IRIS: A novel method of direct trust computation for generating trusted social networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Improving trust in social networks appears as the first step toward addressing the existing confidence and privacy concerns related to online social networks. Direct trust is used to develop different trust-based methods such as transitivity and access control, however how to compute direct trust levels is rarely discussed in the literature. To address some of the current limitations, we introduce a novel approach for generating trusted social networks and we compute trust levels between users having direct relationships. Experimental results with data extracted from FOAF files show that our work presents high accuracy.

Original languageEnglish
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
PublisherIEEE Computer Society
Pages616-623
Number of pages8
ISBN (Print)9780769547459
DOIs
Publication statusPublished - 1 Jan 2012
Externally publishedYes
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: 25 Jun 201227 Jun 2012

Publication series

NameProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Country/TerritoryUnited Kingdom
CityLiverpool
Period25/06/1227/06/12

Keywords

  • Social networks
  • direct trust
  • trusted relationships

Fingerprint

Dive into the research topics of 'IRIS: A novel method of direct trust computation for generating trusted social networks'. Together they form a unique fingerprint.

Cite this