We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Yu Zhang, Hua-Jun Chen, Xiao-Hong Jiang, Hao Sheng, Zhao-Hui Wu. RCCtrust: A Combined Trust Model for Electronic Community[J]. Journal of Computer Science and Technology, 2009, 24(5): 883-892.
Citation: Yu Zhang, Hua-Jun Chen, Xiao-Hong Jiang, Hao Sheng, Zhao-Hui Wu. RCCtrust: A Combined Trust Model for Electronic Community[J]. Journal of Computer Science and Technology, 2009, 24(5): 883-892.

RCCtrust: A Combined Trust Model for Electronic Community

Funds: This work is supported by the National High-Technology Research and Development 863 Program of China under Grant No. 2006AA01A123, National Science Fund for Distinguished Young Scholars under Grant No. 60525202, Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT0652, Defense Advanced Research Foundation of the General Armaments Department of the PLA under Grant Nos. 9140A06060307JW0403 and 9140A06050208JW0414.
More Information
  • Author Bio:

    Yu Zhang is currently a Ph.D. candidate of Zhejiang University,China. She received her B.S. degree from Computer Science Departmentof Northeastern University in 2004. Her research interests includetrust computing, Semantic Web, and e-commerce. She is a CCFstudent member.

    Hua-Jun Chen is currently an associate professor in College ofComputer Science, Zhejiang University, China. He received his Ph.D.degree from Zhejiang University in 2004. His research interestsinclude grid computing, bioinformatics and Semantic Web.

    Xiao-Hong Jiang is currently an associate professor in College ofComputer Science, Zhejiang University, China. She received her Ph.D.degree from Zhejiang University in 2003. Her research interestsinclude distributed systems, virtual environment, and imageprocessing.

    Zhao-Hui Wu is a professor and the vice principle ofZhejiang University. He received his Ph.D. degree from ZhejiangUniversity and Kaiserslautern University in 1993. His researchinterests include distributed artificial intelligence, gridcomputing, and ubiquitous computing. He is a senior member of IEEE.

  • Revised Date: June 11, 2009
  • Published Date: September 04, 2009
  • Previous trust models are mainly focused on reputational mechanism based on explicit trust ratings. However, the large amount of user-generated content and community context published on Web is often ignored. Without enough information, there are several problems with previous trust models: first, they cannot determine in which field one user trusts in another, so many models assume that trust exists in all fields. Second some models are not able to delineate the variation of trust scales, therefore they regard each user trusts all his friends to the same extent. Third, since these models only focus on explicit trust ratings, so the trust matrix is very sparse. To solve these problems, we present RCCtrust --- a trust model which combines Reputation-, Content- and Context-based mechanisms to provide more accurate, fine-grained and efficient trust management for the electronic community. We extract trust-related information from user-generated content and community context from Web to extend reputation-based trust models. We introduce role-based and behavior-based reasoning functionalities to infer users' interests and \emph{category-specific} trust relationships. Following the study in sociology, RCCtrust exploits similarities between pairs of users to depict differentiated trust scales. The experimental results show that RCCtrust outperforms pure user similarity method and linear decay trust-aware technique in both accuracy and coverage for a Recommender System.
  • [1]
    Zhang Y, Chen H, Wu Z, Zheng X. A reputation-chain trust model for the semantic Web. In Proc. the 20th International Conference on Advanced Information Networking and Applications, Vienna, Austria, April 18-20, 2006, pp.719-723.
    [2]
    Golbeck J, Parsia B, Hendler J. Trust networks on the semantic Web. In Proc. Cooperative Intelligent Agents VII, Helsinki, Finland, August 27-29, 2003, pp.238-249.
    [3]
    Hill S, Provost F, Volinsky C. Network-based marketing: Identifying likely adopters via consumer networks. Statistical Science, 2006, 21(2): 256-276.
    [4]
    Epinions. http://www.epinions.com.
    [5]
    Domingos P, Richardson M. Mining the network value of customers. In Proc. the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, California, USA, August 26-29, 2001, pp.57-66.
    [6]
    Richardson M, Domingos P. Mining knowledge-sharing sites for viral marketing. In Proc. the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Alberta, Canada, July 23-26, 2002, pp.61-70.
    [7]
    Massa P, Avesani P. Trust-aware collaborativefiltering for recommender systems. In Proc. Federated International Conference On The Move to Meaningful Internet: CoopIS, DOA, ODBASE, Larnaca, Cyprus, October 25-29, 2004, pp.492- 508.
    [8]
    Victor P, Cornelis C, Teredesai A M, De Cock M. Whom should I trust? The impact of keyfigures on cold start recommendations. In Proc. the 23rd Annual ACM Symposium on Applied Computing, Ceara, Brazil, March 16-20, 2008, pp.2014-2018.
    [9]
    Kamvar S D, Schlosser M T, Garcia-Molina H. The Eigentrust algorithm for reputation management in P2P networks. In Proc. the Twelfth International World Wide Web Conference, Budapest, Hungary, May 20-24, 2003, pp.640-651.
    [10]
    Wang Y, Vassileva J. Bayesian network-based trust model. In Proc. the 2003 IEEE/WIC International Conference on Web Intelligence, Halifax, Canada, October 13-16, 2003, pp.372- 378.
    [11]
    Yu B, Singh M P. A social mechanism of reputation management in electronic communities. In Proc. the Fourth International Workshop on Cooperative Information Agents, Boston, USA, July 4-7, 2000, pp.154-165.
    [12]
    Liang Z, Shi W. Pet: A personalized trust model with reputation and risk evaluation for P2P resource sharing. In Proc. the 38th Annual Hawaii International Conference of System Sciences, Big Island, USA, January 3-6, 2005, p.201b.
    [13]
    Liang Z, Shi W. Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Networks and Applications, 2005, 10(6): 971-983.
    [14]
    Liang Z, Shi W. Analysis of ratings on trust inference in open environments. Performance Evaluation, 2008, 65(2): 99-128.
    [15]
    Xiong L, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-857.
    [16]
    Xiong L, Liu L. A reputation-based trust model for peer-topeer ecommerce communities. In Proc. IEEE International Conference on E-Commerce, Newport Beach, USA, June 24- 27, 2003, pp.275-284.
    [17]
    Bizer C, Oldakowski R. Using contextand content-based trust policies on the semantic Web. In Proc. the 13th International Conference on World Wide Web, New York, USA, May 17-20, 2004, pp.228-229.
    [18]
    Hu M, Liu B. Mining opinion features in customer reviews. In Proc. the Nineteenth National Conference on Artificial Intelligence, San Jose, USA, July 25-29, 2004, pp.755-760.
    [19]
    Edelman trust barometer. November 2007. http://www.edelman.co.uk/trustbarometer/.
    [20]
    Bellman R, Giertz M. On the analytic formalism of the theory of fuzzy sets. Information Sciences, 1973, 5: 149-156.
    [21]
    Jean-Sebastien Brunner, Li Ma, Chen Wang et al. Explorations in the use of Semantic Web technologies for product information management. In Proc. the 16th International World Wide Web Conference, Banff, Canada, May 8- 12, 2007, pp.747-756.
    [22]
    Rdf primer. February 2004, http://www.w3.org/TR/rdfprimer/.
    [23]
    Chun Zeng, Chun-Xiao Xing, Li-Zhu Zhou, Xiao-Hui Zheng. Similarity measure and instance selection for collaborativefiltering. International Journal of Electronic Commerce, 2003, 8(4): 115-129.
  • Related Articles

    [1]Shui-Guang Deng, Long-Tao Huang, Jian Wu, Zhao-Hui Wu. Trust-Based Personalized Service Recommendation:A Network Perspective[J]. Journal of Computer Science and Technology, 2014, 29(1): 69-80. DOI: 10.1007/s11390-013-1412-7
    [2]Fu-Guo Zhang. Preventing Recommendation Attack in Trust-Based Recommender Systems[J]. Journal of Computer Science and Technology, 2011, 26(5): 823-828. DOI: 10.1007/s11390-011-0181-4
    [3]Ming-Wei Zhang, Bin Zhang, Ying Liu, Jun Na, Zhi-Liang Zhu. Web Service Composition Based on QoS Rules[J]. Journal of Computer Science and Technology, 2010, 25(6): 1143-1156. DOI: 10.1007/s11390-010-1091-6
    [4]Shou-Xin Wang, Li Zhang, Shuai Wang, Xiang Qiu. A Cloud-Based Trust Model for Evaluating Quality of Web Services[J]. Journal of Computer Science and Technology, 2010, 25(6): 1130-1142. DOI: 10.1007/s11390-010-1090-7
    [5]Hai-Hua Li, Xiao-Yong Du, Xuan Tian. A Review-Based Reputation Evaluation Approach for Web Services[J]. Journal of Computer Science and Technology, 2009, 24(5): 893-900.
    [6]Xiao-Yong Li, Xiao-Lin Gui. A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks[J]. Journal of Computer Science and Technology, 2009, 24(5): 868-882.
    [7]Feng Xu, Jing Pan, Wen Lu. A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments[J]. Journal of Computer Science and Technology, 2009, 24(2): 373-385.
    [8]Lei Shi, Ying-Jie Han, Xiao-Guang Ding, Lin Wei, Zhi-Min Gu. An SPN-Based Integrated Model for Web Prefetching and Caching[J]. Journal of Computer Science and Technology, 2006, 21(4): 482-489.
    [9]Qiang Wang, De-Bin Zhao, Wen Gao. Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard[J]. Journal of Computer Science and Technology, 2006, 21(3): 315-322.
    [10]Zhou Jingzhou. A Neural Network Model Based on Logical Operations[J]. Journal of Computer Science and Technology, 1998, 13(5): 464-470.

Catalog

    Article views (13) PDF downloads (1944) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return