Loading...
Search for: trust-values
0.007 seconds

    Leveraging User-Item Interactions for Trust Prediction

    , M.Sc. Thesis Sharif University of Technology Beigi, Ghazaleh (Author) ; Jalili, Mahdi (Supervisor)
    Abstract
    Trust prediction, the ability to identify how much to trust to allocate an unknown user, is an important prerequisite toward the development of scalable on-line e-commerce communities. We are more likely to purchase an item from a seller on an e-commerce websites such as eBay or Amazon, if our trusted acquaintances have reported positive experiences with that seller in the past. Reviews from trusted users will carry more weight towards the purchasing decision than reviews from anonymous or unknown customers. Thus, these platforms must support computational mechanisms for propagating trust between users. One of the significant challenges in the trust prediction problem is the unprecedented... 

    Trust Inference in Social Networks Using Machine Learning Methods

    , M.Sc. Thesis Sharif University of Technology Dehghan Shirepaz, Samaneh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the main purposes of social networks is to share and exchange information. By rapid growth of social networks in Web and considering that the major part of the interactions occurs between unknown individuals; trust plays an important role in forming the relationship among users. On the other hand, with increase in malicious behavior in online communities, the ability to evaluate the trustworthiness of a person before interacting with him has an important effect on the users’ decisions. Trust inference is an approach to fulfill this requirement. Trust inference mechanism can be described as an algorithm that uses the existing trust relationships between users and propagates trust along... 

    Correctness verification in database outsourcing: A trust-based fake tuples approach

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7671 LNCS , 2012 , Pages 343-351 ; 03029743 (ISSN) ; 9783642351297 (ISBN) Ghasemi, S ; Noferesti, M ; Hadavi, M. A ; Nogoorani, S. D ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward... 

    Towards a model for inferring trust in heterogeneous social networks

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 52-58 ; 9780769531366 (ISBN) Akhoondi, M ; Habibi, J ; Sayyadi, M ; Sharif University of Technology
    2008
    Abstract
    People usually use trust and reputation to cope with uncertainty which exists in the nature and routines. The existing approaches for inferring trust rely on homogeneous relations. In other words, trust is just inferred by a homogeneous relation. In this paper, we present a new model for inferring trust using heterogeneous social networks; we use relation extraction to make a trust relation from the other relation such as friendship and the college relation and then introduced an algorithm to infer trust using extracted relation. In order to get higher performance, we extend relation extraction problem by proposing a genetic algorithm. This algorithm is more scalable, interpretable and... 

    A trust and reputation-based access control model for virtual organizations

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, 13 September 02012 through 14 September 2012 ; September , 2012 , Pages 121-127 ; 9781467323864 (ISBN) Arasteh, M ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control requirements which cannot be satisfied using the traditional access control models. This is basically due to special features of VOs; such as temporality, unknown users, and diverse resources. In this paper, after expressing our assumption on a framework for VOs; the concept of organizational trust and reputation is used to establish an access control model for VOs. Each member of an organization inherits its organizational reputation. Resource providers announce the behavior of their interacting users to their organization manager.... 

    FeedbackTrust: Using feedback effects in trust-based recommendation systems

    , Article 3rd ACM Conference on Recommender Systems, RecSys'09, New York, NY, 23 October 2009 through 25 October 2009 ; 2009 , Pages 269-272 ; 9781605584355 (ISBN) Moghaddam, S ; Jamali, M ; Ester, M ; Habibi, J ; Sharif University of Technology
    Abstract
    With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on the ratings of trusted users in the network. In this paper, we introduce a two dimensional trust model which dynamically gets updated based on users's feedbacks, in contrast to static trust values in current trust models. Explorability measures the extent to which a user can rely on recommendations returned by the social network of a trusted user. Dependability represents the extent to which a user's own ratings can be trusted by users trusting him directly and indirectly. We propose a method to learn the values of... 

    A semantic-aware ontology-based trust model for pervasive computing environments

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 23 June 2008 through 25 June 2008, Oslo ; Volume 5060 LNCS , 2008 , Pages 47-59 ; 03029743 (ISSN) ; 3540692940 (ISBN); 9783540692942 (ISBN) Taherian, M ; Jalili, R ; Amini, M ; Sharif University of Technology
    2008
    Abstract
    Traditionally, to handle security for stand-alone computers and small networks, user authentication and access control mechanisms would be almost enough. However, considering distributed networks such as the Internet and pervasive environments, these kinds of approaches are confronted with flexibility challenges and scalability problems. This is mainly because open environments lack a central control, and users in them are not predetermined. In such ubiquitous computing environments, issues concerning security and trust become crucial. Adding trust to the existing security infrastructures would enhance the security of these environments. Although many trust models are proposed to deal with... 

    PTO: A trust ontology for pervasive environments

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 301-306 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Taherian, M ; Jaili, R ; Amini, M ; Sharif University of Technology
    2008
    Abstract
    Traditionally, to handle security for stand-alone computers and small networks, user authentication and access control mechanisms would be almost enough. However, considering distributed networks such as the Internet and pervasive environments, these kinds of approaches confront with flexibility challenges and scalability problems. This is mainly because of that open environments lack a central control, and users in them are not predetermined, in such ubiquitous computing environments, issues concerning security and trust become crucial. Adding trust to the existing security infrastructures would enhance the security of these environments. Although many trust models have been proposed to...