You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/224193095

Online Trust: Definition and Principles

Conference Paper · October 2010


DOI: 10.1109/ICCGI.2010.17 · Source: IEEE Xplore

CITATIONS READS
52 11,331

3 authors:

Zainab Aljazzaf Mark Perry


Kuwait University University of New England (Australia)
12 PUBLICATIONS   148 CITATIONS    109 PUBLICATIONS   439 CITATIONS   

SEE PROFILE SEE PROFILE

Miriam A. M. Capretz
The University of Western Ontario
152 PUBLICATIONS   2,829 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Trust in computing View project

Harmonisation of EU copyright law View project

All content following this page was uploaded by Mark Perry on 17 April 2014.

The user has requested enhancement of the downloaded file.


Online Trust: Definition and Principles
Zainab M. Aljazzaf, Mark Perry Miriam A. M. Capretz
Department of Computer Science Department of Electrical and
University of Western Ontario Computer Engineering
London, Canada University of Western Ontario
{zaljazza, mperry}@uwo.ca London, Canada
mcapretz@uwo.ca

Abstract—Trust is as significant a factor for successful online in heterogeneous environments” [5]. Realizing SOC promise
interactions as it is in offline communities. Trust is an important involves developing Service Oriented Architecture (SOA) [5].
factor to predict the behaviour of an entity and as a criterion SOA is “an architectural style for building enterprise so-
for an entity selection. Most trust studies focused on trust
establishment without identifying and considering the main lutions based on services” [6]. A service is “a discrete unit
trust definition components and trust principles. This paper of business functionality that is made available through a
explores trust in the offline and the online world to extract service contract” [6]. SOA is concerned with an enterprise
important trust definition components and trust principles. The scope beyond a single application [6]. SOA can be imple-
trust definition and principles are presented, which form a basis mented using many distributed computing technologies such
that should be followed to establish trust online.
as CORBA (Common Object Request Broker Architecture),
Keywords - Trust definition; trust principles. DCOM (Distributed Component Object Model), and Web
Services. Web Services gain more popularity as a technol-
I. I NTRODUCTION ogy to implement SOA because of their important features
In human communities, there is uncertainty about the be- especially the interoperability and self description interface.
haviour of strangers. People who do not trust others avoid A Web Service is “self-contained, self-described, dynamically
interacting with them. Trust plays a significant role in facili- discovered applications with Internet-based interfaces” [7].
tating interaction in such uncertain environments. A Trustor is There are three role interactions in the SOA, service provider,
the subject that trusts a target entity. A target entity is the entity an organization or platform that owns, implements, and con-
that is trusted and is known as the trustee [1]. An entity could trols access to the service; service requestor, an application,
be a person, a store, a bank, a service, a product, etc. An entity services, or the client who is looking for and invoking a
can be identified by its properties such as name, identification, service; and service discovery agency, a searchable directory
picture, signature, store location, and stated policies [2][3]. An where the description of the services is published by the
entity’s decision to interact with others is an act of trust. In providers and searched by the requestors [8].
this case, the trustor relies on and places its trust in the trustee There are many services with similar functionalities. Ser-
to accomplish the task as agreed upon [4]. vices’ non-functional properties can be the differentiation
In the Internet, trust establishment has additional issues. In factors between the similar services. Thus, it is important for
such an open online environment, many entities are separated the requestor (trustor) to select a service (trustee) based on
by physical distance and likely to be complete strangers. Some its non-functional properties. Quality of service (QoS) is a
entities on the Internet use real names and some have physical quality or non-functional properties of a service. Hoyle [9]
stores. However, this is not always the case. Entities are defines quality as “the degree to which a set of inherent
mostly not physically identified, and there are many anony- characteristics fulfils a need or expectation that is stated, gen-
mous entities. In addition, as in the real world, the Internet eral implied or obligatory”. Quality is a non-time-dependent
has many domains and each has different requirements. A characteristic. QoS properties should be considered for service
domain’s requirements need to be considered to establish trust selection. Trust has been used as a criteria for service selection
for that domain. The trust establishment process for Internet [10][11][12][13].
interactions needs consideration of requirements for diverse Figure 1 [10] shows trust-based service selection ap-
organisations. proaches. In the direct experience approach, the requestor
Building a distributed software system requires the interac- builds trust about services after utilizing it. However, there is
tion of entities and use of resources from diverse organisations a need to trust the service before executing it. In the Trusted
throughout the web. In such diverse systems, different entities Third Party (TTP) approach, the consumers consult a trusted
spread around different domains and organizations, and pass third party for the trustworthiness of services. There are two
the boundary of community, which has clear security and trust TTP approaches: social trust and matchmaking. In the social
preferences. Service Oriented Computing (SOC) is “a comput- TTP approach, each consumer evaluates the performance of a
ing paradigm that utilizes services as fundamental elements to service he/she consumes and the TTP gathers the evaluations
support rapid, low-cost development of distributed application and computes the trust rate for each service. The consumer
Trust based approach for
online service selection
increase, become less important or irrelevant, or decay
with time [14][16].
Direct Trusted Third Trust
• Online Trust Dimensions: Offline and online trust are
Hybrid
Experience Party negotiation multi dimensional and can differ with respect to gener-
ality, the breadth of trust and it extends from general to
Social (Indirect Trust and Direct Experience
Matchmaking SocioCognitive
Experience) Reputation and Reputation specific trust; kind, there are slow trust (occurs over time
in long term relationship) and swift trust (quickly created
Reputation Recommendation Referrals and ended); degree, the depth of trust that a person has
and it extends from basic to guarded to extended; and
Fig. 1. Approaches for trust-based service selection [10] stage, the trust development stages [17].
• Principles of trust online. Some of trust principles on the
online trust literature are: trust depends on identity, is
based on information, is the function of perception of
trying to use any services consults the TTP for the trustworthi-
risk, deepens over time and with increased reciprocity, is
ness of that service. There are three classifications of the social
a matter of degree, first party information is important in
trust approach: reputation, recommendation, and referrals.
developing trust, second party opinions are important in
Reputation is a public opinion about characteristics of an entity
developing trust, and third party ratings are important in
and it represents a collective evaluation of that entity [14].
developing trust [18].
The recommendation system aggregates recommendations and
• Trust classes. Different classes of trust [19][16] can be
matches between recommenders and the one searching for the
distinguished in the literature relating to Internet services
recommendation. Referral is the decentralized approach based
such as: provision trust, where the users trust an entity
on software agents and communities. In the TTP matchmaking
and seek protection from malicious entities; resource ac-
approach, a service description is matched with user’s request
cess trust, describe trust as principle of access resources;
and trust preference. The hybrid approach is the combina-
delegation trust, where the agent (delegate) acts on behalf
tion of different approaches. The idea is to improve some
of users; identity trust, describe the belief that an entity’s
weaknesses of the other approaches by combining different
identity is as claimed; context trust, describes trust in
approaches. The automated trust negotiation approach builds a
the context of the present systems ability to support
mutual trust between service requestors and service providers.
transactions and do remedies; and certification of trustee,
Therefore, in this approach the trust is assessed in two direc-
based on the certification of the trustee by a third party.
tions: the requestor trusts the service/provider and the service
• Categories of trust semantics. Semantics characteristic of
provider trusts the consumer. The automated approach depends
the ratings and trust scores are important to interpret the
on the disclosure of digital credentials between the two parties.
meaning of those measurements. The semantic can be
The rest of the paper is organised as follows: Trust aspects
described in terms of “specificity-generality” dimension
are presented in Section II. Section III presents and analyses
and “subjectivity-objectivity” dimension. Specific mea-
trust definitions in the trust literature. Our proposed trust
sure is based on one trust aspect, while general represents
principles are presented in Section IV. Section V presents the
the average of all aspects. Subjective measure is based
proposed trust definition. Section VI concludes the paper.
on judgement, while objective measure is determined by
II. T RUST A SPECTS assessing the entity against formal criteria [19].

This section presents briefly a number of online trust III. W HAT IS T RUST ?
aspects. This includes: Defining trust is challenging. In the trust literature, there
• Trust development phases. Trust is a dynamic concept are dozens of definitions, in different contexts and situations,
that can be divided into three development phases: trust and considerable variation in the meaning of trust. Trust is
building, where trust is formed; stabilising trust, where an important factor in many interactions involving uncertainty
trust already exists; and dissolution, where trust ends [15]. and dependency. The degree of uncertainty, dependency, and
• Trust characteristics. Some trust characteristics are tran- risk is higher in the online world than the offline world [15].
sitivity, for example, if Alice trusts Bob, and Bob trusts In the following, analysis of trust definitions in the offline
Sam, then Alice can trust Sam; context specific, trust and the online world are presented to extract the important
depends on context, for example, someone may trust a components of a trust definition.
person based on the specific context (as a doctor) but
not in another context (as a chef); multi-faceted, different A. Trust Definitions in the Offline World
trust needs to be developed for different aspects of the In English, trust means: reliability; reliance on the integrity;
domain/entity, for example, trust based on some QoS confident expectation; obligation or responsibilities imposed
properties (performance, scalability, delivery timeliness, on someone/something in whom confidence or authority is
.etc) for one domain and other QoS properties for an- placed; a fiduciary relationship; being left in guardianship
other domain; and dynamic, trust may change, decrease, of another; believe, rely; dependence; certainty; faith; no
fear of consequences; commit; hope [20][21]. Companionship, There are two common definitions of trust in literature:
friendship, love, agreement, relaxation, and comfort are some reliability trust and decision trust. Reliability trust [26] is a
emotions associated with trust [22]. context where A relies and expects B to perform a given
“Trust is both an emotional and logical act. Emotionally, it action on which its welfare depends. This definition includes
is where you expose your vulnerabilities to people, but believe the dependency and the reliability concepts. Decision trust
they will not take advantage of your openness. Logically, it [27] is “the extent to which one party is willing to depend
is where you have assessed the probabilities of gain and loss, on something or somebody in a given situation with a feel-
calculating expected utility based on hard performance data, ing of relative security, even though negative consequences
and concluded that the person in question will behave in a are possible”. This trust definition includes the concepts of
predictable manner” [22]. People trust others because they dependency, reliability, utility, risk attitude, law enforcement,
have experienced their trustworthiness and because they have insurance and other remedies.
faith in human nature [22]. In Web Services, trust is defined in the WS-Trust specifi-
The hope and vulnerabilities show the presence of risk. cation [28] as “the characteristic that one entity is willing to
The agreement shows that there is a lack of control (e.g., rely upon a second entity to execute a set of actions and/or
monitoring) over the trustee’s behaviour. Therefore, trustor to make assertions about a set of subjects and/or scopes”.
trusts trustee with less perception of control. In addition, it This definition misses the concepts of vulnerability, risk, lack
shows that no Service Level Agreement (SLA) is required of control, and context-specificity. Other studies define and
to ensure the particular action. The logical definition of trust specify trust or reputation as one of the QoS [11][12][10].
includes utility and shows the importance of assessing the Dragoni [10] mentioned that evaluation of trust is a key
trustworthiness of an entity based on the calculation of the QoS aspect of Web Service selection. Maximilian and Singh
trustee’s promised utility. [29] presented the selection of a Web Service based on non-
functional attributes such as QoS and trust. Kalepu et al. [13]
B. Trust Definitions in the Online World add a “verity” metric to the QoS properties for Web Service
selection and define it as “the ability to maintain the lowest
In the online world, trust has been defined in different difference between the projected and achieved levels of service
ways by the researchers and often reflects the paradigms metrics”. However, trust is not a QoS. QoS properties can be
of the researchers’ academic discipline. The most frequently used as information to establish trust.
cited definition is: “Trust is the willingness of a party to Often, trust is confused and used synonymously with terms
be vulnerable to the action of another party based on the such as cooperation, faith, competence, reliance and credibil-
expectation that the other will perform a particular action ity. Cooperation is either a cause or a manifestation of trust.
important to the trustor, irrespective to the ability to monitor or Trust includes reason but faith is the opposite of reason. Trust
control that other party” [23]. This definition implies that there goes beyond the belief in the competence of the trusted party.
is something important to be lost by the trustor (i.e., vulnera- Trust in information means that the information is credible
bility). Trust is a very effective complexity reduction method, or believable [17]. It is possible to rely on a person without
although the user cannot have control on the behaviour of trusting him/her [17][30]. Mayer et al. [23] add the confidence
others [15]. This implies the lack of control. Corritore et al. and predictability terms as synonymous terms. With trust, risk
[17] define online trust as “an attitude of confident expectation is assumed, but with confidence it is not.
in an online situation of risk that one’s vulnerabilities will
not be exploited”. The authors include some key concepts IV. T RUST P RINCIPLES
in their definition, which are risk, vulnerability, expectation,
confidence, and exploitation. Chang et al. [24] define trust as Defining trust principles is important to establish trust. We
“the belief that the Trusting Agent has in the Trusted Agent’s proposes the following trust principles based on the explo-
willingness and capability to deliver a quality of service in a ration and analysis of trust literature in the offline and the
given context and in a given Timeslot”. This definition implies online worlds and the extension of online trust principles [18].
the context-specific characteristic of trust. The developer of a trust system is required to consider the
“Trust is about the ability to predict the behaviour of another following principles that form a basis to establish trust.
party” [25]. Grandison and Sloman [16] define trust as “the
A. Trust and risk
firm belief in the competence of an entity to act dependably,
securely, and reliably within the specified context”. The au- Risk is “the likelihood of an undesirable outcome” [17].
thors defined distrust as “the lack of firm belief in the com- Risk is an intrinsic part of everyday life [1]. There is an
petence of an entity to act dependably, securely and reliably agreement that trust only exists in a risky and uncertain
within a specified context”. The authors mentioned that trust environment. Mayer et al. [23] stated that “the need of trust
is a composition of multiple attributes such as reliability, arises in a risky situation”. Therefore, the trustor should have
honesty, dependability, security, timeliness, and competence, something to lose if trust is violated. If the trustor has a higher
and different attributes have to be considered in different perception of control, the less he has a need to trust [17]. Less
environments where trust will be established. perception of control increases the risk. Trust is the expectation
of the trustee’s behaviour in risky circumstances and the extent parties prove that they are acting with each other. Some of
of their commitment to the rules [18]. authentication methods are: user name and password, digital
There has been very little work on the analysis of the certificate, or tokens [8]. Those methods are used to define
relationship between risk and trust [16]. Risk is the core of the identity of the trustee [31]. Authentication systems provide
trust [18]. Therefore, a technique is required to ensure an such identity using authentication techniques (such as X.509
entity’s reliability in risky exchange situations. In addition, it and PGP) [28][32].
is important also to include penalties, rewards, insurance, and
E. Categories of Trust Semantics
other risk remedies in case something goes wrong to support
trust intention. Semantics characteristic of trust scores is important to
interpret their measurements’ meaning. Trust can be measured
B. Trust development phases based on a specific measure of one trust aspect (e.g., perfor-
Trust goes through three development phases: trust building, mance) or on general measure, which represents the average
stabilising trust, and dissolution [15]. Although most studies of all aspects (e.g., performance, accuracy, and availability).
assume a system where trust and reputations already exist (i.e., Trust measurement can be based on judgement or calculation
stabilising trust phase), it is important to initialise a trust rate to assess the trustworthiness of an entity. Those measurement
for a new entity (i.e., building trust phase) and to address trust approaches provide many alternatives to evaluate trust in trust-
failure and reconstruction (i.e., dissolution trust phase). based systems. In addition, using those approaches can provide
To establish trust, the process should consider all three a flexible way for the trustor to select trustees based on trustor
trust development phases. In the trust building phase, initial preferences.
trust formation is important. For example, the system should
F. Trust relationship properties
initially assign trust rate for any new comer that has no rate.
This phase is a crucial stage in any trust relationship. In the Trust is usually specified in terms of a relationship between
stabilizing trust phase, trust evolves over time and is based a trustor and a trustee. Trust relation can be one-to-one
on interaction and observation between parties. In this phase, between a trustor and a trustee, one-to-many between a trustor
trust is based, for example, on the trustor’s knowledge on the and a group of entities, many-to-one such as between the
trustee from past interactions or recommendation from other members and the manager of a department, and many-to-many
parties. In the dissolution trust phase, trust could be declined, such as the mutual trust between members of a group [16].
and it is important to study the situations of trust decline and Trust may not be symmetric or transitive. A trust relation-
trust rebuilding after a decline. ship is not absolute in that the trustor trusts a trustee with
respect to its ability to perform a specific action within a
C. Dynamic nature of trust specific context. Context specificity implies the multifaceted
Trust is dynamic. Trust changes over time and with further and different degrees aspects of trust. Trust varies with the
experiences [14]. Maximilien and Singh [29] identified self- individual, organisation, and situation. This requires a re-
adjusting trust that is an important characteristic in an open questor to specify the degree level of different trust aspects for
environment. Self-adjusting trust is “The autonomic charac- different entities. For example, executing code in the systems
teristic of a multi-agent system whereby the levels of trust needs higher level of trust than just writing to a file, and
between the interacting parties are dynamically established writing to a file needs a higher level of trust than only reading
and adjusted to reflect recent interactions”. Trust establishment a file (resource access trust) [16].
should consider the dynamic nature of trust. This requires
G. Global and local rate
continuous evaluation of entities’ trustworthiness. Trust broker
opinion, reputation, recommendation, and referral, are some There are two trust rates to predict the trustworthiness of
approaches used, for example, to evaluate, test, personalise, the trustee: local and global rates [33]. Global trust rate is
evolve, and ensure trust. a unique trust score independent of the user who did the
evaluation and define how the community as a whole trusts
D. Trust and identity a specific trustee (i.e., unique reputation seen by all users).
Trust depends on identity. Having identity enables the Local trust rate depends on the user doing the evaluation (i.e.,
history (i.e., past experience) of the interactions to be built and personalized score). Therefore, each trustee may have different
mapped to that identity [18]. Identities allow ratings about a local rates seen by different users. Global trust requires TTP to
specific party from the past to be associated with that same collect reputations (feedbacks) from the trustors about trustees
party in the future [19]. While in the real word the identity in different situations. Local trust requires the user to build
can be established by visual recognition or identification, in the personalised rate about trustees and TTPs. The advantage of
online world, the identity is established using authentication the global rate is that it communicates the experiences, but the
and tokens [28]. Trust can be formed by join values, tasks, information is potentially unreliable and comes from unknown
and goals, and by creating collective identity (e.g., common or anonymous second parties [18]. Local trust is more reliable
team name) [15]. and based on user preferences. Therefore, considering both
The identity trust class ensures that entity’s identity is as global and local rates is important to establish trust, which
claimed [19][16]. Authentication is a mechanism where both helps the trustor to make a better selection decision.
H. Trust is based on information QoS properties can be used as trust information to establish
There is a need to know information about the other party trust. A clear distinction between the two terms should be
to establish trust. A challenge question is: What information considered in the trust establishment process.
should be used to build trust? Information has many dimen- M. Security and privacy
sions and each entity set its own information dimensions and
builds an information model. Entities in online world traverse Security and privacy are important factors to consider in the
many domains with different properties and requirements. For trust establishment process. Security and privacy are consid-
example, a requestor of a service has many requirements ered as important trust information to establish trust in online-
and each seeks for different services’ properties. Therefore, banking and e-marketing. For security, the uncertainty of
defining a unified trust information for such an open envi- transactions can bring several risks because of the technology
ronment is a challenge. Some studies try to define a notion of infrastructure or the actors involved in the online transaction. A
community [34] or address trust in specific domain [4][35][10] technique is required to ensure security and this help establish
to overcome this problem. trust. For privacy, a trustee should accomplishes a task and do
not disclose the trustor’s information. A technique is required
I. First party information to protect the privacy of a trustor’s and this help to build trust.
A first party (a trustee) should provide their information to
N. Provider’s trustworthiness
develop trust. For example, information such as performance,
security, and privacy is used by many commercial sites to Trust ratings of a service and its provider are related and
help establish trust. QoS properties and other information each one affects the other. A trustworthy service provider
(e.g., delivery methods, insurance, privacy, security, pricing, provides trustworthy services. The trustor of a service can
availability) can be considered as important information on select a service based on the service’s rate or/and the service
which to build trust. Other information can help, such as the provider’s rate. For example, a trustor trusts Amazon site for
providers’ properties. services it provides.
Trust in Internet has a clear distinction between the trust-
J. Third party ratings worthiness of the services and the providers. The studies have
An expert opinion from a TTP such as certification au- identified quality requirements for providers to assist their
thority, service broker, or a trust broker, plays an important trustworthiness and help the user on his/her decision to use
role in trust establishment, evolution, and self-adjustment. TTP the providers’ services [23][15]. In web services, the idea
helps the users to get rates of different entities even without of trusting a web service based on its provider is neglected
having direct experience with that entity. A TTP can aggregate [14]. However, there are little studies, which cover trusting
feedbacks and trust rates from trustors, calculate the rates, providers. Considering a provider rates will encourage the
and provide them globally. In addition, TTP can assess the provider to provide high quality services because the trust rate
trustworthiness of an entity by doing self calculation and of the provider and each of its services are related.
evaluation of the entities and provide its opinion globally.
O. Trustor preferences
Trustors consult a TTP for the trustworthiness of a trustee.
The assumption is that this TTP is a trusted party and the Trust is context specific, muti-faceted, not absolute, matter
consumers rely on its result [19]. Assuming that TTP is a of degree, and may not be symmetric or transitive. Therefore,
trusted party constitutes the introduction of a security hole a trust-based system should support trustor preferences. The
and it is important to plug this hole. importance of trustor preferences comes from the difference
on preferences between different trustors. This will imply
K. Trust approaches different trust rates for the same trustee seen by different
Trust approaches, as discussed in Section I, such as di- trustors (i.e., personalized trust rate). A trustor should be
rect experience, reputation, recommendation, referral, and able to select a trustee based on the trustor preferences. In
matchmaking help build and evolve trust. Those approaches service selection, a requestor may request a service based
help provide global/local rates. Combining different trust ap- on its performance and security, given a degree of 60% for
proaches (i.e Hybrid approach) improves some of the other the performance and 100% for the security. The web is an
approaches’ weaknesses and results in a better and more robust open system that spans different countries, regulations, and
approach to establish trust. Weaknesses and challenges in cultures. Those differences impact the trust building process.
trust literature (e.g., unfair rating) should be resolved in trust Consider trustor preferences mitigates the division of trust
establishment process. between different countries and cultures.

L. The distinction between trust and QoS P. Trust classes


There is a clear distinction between trust and QoS defini- Provision, delegation, context, and certification of trustee
tions. Trust is not a QoS aspect of an entity. In Web Services, are trust classes [19][16]. To establish trust, it is important
trust has been studied as a QoS or based on a set of QoS to consider trust classes. In provision trust, a requestor can
properties. However, trust goes beyond QoS of a Web Service. rely on a trust broker to rate a trustee and seek protection
from malicious services. Delegation plays a big role in trust [9] D. Hoyle, Automotive Quality Systems Handbook, second edition ed.
establishment. A trustor can delegate a TTP or an agent to Elsevier Ltd, 2005.
[10] N. Dragoni, “Toward trustworthy web services - approaches, weaknesses
act on his/her behalf to identify an entity’s trustworthiness. and trust-by-contract framework,” IEEE/WIC/ACM International Con-
In context trust, the system can support trust by having the ference on Web Intelligence and Intelligent Agent Technology, vol. 3,
ability to support transactions and do remedies (e.g., use pp. 599–606, 2009.
[11] Z. Ying-feng and S. Pei-ji, “The model for consumer trust in c2c online
law enforcement, insurance) in case something goes wrong. auction,” ICMSE ’06 International Conference on Management Science
Certification of the trustee can help to build trust. Having a and Engineering, pp. 125 –129, oct. 2006.
certification from third parties can enhance and ensure the [12] M. N. Huhns and M. P. Singh, “Service-oriented computing: Key
concepts and principles,” IEEE Internet Computing, vol. 9, pp. 75–81,
trustee’s trustworthiness. A trustor should trust certification 2005.
from the TTP given to the trustee. [13] S. Kalepu, S. Krishnaswamy, and S. Loke, “Verity: a QoS metric for
selecting web services and providers,” Proceedings Fourth WISEW, pp.
V. T RUST D EFINITION 131 – 139, Dec. 2003.
[14] Y. Wang and J. Vassileva, “A review on trust and reputation for web ser-
Trust is a complex subjective term. Based on the analysis vice selection,” in ICDCSW ’07: Proceedings of the 27th International
of trust definition in Section III, the trust definition should Conference on Distributed Computing Systems Workshops. Washington,
includes the concepts of dependency, confidence expectation, DC, USA: IEEE Computer Society, 2007, p. 25.
[15] T. Kautonen and Karjaluoto, Eds., Trust and New Technologies: Mar-
vulnerability, reliability, comfort, utility, context-specificity, keting and Management on the Internet and Mobile Media. Edward
risk attitude, and lack of control. In addition, the definition Elgar, 2008.
should show the assessment of trust by calculating promised [16] T. Grandison and S. Sloman, “A survey of trust in internet applications.”
IEEE Communications Surveys and Tutorials, vol. 3, no. 4, 2000.
utility. Trust should not be used synonymously with many [17] C. L. Corritore, B. Kracher, and S. Wiedenbeck, “On-line trust: concepts,
terms such as trustworthiness, cooperation, faith, or QoS. evolving themes, a model,” Int. J. Hum.-Comput. Stud., vol. 58, no. 6,
Therefore, this work proposes the following definition of trust: pp. 737–758, 2003.
[18] M. Daignault, M. Shepherd, S. Marche, and C. Watters, “Enabling trust
Trust is the willingness of the trustor to rely on a trustee to online,” in ISEC ’02: Proceedings of the Third International Symposium
do what is promised in a given context, irrespective of the on Electronic Commerce. IEEE Computer Society, 2002, p. 3.
ability to monitor or control the trustee, and even though [19] A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation
systems for online service provision,” Decis. Support Syst., vol. 43, no. 2,
negative consequences may occur. pp. 618–644, 2007.
A trustworthy entity is an entity that behaves according to its [20] “Dictionary.com,” http://dictionary.reference.com/browse/trust (last ac-
promised role, that reciprocates a trustor’s trust by completing cessed June 8, 2010).
[21] “Merriam webster online dictionary,” http://www.merriam-
the interaction as agreed, and holds a positive attitude toward webster.com/dictionary/trust (last accessed June 8, 2010).
the trustor’s goodwill and welfare. For example, a trustworthy [22] S. David, Changing Minds: in Detail. Syque Press, 2008.
entity has a high reliability, performs an action within reason- [23] R. C. Mayer, J. H. Davis, and F. D. Schoorman, “An integrative model
of organizational trust,” The Academy of Management Review, vol. 20,
able time, and will not disclose privacy information. no. 3, pp. 709–734, 1995.
[24] E. Chang, T. Dillon, and F. Hussain, “Trust and reputation relationships
VI. C ONCLUSIONS in service-oriented environments,” ICITA 2005. Third International
This paper reviews trust in the offline and the online Conference on Information Technology and Applications, vol. 1, pp. 4
– 14 vol.1, july 2005.
worlds, and explores the trust area to extract trust definition [25] L. Buttyan and J. Hubaux, Security and Cooperation in Wireless
components and trust principles. Proposed trust definition and Networks: Thwarting Malicious and Selfish Behavior in the Age of
principles are presented. Trust definition and trust principles Ubiquitous Computing. New York, NY, USA: Cambridge University
Press, 2007.
provide a solid starting point and form the basis to establish [26] D. Gambetta, “Can we trust trust?” in Trust: Making and Breaking
trust. We are in the process of defining trust information and Cooperative Relations. Basil Blackwell, 1988, pp. 213–237.
building trust models and framework to support trust definition [27] D. H. McKnight and N. L. Chervany, “The meanings of trust,” Technical
report MISRC Working Paper, University of Minnesota, 1996.
and principles. [28] L. Kelvin, K. Chris, N. Anthony, G. Marc, G. Martin, B. Abbie, and
G. Hans, “Ws-trust 1.4,” Tech. Rep., February 2009.
R EFERENCES [29] E. Maximilien and M. Singh, “Toward autonomic web services trust
[1] R. Song, L. Korba, and G. Yee, Trust in E-services: Technologies, and selection,” in ICSOC, M. Aiello, M. Aoyama, F. Curbera, and M. P.
Practices and Challenges. IGI Global, 2007. Papazoglou, Eds. ACM, 2004, pp. 212–221.
[2] J. V. Dyke, “Establishing federated trust networks among web services,” [30] K. J. Blois, “Trust in business to business relationships: An evaluation of
Bachelor thesis of Science in Computer Engineering, University of its status,” Journal of Management Studies, vol. 36, no. 2, pp. 197–215,
Virginia, 2004. 03 1999.
[3] P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, “Reputation [31] Entrust, “Web services trust and xml security standards,” April 2001.
systems,” Commun. ACM, vol. 43, no. 12, pp. 45–48, 2000. [32] A. Abdul-Rahman, “The PGP trust model,” Journal of Electronic
[4] T. A. Khopkar, “Provision, interpretation and effects of feedback in Commerce, 1997.
reputation systems,” Ph.D. dissertation, School of Information, The [33] P. Massa and P. Avesani, “Trust metrics on controversial users: balancing
University of Michigan, 2008. between tyranny of the majority and echo chambers,” International
[5] M. P. Papazoglou and D. Georgakopoulos, Eds., Service-Oriented Com- Journal on Semantic web and Information Systems, 2007.
puting. Cambridge, MA: The MIT Press, 2008. [34] Z. Malik and A. Bouguettaya, “Reputation bootstrapping for trust
[6] M. Rosen, B. Lublinsky, K. T. Smith, and M. J. Balcer, Applied SOA: establishment among web services,” IEEE Internet Computing, vol. 13,
Service-Oriented Architecture and Design Strategies. Wiley Publishing, no. 1, pp. 40–47, 2009.
2008. [35] G. Zacharia, A. Moukas, and P. Maes, “Collaborative reputation mech-
[7] M. Yuan and J. Long, “Securing wireless j2me,” IBM, Tech. Rep., 2002. anisms for electronic marketplaces,” Decision Support Systems, vol. 29,
[8] M. Papazoglou, Web Services: Principles and Technology. Printice no. 4, pp. 371–388, 2000.
Hall, 2008.

View publication stats

You might also like