Table 6: H
8
’s trustees depending on view and context.
View Contextual Restriction Trustees
global H4,H7,H1,H2,H6,H3,H5
global activity.type=swimpl. H1,H2,H3
global human.role=dev H4,H7,H1,H2
team human.team=team
A
H1,H2,H3
indiv. human.team=team
A
H2,H1,H3
teracted in the past, while others are out of scope.
Note that the order of trustees for H
8
’s individual view
and team
A
’s team view are different, though contex-
tual restrictions are set to take into account only hu-
mans from team
A
in both cases. This is due to the
fact that H
8
’s trust in H
2
is quite high (0.9), while the
trust of other team members in H
2
is only medium
(0.6 on average), thus on team
A
’s view H
2
is ranked
lower than H
1
.
8 CONCLUSIONS AND FUTURE
WORK
In this paper we have discussed the role of trust and
related concepts in service-oriented collaboration en-
vironments. We defined a collaboration model com-
prising of humans and services, and proposed an ap-
proach and a framework to automate trust determi-
nation based on monitoring interactions and utilizing
profile information.
Currently we focus on trust metrics and models
and extend the existing prototype to make it feasible
for supporting real world scenarios in the area of net-
worked enterprises. The challenge is the definition
of suitable metrics which are able to reflect real trust
relationships. After that, the next step will be to per-
form an empirical evaluation and to prove that the se-
lected metrics and models appropriately address the
challenges in automatic trust inference.
ACKNOWLEDGEMENTS
This work is mainly supported by the EuropeanUnion
through the IP project COIN (FP7-216256).
REFERENCES
Artz, D. and Gil, Y. (2007). A survey of trust in computer
science and the semantic web. J. Web Sem., 5(2):58–
71.
Gomez, V., Kaltenbrunner, A., and Lopez, V. (2008). Sta-
tistical analysis of the social network and discussion
threads in slashdot. In WWW, pages 645–654. ACM.
Grandison, T. and Sloman, M. (2000). A survey of trust in
internet applications. IEEE Communications Surveys
and Tutorials, 3(4).
Guha, R., Kumar, R., Raghavan, P., and Tomkins, A.
(2004). Propagation of trust and distrust. In WWW,
pages 403–412, New York, NY, USA. ACM.
Herlocker, J. L., Konstan, J. A., Terveen, L. G., and Riedl,
J. T. (2004). Evaluating collaborative filtering recom-
mender systems. ACM Trans. Inf. Syst., 22(1):5–53.
Huynh, T. D., Jennings, N. R., and Shadbolt, N. R. (2006).
An integrated trust and reputation model for open
multi-agent systems. Autonomous Agents and Multi-
Agent Systems, 13(2):119–154.
Jøsang, A., Ismail, R., and Boyd, C. (2007). A survey of
trust and reputation systems for online service provi-
sion. Decision Support Systems, 43(2):618–644.
Marsh, S. P. (1994). Formalising trust as a computational
concept. PhD thesis, University of Stirling.
Massa, P. and Avesani, P. (2005). Controversial users de-
mand local trust metrics: An experimental study on
epinions.com community. In AAAI, pages 121–126.
Maximilien, E. M. and Singh, M. P. (2004). Toward au-
tonomic web services trust and selection. In ICSOC,
pages 212–221. ACM.
McKnight, D. H. and Chervany, N.L. (1996). The meanings
of trust. Technical report.
Moody, P., Gruen, D., Muller, M. J., Tang, J. C., and Moran,
T. P. (2006). Business activity patterns: A new model
for collaborative business applications. IBM Systems
Journal, 45(4):683–694.
Mui, L. (2002). Computational models of trust and rep-
utation: Agents, evolutionary games, and social net-
works. PhD thesis, Massachusetts Institute of Tech-
nology.
Quercia, D., Hailes, S., and Capra, L. (2007). Lightweight
distributed trust propagation. In ICDM, pages 282–
291. IEEE Computer Society.
Ramchurn, S. D., Jennings, N. R., Sierra, C., and Godo,
L. (2004). Devising a trust model for multi-agent in-
teractions using confidence and reputation. Applied
Artificial Intelligence, 18(9-10):833–852.
Resnick, P. and Varian, H. R. (1997). Recommender sys-
tems. Communications of the ACM, 40(3):56–58.
Ruohomaa, S. and Kutvonen, L. (2005). Trust management
survey. In iTrust, volume 3477 of Lecture Notes in
Computer Science, pages 77–92. Springer.
Schall, D., Truong, H.-L., and Dustdar, S. (2008). Unifying
human and software services in web-scale collabora-
tions. IEEE Internet Computing, 12(3):62–68.
Shand, B., Dimmock, N., and Bacon, J. (2004). Trust for
ubiquitous, transparent collaboration. Wireless Net-
works, 10(6):711–721.
Theodorakopoulos, G. and Baras, J. S. (2006). On trust
models and trust evaluation metrics for ad hoc net-
works. IEEE Journal on Selected Areas in Commu-
nications, 24(2):318–328.
Wasserman, S. and Faust, K. (1994). Social network analy-
sis: Methods and applications. Cambridge University
Press.
WEBIST 2009 - 5th International Conference on Web Information Systems and Technologies
478