Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
MetadataShow full item record
Recommender systemCentral AuthorityAggregation operatorsTrust ScoreTrust Network
Published version: Verbiest N., Cornelis C., Victor P., Herrera-Viedma E. (2010) Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation. In: García-Pedrajas N., Herrera F., Fyfe C., Benítez J.M., Ali M. (eds) Trends in Applied Intelligent Systems. IEA/AIE 2010. Lecture Notes in Computer Science, vol 6098. Springer, Berlin, Heidelberg. [https://doi.org/10.1007/978-3-642-13033-5_46]
SponsorshipF-META project, MEC-FEDER, Spain TIN2007-67494; FWO; Institute for the Promotion of Innovation by Science and Technology in Flanders (IWT); Andalucian excellence project TIC05299; Feder Fund in FUZZYLING project TIN2007-61079; Feder Fund in PETRI project PET 2007-0460
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation provides this ability by identifying paths that connect users in the network, and by merging trust opinions expressed by users along these paths. However, as individual trust opinions are not always based on perfect knowledge, and since the quality of a trust estimation propagated along a given path may diminish as its length increases, mechanisms are needed to handle these imperfections. In this paper, we propose a set of trust aggregation operators that take into account knowledge defects and path length. We investigate their properties, and discuss how they may be implemented in practice, taking into account characteristics of the network such as the availability of a central authority, or the need to preserve users’ privacy by not publically disclosing their trust information.