Distributed Trust Algorithms: Difference between revisions

From Konfidi
Jump to navigationJump to search
No edit summary
No edit summary
 
Line 37: Line 37:
<td>weighted</td>
<td>weighted</td>
<td>avoid cycles, a couple cutoff thresholds</td>
<td>avoid cycles, a couple cutoff thresholds</td>
</tr>
<tr>
<td>[http://www.trustlet.org/wiki/Appleseed Appleseed]</td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
</tr>
</tr>



Latest revision as of 18:30, 23 June 2008

Between people

Name Based on psych. research? Data model Concatenation of x -> y Multiple paths notes
Konfidi Multiplicative2 N [0,1] (x*y)½ maximum
TidalTrust N 1-10
MoleTrust N [0,1] (x*y) weighted avoid cycles, a couple cutoff thresholds
Appleseed
Advogato Uses Network Flow theory; has central root nodes
Patricia Victor's Y, starting to bilattice
OpenPGP N untrusted, marginal, full, ultimate


Between agents

Reputation is generally part of the algorithm

Valuation of Trust in Open Networks

Beth, Borcherding, Klein 1994

N [0,1) 1-(1-y)x average trust values intertwined with # of "good" or "bad" experiences with an entity. Pay attention to "recommendation trust"
EigenTrust