Skip to main content

Contradictory information flow in networks with trust and distrust

  • Conference paper
  • First Online:
Complex Networks & Their Applications V (COMPLEX NETWORKS 2016 2016)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 693))

Included in the following conference series:

Abstract

We offer a proof system and a NetLogo simulation for trust and distrust in networks where contradictory information is shared by ranked lazy and sceptic agents. Trust and its negative are defined as properties of edges: the former is required when a message is passed bottom-up in the hierarchy or received by a sceptic agent; the latter is attributed to channels that require contradiction resolution, or whose terminal is a lazy agent. These procedures are associated with epistemic costs, respectively for confirmation and refutation. We describe the logic, illustrate the algorithms implemented in the model and then focus on experimental results concerning the analysis of epistemic costs, the role of the agents’ epistemic attitude on distrust distribution and the influence of (dis)trust in reaching consensus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carbone, M., Nielsen, M., Sassone, V.: A Formal Model for Trust in Dynamic Networks. In: A. Cerone, P. Lindsay (eds.) Int. Conference on Software Engineering and Formal Methods, SEFM 2003., pp. 54–61. IEEE Computer Society (2003). URL http://eprints.soton. ac.uk/262294/. A preliminary version appears as Technical Report BRICS RS-03-4, Aarhus University

  2. Chakraborty, S., Ray, I.: TrustBAC: Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT ’06, pp. 49–58. ACM, New York, NY, USA (2006). DOI 10.1145/1133058.1133067. URL http://doi.acm.org/10.1145/1133058.1133067

  3. Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A Location and Time-based RBAC Model. In: Proceedings of the 6th International Conference on Web Information Systems Engineering, WISE’05, pp. 361–375. Springer-Verlag, Berlin, Heidelberg (2005). DOI 10.1007/11581062 27. URL http://dx.doi.org/10.1007/11581062_27

  4. Grandi, U., Lorini, E., Perrussel, L.: Propositional Opinion Diffusion. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, AAMAS’15, pp. 989–997. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC (2015). URL http://dl.acm.org/citation.cfm?id=2772879. 2773278

  5. Granovetter, M.: Threshold models of collective behavior. American Journal of Sociology 83(6), 1420–1443 (1978)

    Google Scholar 

  6. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of Trust and Distrust. In: Proceedings of the 13th International Conference on World Wide Web, WWW ’04, pp. 403–412. ACM, New York, NY, USA (2004). DOI 10.1145/988672.988727. URL http: //doi.acm.org/10.1145/988672.988727

  7. Hegselmann, R., Krause, U.: Opinion dynamics and bounded confidence models, analysis, and simulations. Journal of Artificial Societies and Social Simulation 5(3), 2002

    Google Scholar 

  8. Jøsang, A., Pope, S.: Semantic Constraints for Trust Transitivity. In: S. Hartmann, M. Stumptner (eds.) APCCM, CRPIT, vol. 43, pp. 59–68. Australian Computer Society (2005)

    Google Scholar 

  9. Kempe, D., Kleinberg, J.M., Tardos, E.: Influential nodes in a diffusion model for social networks. In: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (2005)

    Google Scholar 

  10. Lehrer, K., Wagner, C.: Rational Consensus in Science and Society. D. Reidel Publishing Company (1981)

    Google Scholar 

  11. Marsh, S., Dibben, M.: Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side. In: P. Herrmann, V. Issarny, S. Shiu (eds.) Trust Management, Lecture Notes in Computer Science, vol. 3477, pp. 17–33. Springer Berlin Heidelberg (2005). DOI 10.1007/11429760 2. URL http://dx.doi.org/10.1007/11429760_2

  12. Massa, P., Avesani, P.: Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community. In: Proceedings, The Twentieth National Conference on Artificial Intelligence and the Seventeenth Innovative Applications of Artificial Intelligence Conference, July 9-13, 2005, Pittsburgh, Pennsylvania, USA, pp. 121–126 (2005). URL http://www.aaai.org/Library/AAAI/2005/aaai05-020.php

    Google Scholar 

  13. McKnight, D.H., Chervany, N.L.: Trust and Distrust Definitions: One Bite at a Time. In: R. Falcone, M.P. Singh, Y. Tan (eds.) Trust in Cyber-societies, Integrating the Human and Artificial Perspectives, Lecture Notes in Computer Science, vol. 2246, pp. 27–54. Springer (2000). DOI 10.1007/3-540-45547-7 3. URL http://dx.doi.org/10.1007/3-540-45547-7_3

  14. Oleshchuk, V.A.: Trust-Aware RBAC. In: I.V. Kotenko, V.A. Skormin (eds.) MMM-ACNS, Lecture Notes in Computer Science, vol. 7531, pp. 97–107. Springer (2012). URL http://dblp.uni-trier.de/db/conf/mmmacns/mmmacns2012.html#Oleshchuk12

  15. Primiero, G.: A Calculus for Distrust and Mistrust. In: S.M. Habib, J. Vassileva, S. Mauw, M. M¨uhlh¨auser (eds.) Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings, IFIP Advances in Information and Communication Technology, vol. 473, pp. 183–190. Springer (2016). DOI 10.1007/978-3-319-41354-9 15. URL http://dx.doi.org/10.1007/978-3-319-41354-9_15

  16. Primiero, G., Raimondi, F.: A typed natural deduction calculus to reason about secure trust. In: A. Miri, U. Hengartner, N. Huang, A. Jøsang, J. Garc´ıa-Alfaro (eds.) 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 379–382. IEEE (2014). DOI 10.1109/PST.2014.6890963. URL http: //dx.doi.org/10.1109/PST.2014.6890963

  17. Primiero, G., Tagliabue, J.: Quantifying epistemic trust in networks with contradictory information. Tech. rep. (2016)

    Google Scholar 

  18. Raghavan, U.N., Albert, R., Kumara, S.: Near linear time algorithm to detect community structures in large-scale networks. Physical Reviews E 76(3) (2007)

    Google Scholar 

  19. Wilensky, U.: NetLogo, Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, IL. http://ccl.northwestern.edu/netlogo/ (1999)

  20. Zicari, P., Interdonato, R., Perna, D., Tagarelli, A., Greco, S.: Controversy in Trust Networks. In: Procs. 9th Int. Conf. on Trust and Trustworthy Computing (TRUST), Vienna, Austria, August 29-30, 2016, pp. 82–100 (2016). DOI 10.1007/978-3-319-45572-3 5

  21. Ziegler, C.N., Lausen, G.: Propagation Models for Trust and Distrust in Social Networks. Information Systems Frontiers 7(4-5), 337–358 (2005). DOI 10.1007/s10796-005-4807-3. URL http://dx.doi.org/10.1007/s10796-005-4807-3

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giuseppe Primiero .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Primiero, G., Bottone, M., Raimondi, F., Tagliabue, J. (2017). Contradictory information flow in networks with trust and distrust. In: Cherifi, H., Gaito, S., Quattrociocchi, W., Sala, A. (eds) Complex Networks & Their Applications V. COMPLEX NETWORKS 2016 2016. Studies in Computational Intelligence, vol 693. Springer, Cham. https://doi.org/10.1007/978-3-319-50901-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50901-3_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50900-6

  • Online ISBN: 978-3-319-50901-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics