skip to main content
Computing and applying trust in web-based social networks
Publisher:
  • University of Maryland at College Park
  • College Park, MD
  • United States
ISBN:978-0-542-18324-9
Order Number:AAI3178583
Pages:
199
Bibliometrics
Skip Abstract Section
Abstract

The proliferation of web-based social networks has lead to new innovations in social networking, particularly by allowing users to describe their relationships beyond a basic connection. In this dissertation, I look specifically at trust in web-based social networks, how it can be computed, and how it can be used in applications. I begin with a definition of trust and a description of several properties that affect how it is used in algorithms. This is complemented by a survey of web-based social networks to gain an understanding of their scope, the types of relationship information available, and the current state of trust.

The computational problem of trust is to determine how much one person in the network should trust another person to whom they are not connected. I present two sets of algorithms for calculating these trust inferences: one for networks with binary trust ratings, and one for continuous ratings. For each rating scheme, the algorithms are built upon the defined notions of trust. Each is then analyzed theoretically and with respect to simulated and actual trust networks to determine how accurately they calculate the opinions of people in the system. I show that in both rating schemes the algorithms presented can be expected to be quite accurate.

These calculations are then put to use in two applications. FilmTrust is a website that combines trust, social networks, and movie ratings and reviews. Trust is used to personalize the website for each user, displaying recommended movie ratings, and ordering reviews by relevance. I show that, in the case where the user's opinion is divergent from the average, the trust-based recommended ratings are more accurate than several other common collaborative filtering techniques. The second application is TrustMail, an email client that uses the trust rating of each sender as a score for the message. Users can then sort messages according to their trust value.

I conclude with a description of other applications where trust inferences can be used, and how the lessons from this dissertation can be applied to infer information about relationships in other complex systems.

Cited By

  1. Chen R, Chang Y, Hua Q, Gao Q, Ji X and Wang B (2020). An enhanced social matrix factorization model for recommendation based on social networks using social interaction factors, Multimedia Tools and Applications, 79:19-20, (14147-14177), Online publication date: 1-May-2020.
  2. Pal B and Jenamani M (2019). Trust inference using implicit influence and projected user network for item recommendation, Journal of Intelligent Information Systems, 52:2, (425-450), Online publication date: 1-Apr-2019.
  3. Lai C and Chang Y (2020). Document recommendation based on the analysis of group trust and user weightings, Journal of Information Science, 45:6, (845-862), Online publication date: 1-Dec-2019.
  4. Yadav A, Chakraverty S and Sibal R (2019). A framework for classifying trust for online systems, World Wide Web, 22:4, (1499-1521), Online publication date: 1-Jul-2019.
  5. ACM
    Sejwal V and Abulaish M Trust and Context-based Rating Prediction using Collaborative Filtering Proceedings of the 9th International Conference on Web Intelligence, Mining and Semantics, (1-10)
  6. Khaksari A and Keyvanpour M (2019). TP-TA: a comparative analytical framework for trust prediction models in online social networks based on trust aspects, Artificial Intelligence Review, 52:3, (1929-1960), Online publication date: 1-Oct-2019.
  7. ACM
    Elghomary K, Bouzidi D and Daoudi N A Comparative Analysis of OSN and SIoT Trust Models for a trust model adapted to MOOCs platforms Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-8)
  8. ACM
    Duricic T, Lacic E, Kowald D and Lex E Trust-based collaborative filtering Proceedings of the 12th ACM Conference on Recommender Systems, (446-450)
  9. ACM
    Kaushal V and Patwardhan M (2018). Emerging Trends in Personality Identification Using Online Social Networks—A Literature Survey, ACM Transactions on Knowledge Discovery from Data, 12:2, (1-30), Online publication date: 13-Mar-2018.
  10. Strang K (2018). Consumer Behavior in Online Risky Purchase Decisions, International Journal of Online Marketing, 8:2, (1-26), Online publication date: 1-Apr-2018.
  11. ACM
    Cheng X and Li X Trust Evaluation in Online Social Networks Based on Knowledge Graph Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence, (1-7)
  12. Bach S, Broecheler M, Huang B and Getoor L (2017). Hinge-loss Markov random fields and probabilistic soft logic, The Journal of Machine Learning Research, 18:1, (3846-3912), Online publication date: 1-Jan-2017.
  13. ACM
    Ruan Y, Zhang P, Alfantoukh L and Durresi A (2017). Measurement Theory-Based Trust Management Framework for Online Social Communities, ACM Transactions on Internet Technology, 17:2, (1-24), Online publication date: 28-May-2017.
  14. Logesh R and Subramaniyaswamy V (2017). A Reliable Point of Interest Recommendation based on Trust Relevancy between Users, Wireless Personal Communications: An International Journal, 97:2, (2751-2780), Online publication date: 1-Nov-2017.
  15. Zhang Z, Xu G, Zhang P and Wang Y (2017). Personalized recommendation algorithm for social networks based on comprehensive trust, Applied Intelligence, 47:3, (659-669), Online publication date: 1-Oct-2017.
  16. Interdonato R and Tagarelli A To Trust or Not to Trust Lurkers? Proceedings of the 12th International Conference and School on Advances in Network Science - Volume 9564, (43-56)
  17. Ravi L and Vairavasundaram S (2016). A Collaborative Location Based Travel Recommendation System through Enhanced Rating Prediction for the Group of Users, Computational Intelligence and Neuroscience, 2016, (7), Online publication date: 1-Mar-2016.
  18. ACM
    Gao P, Miao H, Baras J and Golbeck J STAR Proceedings of the 10th ACM Conference on Recommender Systems, (301-308)
  19. ACM
    Jiang W, Wang G, Bhuiyan M and Wu J (2016). Understanding Graph-Based Trust Evaluation in Online Social Networks, ACM Computing Surveys, 49:1, (1-35), Online publication date: 28-Jul-2016.
  20. Ren Y, Li G and Zhou W (2015). A survey of recommendation techniques based on offline data processing, Concurrency and Computation: Practice & Experience, 27:15, (3915-3942), Online publication date: 1-Oct-2015.
  21. ACM
    Laifa M, Akrouf S and Maamri R Online Social Trust Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, (1-6)
  22. ACM
    Jiang W, Wu J and Wang G (2015). On Selecting Recommenders for Trust Evaluation in Online Social Networks, ACM Transactions on Internet Technology, 15:4, (1-21), Online publication date: 14-Dec-2015.
  23. Wang J, Peng J and Liu O (2015). A classification approach for less popular webpages based on latent semantic analysis and rough set model, Expert Systems with Applications: An International Journal, 42:1, (642-648), Online publication date: 1-Jan-2015.
  24. Yazidi A, Bai A, Hammer H and Engelstad P A Simple and Efficient Algorithm for Lexicon Generation Inspired by Structural Balance Theory Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (336-347)
  25. Alhadad N, Serrano-Alvarado P, Busnel Y and Lamarre P System Modeling and Trust Evaluation of Distributed Systems Transactions on Large-Scale Data- and Knowledge-Centered Systems XXII - Volume 9430, (33-74)
  26. ACM
    Oh H, Lee T and Kim S Finding underlying factors for reciprocal trust formation Proceedings of the 2015 Conference on research in adaptive and convergent systems, (86-91)
  27. Cheng Y, Park J and Sandhu R Attribute-Aware Relationship-Based Access Control for Online Social Networks Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566, (292-306)
  28. Guo G, Zhang J, Thalmann D and Yorke-Smith N ETAF Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (540-547)
  29. Kumar S, Spezzano F and Subrahmanian V Accurately detecting trolls in slashdot zoo via decluttering Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (188-195)
  30. ACM
    Basu A, Vaidya J, Corena J, Kiyomoto S, Marsh S, Guo G, Zhang J and Miyake Y (2014). Opinions of people, ACM SIGAPP Applied Computing Review, 14:3, (7-21), Online publication date: 22-Sep-2014.
  31. ACM
    Harman J, O'Donovan J, Abdelzaher T and Gonzalez C Dynamics of human trust in recommender systems Proceedings of the 8th ACM Conference on Recommender systems, (305-308)
  32. ACM
    Forsati R, Mahdavi M, Shamsfard M and Sarwat M (2014). Matrix Factorization with Explicit Trust and Distrust Side Information for Improved Social Recommendation, ACM Transactions on Information Systems, 32:4, (1-38), Online publication date: 28-Oct-2014.
  33. ACM
    Tang J, Hu X and Liu H Is distrust the negation of trust? Proceedings of the 25th ACM conference on Hypertext and social media, (148-157)
  34. ACM
    Basu A, Corena J, Kiyomoto S, Marsh S, Vaidya J, Guo G, Zhang J and Miyake Y Privacy preserving trusted social feedback Proceedings of the 29th Annual ACM Symposium on Applied Computing, (1706-1711)
  35. Satsiou A and Tassiulas L Propagating Users' Similarity towards Improving Recommender Systems Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01, (221-228)
  36. Wierzbicki A, Kaszuba T, Nielek R, Adamska P and Datta A (2013). Improving computational trust representation based on Internet auction traces, Decision Support Systems, 54:2, (929-940), Online publication date: 1-Jan-2013.
  37. Silva E, Rodrigues D, Souza J, Brito P, Salgado A, Meira S and Costa J Inferring Hidden Trust Relationships in Social Networks for Encouraging Collaboration and Cooperation among Individuals Proceedings of the 19th International Conference on Collaboration and Technology - Volume 8224, (42-60)
  38. Parsons S, Sklar E, Salvit J, Wall H and Li Z ArgTrust Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (1395-1396)
  39. ACM
    Wang H, Terrovitis M and Mamoulis N Location recommendation in location-based social networks using user check-in data Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (374-383)
  40. ACM
    Hwang W, Li S, Kim S and Choi H Exploiting trustors as well as trustees in trust-based recommendation Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (1893-1896)
  41. ACM
    Sherchan W, Nepal S and Paris C (2013). A survey of trust in social networks, ACM Computing Surveys, 45:4, (1-33), Online publication date: 1-Aug-2013.
  42. ACM
    Alexandridis G, Siolas G and Stafylopatis A A biased random walk recommender based on rejection sampling Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (648-652)
  43. ACM
    Briscoe E, Appling D, Mappus R and Hayes H Determining credibility from social network structure Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1418-1424)
  44. ACM
    Difallah D, Demartini G and Cudré-Mauroux P Pick-a-crowd Proceedings of the 22nd international conference on World Wide Web, (367-374)
  45. ACM
    Victor P, Verbiest N, Cornelis C and Cock M (2013). Enhancing the trust-based recommendation process with explicit distrust, ACM Transactions on the Web, 7:2, (1-19), Online publication date: 1-May-2013.
  46. Huang B, Kimmig A, Getoor L and Golbeck J A flexible framework for probabilistic models of social trust Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction, (265-273)
  47. Kim Y and Tran V (2013). Assessing the ripple effects of online opinion leaders with trust and distrust metrics, Expert Systems with Applications: An International Journal, 40:9, (3500-3511), Online publication date: 1-Jul-2013.
  48. Koohborfardhaghighi S and Kim J (2013). Using structural information for distributed recommendation in a social network, Applied Intelligence, 38:2, (255-266), Online publication date: 1-Mar-2013.
  49. Sharpanskykh A and Treur J Modelling and Analysis of Social Contagion Processes with Dynamic Networks Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (40-50)
  50. Alhadad N, Serrano-Alvarado P, Busnel Y and Lamarre P Trust Evaluation of a System for an Activity Proceedings of the 10th International Conference on Trust, Privacy, and Security in Digital Business - Volume 8058, (24-36)
  51. Bishr M and Kuhn W Trust and Reputation Models for Quality Assessment of Human Sensor Observations Proceedings of the 11th International Conference on Spatial Information Theory - Volume 8116, (53-73)
  52. ACM
    Chen W, Hsu W and Lee M Making recommendations from multiple domains Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (892-900)
  53. Zhu H Optimal trust mining and computing on keyed mapreduce Proceedings of the 4th international conference on Engineering Secure Software and Systems, (143-150)
  54. Guo G, Zhang J and Thalmann D A simple but effective method to incorporate trusted neighbors in recommender systems Proceedings of the 20th international conference on User Modeling, Adaptation, and Personalization, (114-125)
  55. ACM
    O'Doherty D, Jouili S and Van Roy P Towards trust inference from bipartite social networks Proceedings of the 2nd ACM SIGMOD Workshop on Databases and Social Networks, (13-18)
  56. ACM
    Momeni E Semi-automatic semantic moderation of web annotations Proceedings of the 21st International Conference on World Wide Web, (167-172)
  57. Chen J, Chen G, Zhang H, Huang J and Zhao G Social Recommendation Based on Multi-relational Analysis Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02, (471-477)
  58. Lumbreras A and Gavaldà R Applying Trust Metrics Based on User Interactions to Recommendation in Social Networks Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (1159-1164)
  59. Zolfaghar K and Aghaie A (2012). A syntactical approach for interpersonal trust prediction in social web applications, Knowledge-Based Systems, 26, (93-102), Online publication date: 1-Feb-2012.
  60. Matyas S, Kato D, Shime T, Kunieda K and Yamada K Game-Based trust Proceedings of the 11th international conference on Entertainment Computing, (207-220)
  61. ACM
    Mao Y, Shen H and Sun C From credit and risk to trust Proceedings of the 2012 ACM International Conference on Supporting Group Work, (209-218)
  62. ACM
    Meyffret S, Médini L and Laforest F Trust-based local and social recommendation Proceedings of the 4th ACM RecSys workshop on Recommender systems and the social web, (53-60)
  63. ACM
    Yang X, Steck H, Guo Y and Liu Y On top-k recommendation using social networks Proceedings of the sixth ACM conference on Recommender systems, (67-74)
  64. ACM
    Gamble M and Goble C Quality, trust, and utility of scientific data on the web Proceedings of the 3rd International Web Science Conference, (1-8)
  65. ACM
    Hu H, Ahn G and Jorgensen J Detecting and resolving privacy conflicts for collaborative data sharing in online social networks Proceedings of the 27th Annual Computer Security Applications Conference, (103-112)
  66. ACM
    Jamali M, Huang T and Ester M A generalized stochastic block model for recommendation in social rating networks Proceedings of the fifth ACM conference on Recommender systems, (53-60)
  67. ACM
    Koyejo O and Ghosh J A kernel-based approach to exploiting interaction-networks in heterogeneous information sources for improved recommender systems Proceedings of the 2nd International Workshop on Information Heterogeneity and Fusion in Recommender Systems, (9-16)
  68. ACM
    Li R, Zhang Y, Yu H, Wang X, Wu J and Wei B A social network-aware top-N recommender system using GPU Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries, (287-296)
  69. ACM
    Nobarany S, Haraty M, Fels S and Fisher B Leveraging trust relationships in digital backchannel communications CHI '11 Extended Abstracts on Human Factors in Computing Systems, (1579-1584)
  70. ACM
    Golbeck J, Robles C and Turner K Predicting personality with social media CHI '11 Extended Abstracts on Human Factors in Computing Systems, (253-262)
  71. ACM
    Carminati B, Ferrari E, Morasca S and Taibi D A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks Proceedings of the first ACM conference on Data and application security and privacy, (51-62)
  72. ACM
    Au Yeung C and Iwata T Strength of social influence in trust networks in product review sites Proceedings of the fourth ACM international conference on Web search and data mining, (495-504)
  73. ACM
    Doan A, Ramakrishnan R and Halevy A (2011). Crowdsourcing systems on the World-Wide Web, Communications of the ACM, 54:4, (86-96), Online publication date: 1-Apr-2011.
  74. Knap T and Mlynková I Revealing beliefs influencing trust between members of the czech informatics community Proceedings of the Third international conference on Social informatics, (226-239)
  75. Knap T and Mlýnková I Web quality assessment model Proceedings of the 8th international conference on Ubiquitous intelligence and computing, (252-266)
  76. Hauke S, Pyka M and Heider D Group-agreement as a reliability measure for witness recommendations in reputation-based trust protocols Transactions on computational science XII, (231-255)
  77. Frazier G, Duong Q, Wellman M and Petersen E Incentivizing responsible networking via introduction-based routing Proceedings of the 4th international conference on Trust and trustworthy computing, (277-293)
  78. Zhang L, Tan C, Li S, Fang H, Rai P, Chen Y, Luthra R, Ng W and Zhang J The influence of interaction attributes on trust in virtual communities Proceedings of the 19th international conference on Advances in User Modeling, (268-279)
  79. Shekarpour S and Katebi S (2010). Modeling and evaluation of trust with an extension in semantic web, Web Semantics: Science, Services and Agents on the World Wide Web, 8:1, (26-36), Online publication date: 1-Mar-2010.
  80. Cheng Z and Hurley N Analysis of robustness in trust-based recommender systems Adaptivity, Personalization and Fusion of Heterogeneous Information, (114-121)
  81. ACM
    Dell'Amico M and Capra L (2010). Dependable filtering, ACM Transactions on Information Systems, 29:1, (1-37), Online publication date: 1-Dec-2010.
  82. ACM
    Jamali M and Ester M A matrix factorization technique with trust propagation for recommendation in social networks Proceedings of the fourth ACM conference on Recommender systems, (135-142)
  83. ACM
    Chua F and Lim E Trust network inference for online rating data using generative models Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (889-898)
  84. ACM
    Gao Q and Houben G A framework for trust establishment and assessment on the web of data Proceedings of the 19th international conference on World wide web, (1097-1098)
  85. ACM
    Squicciarini A, Paci F and Sundareswaran S PriMa Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, (320-323)
  86. ACM
    Kuter U and Golbeck J (2010). Using probabilistic confidence models for trust inference in Web-based social networks, ACM Transactions on Internet Technology, 10:2, (1-23), Online publication date: 1-May-2010.
  87. Vanetti M, Binaghi E, Carminati B, Carullo M and Ferrari E Content-based filtering in on-line social networks Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning, (127-140)
  88. Bhuiyan T, Xu Y, Jøsang A, Liang H and Cox C Developing trust networks based on user tagging information for recommendation making Proceedings of the 11th international conference on Web information systems engineering, (357-364)
  89. Verbiest N, Cornelis C, Victor P and Herrera-Viedma E Strategies for incorporating knowledge defects and path length in trust aggregation Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (450-459)
  90. Knap T and Mlýnková I Towards topic-based trust in social networks Proceedings of the 7th international conference on Ubiquitous intelligence and computing, (635-649)
  91. Fazeli S, Zarghami A, Dokoohaki N and Matskin M Mechanizing social trust-aware recommenders with T-index augmented trustworthiness Proceedings of the 7th international conference on Trust, privacy and security in digital business, (202-213)
  92. Bhuiyan T, Xu Y, JØsang A, Liang H and Cox C Developing Trust Networks Based on User Tagging Information for Recommendation Making 11th International Conference on Web Information Systems Engineering --- WISE 2010 - Volume 6488, (357-364)
  93. Gao Q Towards trust in web content using semantic web technologies Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part II, (457-461)
  94. DuBois T, Golbeck J and Srinivasan A Rigorous Probabilistic Trust-Inference with Applications to Clustering Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (655-658)
  95. Victor P, Cornelis C, De Cock M and Pinheiro da Silva P (2009). Gradual trust and distrust in recommender systems, Fuzzy Sets and Systems, 160:10, (1367-1382), Online publication date: 15-May-2009.
  96. Chen S, Luo T, Liu W and Xu Y Incorporating similarity and trust for collaborative filtering Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 2, (487-493)
  97. Breaban M, Alboaie L and Luchian H Guiding users within trust networks using swarm algorithms Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1770-1777)
  98. ACM
    Golbeck J Tutorial on using social trust for recommender systems Proceedings of the third ACM conference on Recommender systems, (425-426)
  99. ACM
    Walter F, Battiston S and Schweitzer F Personalised and dynamic trust in social networks Proceedings of the third ACM conference on Recommender systems, (197-204)
  100. ACM
    Jamali M and Ester M Using a trust network to improve top-N recommendation Proceedings of the third ACM conference on Recommender systems, (181-188)
  101. ACM
    Carminati B, Ferrari E and Perego A (2009). Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, 13:1, (1-38), Online publication date: 1-Oct-2009.
  102. ACM
    Golbeck J (2009). Trust and nuanced profile similarity in online social networks, ACM Transactions on the Web, 3:4, (1-33), Online publication date: 1-Sep-2009.
  103. ACM
    Jamali M and Ester M TrustWalker Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (397-406)
  104. ACM
    Ries S Extending Bayesian trust models regarding context-dependence and user friendly representation Proceedings of the 2009 ACM symposium on Applied Computing, (1294-1301)
  105. ACM
    Huang J and Nicol D A calculus of trust and its application to PKI and identity management Proceedings of the 8th Symposium on Identity and Trust on the Internet, (23-37)
  106. Hang C, Wang Y and Singh M Operators for propagating trust and their evaluation in social networks Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (1025-1032)
  107. ACM
    Adler B, Chatterjee K, de Alfaro L, Faella M, Pye I and Raman V Assigning trust to Wikipedia content Proceedings of the 4th International Symposium on Wikis, (1-12)
  108. ACM
    King J, Stoll J, Hunter M and Ahamad M ALPACA Proceedings of the 2nd ACM workshop on Information credibility on the web, (47-52)
  109. ACM
    Costa R, Oliveira R, Silva E and Meira S A.M.I.G.O.S Proceedings of the 26th annual ACM international conference on Design of communication, (235-242)
  110. ACM
    Victor P, Cornelis C, Teredesai A and De Cock M Whom should I trust? Proceedings of the 2008 ACM symposium on Applied computing, (2014-2018)
  111. Li X, Zeng D, Mao W and Wang F Online Communities Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (355-365)
  112. Woerndl W and Groh G Utilizing Physical and Social Context to Improve Recommender Systems Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops, (123-128)
  113. ACM
    Massa P and Avesani P Trust-aware recommender systems Proceedings of the 2007 ACM conference on Recommender systems, (17-24)
  114. ACM
    Ries S Certain trust Proceedings of the 2007 ACM symposium on Applied computing, (1599-1604)
  115. ACM
    Adler B and de Alfaro L A content-driven reputation system for the wikipedia Proceedings of the 16th international conference on World Wide Web, (261-270)
  116. ACM
    Golbeck J and Wasser M SocialBrowsing CHI '07 Extended Abstracts on Human Factors in Computing Systems, (2381-2386)
  117. Kazienko P Expansion of telecommunication social networks Proceedings of the 4th international conference on Cooperative design, visualization, and engineering, (404-412)
  118. Huafei Zhu and Feng Bao Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2904-2908)
  119. Ziegler C and Golbeck J (2007). Investigating interactions of trust and interest similarity, Decision Support Systems, 43:2, (460-475), Online publication date: 1-Mar-2007.
  120. ACM
    Groh G and Ehmig C Recommendations in taste related domains Proceedings of the 2007 ACM International Conference on Supporting Group Work, (127-136)
  121. Golbeck J Combining provenance with trust in social networks for semantic web content filtering Proceedings of the 2006 international conference on Provenance and Annotation of Data, (101-108)
  122. ACM
    Lawrence K and schraefel m Bringing communities to the semantic web and the semantic web to communities Proceedings of the 15th international conference on World Wide Web, (153-162)
  123. Victor P, Cornelis C and Cock M Enhanced Recommendations through Propagation of Trust and Distrust Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (263-266)
  124. Katz Y and Golbeck J Social network-based trust in prioritized default logic proceedings of the 21st national conference on Artificial intelligence - Volume 2, (1345-1350)
  125. Carminati B, Ferrari E and Perego A Rule-Based access control for social networks Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II, (1734-1744)
  126. Ries S, Kangasharju J and Mühlhäuser M A classification of trust systems Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (894-903)
  127. Golbeck J Generating predictive movie recommendations from trust in social networks Proceedings of the 4th international conference on Trust Management, (93-104)
  128. Golbeck J, Grau B, Halaschek-Wiener C, Kalyanpur A, Parsia B, Schain A, Sirin E and Hendler J Semantic web research trends and directions Proceedings of the First international conference on Pattern Recognition and Machine Intelligence, (160-169)
Contributors
  • University of Maryland, College Park
  • Rensselaer Polytechnic Institute

Recommendations