what-when-how
In Depth Tutorials and Information
protect it from attacks due to its importance. We may refer the idea of the many-
to-one attack and apply it to the group protection. his method helps to ensure the
security of the central point in the network. he feedback mechanism has two sides
that can facilitate trust computation and also may be a “gate” for malicious behav-
iors. he malicious nodes easily make use of their right of voting to spoil the target.
Besides, there might be some incomplete data during feedback. hus, we should
pay attention to the message integrity. Because most of the trust models are based
on the small world theory where the clique is the core concept, the formation of the
clique may lead to the gathering of malicious nodes, which jeopardizes the whole
network. A strategy is needed to determine the structure of cliques.
11.6 Conclusion
In this chapter, we have presented some trust models that are based on social net-
works and can also extend to the applications of STNs. We have defined the main
factors that can influence the trust computation and provided the algorithms and
processes of each trust model. Further, we have analyzed the advantages and disad-
vantages of the trust models. In future research, the trust model in STN needs to
be enhanced due to the limitations of current models.
Reference
1. Zhai Dongsheng and Pan Hong. A social network-based trust model for
E-commerce. Wireless Communications, Networking and Mobile Computing, 2008 .
4thInternationalConferenceonWiCOM'08 . October 12-14, 2008, pp. 1-5.
2. I-Hsien Ting. Web mining techniques for on-line social networks analysis. International
ConferenceonServiceSystemsandServiceManagement , June 30-July 2, 2008, pp. 1-5.
3. Jamali, M. and Abolhassani, H. Different aspects of social network analysis. Web
Intelligence , 2006. IEEE/WIC/ACM International Conference onWI 2006 . December
18-22, 2006, pp. 66-72.
4. Callon, Michel (1991). Techno-economic networks and irreversibility. In John Law (Ed.),
ASociologyofMonsters:EssaysonPower,TechnologyandDomination , London: Routledge.
5. Lamb, R. and Davidson, E. Social scientists: Managing identity in STNs. Systemsci-
ences,2002 . Proceedingsofthe35thAnnualHawaiiInternationalConferenceonHICSS .
January 7-10, 2002, pp. 1132-1141.
6. Baker, D. Fortresses built upon sand. Proceedings of the New Security Paradigms
Workshop1996 .
7. Brostoff, S. and Sasse, M. A. Safe and sound: A safety-critical approach to security
design. NewSecurityParadigmsWorkshop2001 .
8. Ivan Flechais, Jens Riegelsberger, and M. Angela Sasse. Divide and conquer: he role
of trust and assurance in the design of secure socio-technical systems. September 2005,
NSPW'05:Proceedingsofthe2005WorkshoponNewSecurityParadigms .
9. Bacharach, M. and Garnbetta, D. Trust as Type Detection. C. Castelfranchi and Y. Tan
(Eds.), TrustandDeceptioninVirtualSocieties, 2001. pp. 1-26. Dordrecht: Kluwer.
Search WWH ::




Custom Search