computational Intelligence , vol.25 , Issue.2 , pp. 51-83
    • Lesani, M.1    Montazeri, N.2
  • 74
    • 77952978241 scopus 로고    scopus 로고
    • Uncertainty modeling and reduction in MANETs
    • 2010
    • F. Li and J. Wu. 2010. Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing 9, 7 (2010), 1035-1048.
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.7 , pp. 1035-1048
    • Li, F.1    Wu, J.2
  • 75
    • 0032119093 scopus 로고    scopus 로고
    • Toward a qualitative search engine
    • 1998
    • Y. Li. 1998. Toward a qualitative search engine. IEEE Internet Computing 2, 4 (1998), 24-29.
    • (1998) IEEE Internet Computing , vol.2 , Issue.4 , pp. 24-29
    • Li, Y.1
  • 78
    • 84878843099 scopus 로고    scopus 로고
    • Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks
    • 2013
    • G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2013b. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing 6(2) (2013), 152-167.
    • (2013) IEEE Transactions on Services Computing , vol.6 , Issue.2 , pp. 152-167
    • Liu, G.1    Wang, Y.2    Orgun, M.A.3    Lim, E.4
  • 81
    • 85206036264 scopus 로고    scopus 로고
    • A generic trust framework for large-scale open systems using machine learning
    • 2013
    • X. Liu, G. Tredan, and A. Datta. 2013a. A generic trust framework for large-scale open systems using machine learning. Computational Intelligence (2013).
    • (2013) Computational Intelligence
    • Liu, X.1    Tredan, G.2    Datta, A.3
  • 87
    • 77950627981 scopus 로고    scopus 로고
    • Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
    • 2010
    • F. G. Marmol and G. M. Perez. 2010. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards and Interfaces 32 (2010), 185-196.
    • (2010) Computer Standards and Interfaces , vol.32 , pp. 185-196
    • Marmol, F.G.1    Perez, G.M.2
  • 88
    • 0003839495 scopus 로고
    • PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994)
    • S. Marsh. 1994. Formalising trust as a computational concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994).
    • (1994) Formalising Trust as a Computational Concept
    • Marsh, S.1
  • 89
    • 29244436370 scopus 로고    scopus 로고
    • Taxonomy of trust: Categorizing P2P reputation systems
    • March 2006
    • S. Marti and H. Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4) (March 2006), 472-484.
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 472-484
    • Marti, S.1    Garcia-Molina, H.2
  • 92
    • 56649092791 scopus 로고    scopus 로고
    • Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers
    • 2007
    • P. Massa and P. Avesani. 2007b. Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers. International Journal on Semantic Web and Information Systems 3 (2007), 39-64.
    • (2007) International Journal on Semantic Web and Information Systems , vol.3 , pp. 39-64
    • Massa, P.1    Avesani, P.2
  • 94
    • 85086528004 scopus 로고    scopus 로고
    • Using trust in recommender systems: An experimental analysis
    • P. Massa and B. Bhattacharjee. 2004. Using trust in recommender systems: An experimental analysis. In Trust Management. Vol. 2995. 221-235.
    • (2004) Trust Management , vol.2995 , pp. 221-235
    • Massa, P.1    Bhattacharjee, B.2
  • 98
    • 0035343905 scopus 로고    scopus 로고
    • The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension
    • 2001
    • G. Möllering. 2001. The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension. Sociology 35, 2 (2001), 403-420.
    • (2001) Sociology , vol.35 , Issue.2 , pp. 403-420
    • Möllering, G.1
  • 100
    • 0035532948 scopus 로고    scopus 로고
    • Trust, social capital, civil society, and democracy
    • 2001
    • K. Newton. 2001. Trust, social capital, civil society, and democracy. International Political Science Review 22, 2 (2001), 201-214.
    • (2001) International Political Science Review , vol.22 , Issue.2 , pp. 201-214
    • Newton, K.1
  • 103
    • 84887477922 scopus 로고    scopus 로고
    • Trust management of services in cloud environments: Obstacles and solutions
    • 2013
    • T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu. 2013. Trust management of services in cloud environments: Obstacles and solutions. Computer Surveys 46(1), 4 (2013), 12:1-12:30.
    • (2013) Computer Surveys , vol.46 , Issue.1-4 , pp. 12:1-12:30
    • Noor, T.H.1    Sheng, Q.Z.2    Zeadally, S.3    Yu, J.4
  • 104
    • 77958015833 scopus 로고    scopus 로고
    • The state of the art in trust and reputation systems: A framework for comparison
    • Aug. 2010
    • Z. Noorian and M. Ulieru. 2010. The state of the art in trust and reputation systems: A framework for comparison. Journal of Theoretical and Applied Electronic Commerce Research 5, 2 (Aug. 2010), 97-117.
    • (2010) Journal of Theoretical and Applied Electronic Commerce Research , vol.5 , Issue.2 , pp. 97-117
    • Noorian, Z.1    Ulieru, M.2
  • 107
  • 109
    • 84878107220 scopus 로고    scopus 로고
    • Computational trust and reputation models for open multi-agent systems: A review
    • 2013
    • I. Pinyol and J. Sabater-Mir. 2013. Computational trust and reputation models for open multi-agent systems: A review. Artificial Intelligence Review 40, 1 (2013), 1-25.
    • (2013) Artificial Intelligence Review , vol.40 , Issue.1 , pp. 1-25
    • Pinyol, I.1    Sabater-Mir, J.2
  • 111
    • 84873157193 scopus 로고    scopus 로고
    • Online social networks and social network services: A technical survey
    • M. Ilyas and H. Mouftah (Eds.). CRC Press
    • H. Quan, J. Wu, and Y. Shi. 2011. Online social networks and social network services: A technical survey. Handbook of Pervasive Communication, M. Ilyas and H. Mouftah (Eds.). CRC Press.
    • (2011) Handbook of Pervasive Communication
    • Quan, H.1    Wu, J.2    Shi, Y.3
  • 112
    • 77955270883 scopus 로고    scopus 로고
    • Social influence
    • A. S. R. Manstead, M. Hewstone (Eds.), Blackwell Publishing
    • L. Rashotte. 2007. Social influence. A. S. R. Manstead, M. Hewstone (Eds.), The Blackwell Encyclopedia of Social Psychology, Blackwell Publishing, 562-563.
    • (2007) The Blackwell Encyclopedia of Social Psychology , pp. 562-563
    • Rashotte, L.1
  • 114
    • 34547637688 scopus 로고    scopus 로고
    • Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system
    • M. R. Baye (Ed.). JAI Press Inc.
    • P. Resnick and R. Zeckhauser. 2002. Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system. In The Economics of the Internet and E-Commerce, M. R. Baye (Ed.). Vol. 11. JAI Press Inc., 127-157.
    • (2002) The Economics of the Internet and E-Commerce , vol.11 , pp. 127-157
    • Resnick, P.1    Zeckhauser, R.2
  • 118
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • 2005
    • J. Sabater and C. Sierra. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24(1) (2005), 33-60.
    • (2005) Artificial Intelligence Review , vol.24 , Issue.1 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 121
    • 84885211259 scopus 로고    scopus 로고
    • A survey of trust in social networks
    • 2013
    • W. Sherchan, S. Nepal, and C. Paris. 2013. A survey of trust in social networks. Computer Surveys 45, 4 (2013), 47:1-47:33.
    • (2013) Computer Surveys , vol.45 , Issue.4 , pp. 47:1-47:33
    • Sherchan, W.1    Nepal, S.2    Paris, C.3
  • 125
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • 2006
    • Y. Sun, W. Yu, Z. Han, and K. Liu. 2006b. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 305-317.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Liu, K.4
  • 126
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • 2006
    • Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu. 2006a. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of IEEE INFOCOM (2006), 1-13.
    • (2006) Proceedings of IEEE INFOCOM , pp. 1-13
    • Sun, Y.L.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 131
    • 0344280869 scopus 로고    scopus 로고
    • Beyond recommender systems: Helping people help each other
    • L. Terveen and W. Hill. 2001. Beyond recommender systems: Helping people help each other. In HCI in the New Millennium. 487-509.
    • (2001) HCI in the New Millennium , pp. 487-509
    • Terveen, L.1    Hill, W.2
  • 135
    • 85206049870 scopus 로고    scopus 로고
    • 2014
    • Trustlet. 2014. Index of Advogato Dataset: http://www.trustlet.org/datasets/advogato/. (2014).
    • (2014) Index of Advogato Dataset
  • 137
    • 84906079432 scopus 로고    scopus 로고
    • Fine-grained feature-based social influence evaluation in online social networks
    • 2014
    • G. Wang, W. Jiang, J. Wu, and Z. Xiong. 2014. Fine-grained feature-based social influence evaluation in online social networks. IEEE Transactions on Parallel and Distributed Systems 25, 9 (2014), 2286-2296.
    • (2014) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.9 , pp. 2286-2296
    • Wang, G.1    Jiang, W.2    Wu, J.3    Xiong, Z.4
  • 138
    • 79958065264 scopus 로고    scopus 로고
    • FlowTrust: Trust inference with network flows
    • 2011
    • G. Wang and J. Wu. 2011a. FlowTrust: Trust inference with network flows. Frontiers of Computer Science in China 5(2) (2011), 181-194.
    • (2011) Frontiers of Computer Science in China , vol.5 , Issue.2 , pp. 181-194
    • Wang, G.1    Wu, J.2
  • 139
    • 79951851519 scopus 로고    scopus 로고
    • Multi-dimensional evidence-based trust management with multi-trusted paths
    • 2011
    • G. Wang and J. Wu. 2011b. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems (Elsevier) 27(5) (2011), 529-538.
    • (2011) Future Generation Computer Systems (Elsevier) , vol.27 , Issue.5 , pp. 529-538
    • Wang, G.1    Wu, J.2
  • 142
    • 85206048421 scopus 로고    scopus 로고
    • Trust mechanisms and their applications in MANETs
    • J. Wu. 2009. Trust mechanisms and their applications in MANETs. Keynote speech in IEEE TrustCom'09.
    • (2009) Keynote Speech in IEEE TrustCom'09
    • Wu, J.1
  • 149
    • 84874253276 scopus 로고    scopus 로고
    • Subgraph extraction for trust inference in social networks
    • IEEE Computer Society
    • Y. Yao, H. Tong, F. Xu, and J. Lu. 2012b. Subgraph extraction for trust inference in social networks. In ASONAM. IEEE Computer Society, 163-170.
    • (2012) ASONAM , pp. 163-170
    • Yao, Y.1    Tong, H.2    Xu, F.3    Lu, J.4
  • 155
    • 77956948315 scopus 로고    scopus 로고
    • A survey of trust and reputation management systems in wireless communications
    • 2010
    • H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato. 2010. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10) (2010), 1755-1772.
    • (2010) Proceedings of the IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Yu, H.1    Shen, Z.2    Miao, C.3    Leung, C.4    Niyato, D.5
  • 156
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • (2012), Special Issue on Trusted Computing and Communications
    • Y. Yu, K. Li, W. Zhou, and P. Li. 2012. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35, 3 (2012), 867-880. Special Issue on Trusted Computing and Communications.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 157
    • 77549084183 scopus 로고    scopus 로고
    • Improved trust-aware recommender system using smallworldness of trust networks
    • April (April 2010)
    • W. Yuan, D. Guan, and Y.-K. Lee. April 2010. Improved trust-aware recommender system using smallworldness of trust networks. Knowledge-Based Systems 23 (April 2010), 232-238.
    • (2010) Knowledge-Based Systems , vol.23 , pp. 232-238
    • Yuan, W.1    Guan, D.2    Lee, Y.-K.3
  • 160
    • 29844444091 scopus 로고    scopus 로고
    • Propagation models for trust and distrust in social networks
    • 2005
    • C. Ziegler and G. Lausen. 2005. Propagation models for trust and distrust in social networks. Information Systems Frontiers 7, 4-5 (2005), 337-358.
    • (2005) Information Systems Frontiers , vol.7 , Issue.4-5 , pp. 337-358
    • Ziegler, C.1    Lausen, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.