2003
DOI: 10.1007/978-3-540-39718-2_23
|View full text |Cite
|
Sign up to set email alerts
|

Trust Management for the Semantic Web

Abstract: Abstract. Though research on the Semantic Web has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the Semantic Web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each source. We cannot expect each user to know the trustworthiness of each source, nor would we want to assign top-down or global credibility values due to the subjective nature of trust. We tackle this problem by em… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
385
0
1

Year Published

2004
2004
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 703 publications
(397 citation statements)
references
References 27 publications
2
385
0
1
Order By: Relevance
“…Twigg [19] applied J酶sang's subjective logic based trust model to support routing decision for P2P and ad hoc networks. Golbeck et al [8] and Richardson et al [16] developed the models of trust propagation in social networks.…”
Section: Related Researchmentioning
confidence: 99%
“…Twigg [19] applied J酶sang's subjective logic based trust model to support routing decision for P2P and ad hoc networks. Golbeck et al [8] and Richardson et al [16] developed the models of trust propagation in social networks.…”
Section: Related Researchmentioning
confidence: 99%
“…It should be possible for people to publish, share, and annotate information while ensuring their provenance, authenticity and integrity [5][6][7].…”
Section: Web Of Trustmentioning
confidence: 99%
“…Our framework is focused on expressing trustworthiness of data on the open Web, evaluating trustworthiness of inferred data and on allowing mechanisms for decisions based off trust and trust computations to be declaratively specified. [22,11,12,16] discuss how trust values for users and data sources can be computed. Richardson et al enable users to maintain trust for other users and provide functions to merge these values into trust values for all users by leveraging the path of trust between users [22].…”
Section: Related Workmentioning
confidence: 99%
“…[22,11,12,16] discuss how trust values for users and data sources can be computed. Richardson et al enable users to maintain trust for other users and provide functions to merge these values into trust values for all users by leveraging the path of trust between users [22]. Kuter et al allow users to maintain trust values or trust estimates for data sources and provide a probabilistic technique to use that information to compute a trust estimate for a data source [16].…”
Section: Related Workmentioning
confidence: 99%