{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:04:22Z","timestamp":1777651462257,"version":"3.51.4"},"reference-count":195,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100005713","name":"Office of the Secretary of Defense","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005713","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2015,11,21]]},"abstract":"<jats:p>The concept of trust and\/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships based on cooperation and collaboration. Even if substantial research effort has been dedicated to addressing trust-based mechanisms or trust metrics (or computation) in diverse contexts, prior work has not clearly solved the issue of how to model and quantify trust with sufficient detail and context-based adequateness. The issue of trust quantification has become more complicated as we have the need to derive trust from complex, composite networks that may involve four distinct layers of communication protocols, information exchange, social interactions, and cognitive motivations. In addition, the diverse application domains require different aspects of trust for decision making such as emotional, logical, and relational trust. This survey aims to outline the foundations of trust models for applications in these contexts in terms of the concept of trust, trust assessment, trust constructs, trust scales, trust properties, trust formulation, and applications of trust. We discuss how different components of trust can be mapped to different layers of a complex, composite network; applicability of trust metrics and models; research challenges; and future work directions.<\/jats:p>","DOI":"10.1145\/2815595","type":"journal-article","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T18:31:00Z","timestamp":1444761060000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":290,"title":["A Survey on Trust Modeling"],"prefix":"10.1145","volume":"48","author":[{"given":"Jin-Hee","family":"Cho","sequence":"first","affiliation":[{"name":"US Army Research Laboratory, Adelphi, MD"}]},{"given":"Kevin","family":"Chan","sequence":"additional","affiliation":[{"name":"US Army Research Laboratory, Adelphi, MD"}]},{"given":"Sibel","family":"Adali","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute, Troy, NY"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2490542"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864722"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7466396"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.115"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1161595"},{"key":"e_1_2_1_7_1","unstructured":"J. Bank and B. Cole. 2008. Calculating the Jaccard similarity coefficient with map reduce for entity pairs in Wikipedia. Wikipedia Similarity Team. (Dec. 2008)."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 43th IEEE Conference on Decision and Control. Atlantis, Paradise Island, Bahamas.","author":"Baras J. S.","unstructured":"J. S. Baras and T. Jiang. 2004. Cooperative games, phase transitions on graphs and distributed trust in MANET. In Proceedings of the 43th IEEE Conference on Decision and Control. Atlantis, Paradise Island, Bahamas."},{"key":"e_1_2_1_9_1","volume-title":"The Logic and Limits of Trust","author":"Barber B.","unstructured":"B. Barber. 1983. The Logic and Limits of Trust. Rutgers University Press, New Brunswick, NJ."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/62.839632"},{"key":"e_1_2_1_11_1","unstructured":"E. Blasch. 1999. Derivation of a Belief Filter for High Range Resolution Radar Simultaneous Target Tracking and Identification. Ph.D. Dissertation. Wright State University."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the IEEE 17th International Conference on Information Fusion","author":"Blasch E.","year":"2014","unstructured":"E. Blasch, A. J\u00f8sang, J. Dezert, P. C. G. Costa, K. B. Laskey, and A.-L. Jousselme. 2014. URREF self-confidence in information fusion trust. In Proceedings of the IEEE 17th International Conference on Information Fusion. Salamanca, Spain, 1--8."},{"key":"e_1_2_1_13_1","volume-title":"IEEE 16th International Conference on Information Fusion.","author":"Blasch E.","unstructured":"E. Blasch, K. B. Laskey, A.-L. Joussselme, V. Dragos, P. C. G. Cost, and J. Dezert. 2013. URREF reliability versus credibility in information fusion (STANAG 2511). In IEEE 16th International Conference on Information Fusion."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition","volume":"4729","author":"Blasch E. P.","unstructured":"E. P. Blasch and S. Plano. 2002. JDL level 5 fusion model \u201cuser refinement\u201d issues and applications in group tracking. In Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition, Vol. 4729. 270--279."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IEEE International Conference on Information Fusion","author":"Blasch E. P.","unstructured":"E. P. Blasch, P. Valin, and E. Bosse. 2010. Measures of effectiveness for high-level fusion. In Proceedings of the IEEE International Conference on Information Fusion. Edinburgh, Scotland, 1--8."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.51"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456650.1456651"},{"key":"e_1_2_1_18_1","volume-title":"16th IMP International Conference.","author":"Blomqvist K.","unstructured":"K. Blomqvist and P. Stahle. 2000. Building organizational trust. In 16th IMP International Conference."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"e_1_2_1_20_1","unstructured":"S. Boon and J. G. Holmes. 1991. The dynamics of interpersonal trust: Resolving uncertainty in the face of risk. In Cooperation and Prosocial Behavior R. A. Hinde and J. Groebel (Eds.). Cambridge University Press."},{"key":"e_1_2_1_21_1","volume-title":"Theory and Research for the Sociology of Education","author":"Bourdieu P.","unstructured":"P. Bourdieu. 1983. Forms of capital. In Theory and Research for the Sociology of Education, R. A. Hinde and J. Groebel (Eds.). Greenwood Press, New York."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.so.15.080189.000525"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2074094.2074100"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-3085(00)22009-1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","unstructured":"S. J. Cammarata D. J. McArthur and R. Steeb. 1988. Strategies of cooperation in distributed problem solving. In Distributed Artificial Intelligence. Morgan Kaufmann Publishers Inc. San Francisco CA USA 102--105.","DOI":"10.5555\/60204.60208"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 1st International Conference on Multi-Agent Systems (ICMAS\u201995)","author":"Castelfranchi C.","year":"1995","unstructured":"C. Castelfranchi. 1995. Social commitment: From individual intentions to groups and organizations. In Proceedings of the 1st International Conference on Multi-Agent Systems (ICMAS\u201995). AAAI-MIT Press, San Francisco, California, USA, 41--49."},{"key":"e_1_2_1_28_1","volume-title":"Computing with Social Trust","author":"Castelfranchi C.","unstructured":"C. Castelfranchi. 2009. A non-reductionist approach to trust. In Computing with Social Trust, J. Golbeck (Ed.). Springer, London Limited, Human-Computer Interaction Series."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/551984.852234"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0921-8890(98)00028-1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"C. Castelfranchi and R. Falcone. 2000. Trust and control: A dialectic link. Applied Artificial Intelligence Journal:Special Issue on Trust in Agent Part I 14 8 (2000) 799--823.","DOI":"10.1080\/08839510050127560"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875387"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCS.2009.208"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM\u201910)","author":"Chen I. R.","unstructured":"I. R. Chen, F. Bao, M. J. Chang, and J. H. Cho. 2010. Trust management for encounter-based routing in delay tolerant networks. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM\u201910). Miami, Florida, USA, 1--6."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2009.5067469"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2606265.2606965"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.68"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"e_1_2_1_40_1","volume-title":"Trust, Complexity and Control: Confidence in a Convergent World","author":"Cofta P.","unstructured":"P. Cofta. 2007. The dark side. In Trust, Complexity and Control: Confidence in a Convergent World. Wiley, Chichester, UK, 103--117."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1086\/228943"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1130234.1130285"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00030"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.161"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"R. Deepa and S. Swamynathan. 2014. A trust model for directory-based service discovery in mobile ad hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science G. Mart\u00ednez P\u00e9rez et al. (Eds.). Vol. 420. Springer-Verlag Berlin Heidelberg 115--126.","DOI":"10.1007\/978-3-642-54525-2_10"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1781454.1781485"},{"key":"e_1_2_1_47_1","unstructured":"J. Dezert and F. Smarandache. 2004. Advances on DSmT. In Advances and Applications of DSmT for Information Fusion Florentin Smarandache and Jean Dezert (Eds.). American Research Press Rehoboth NM USA."},{"key":"e_1_2_1_48_1","volume-title":"Graph Theory (4th. ed.)","author":"Diestel R.","unstructured":"R. Diestel. 2010. Graph Theory (4th. ed.). Vol. 173. Springer, Heidelberg. Graduate Texts in Mathematics."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066650.1066656"},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","unstructured":"P. Dondio L. Longo and S. Barrett. 2008. A translation mechanism for recommendations. In Trust Management II Y. Karabulut J. Mitchell P. Hermann and C. D. Jensen (Eds.). Vol. 263. Springer Boston Massachusetts USA. IFIP International Federation for Information Processing 87--102.","DOI":"10.1007\/978-0-387-09428-1_6"},{"key":"e_1_2_1_51_1","volume-title":"Rational Decision Making","author":"Doyle J.","unstructured":"J. Doyle. 1997. Rational Decision Making, R. Wilson and F. Kiel (Eds.). MIT Press, Cambridge, Massachusetts. The MIT Encyclopedia of the Cognitive Sciences."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.88.5.736"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2004.tb02627.x"},{"key":"e_1_2_1_54_1","volume-title":"Automation and Human Performance: Theory and Applications - Human Factors in Transportation","author":"Endsley M. R.","unstructured":"M. R. Endsley. 1996. Automation and situation awareness. In Automation and Human Performance: Theory and Applications - Human Factors in Transportation, R. Parasuraman and M. Mouloua (Eds.). Lawrence Erlbaum Associates, Inc., Hillsdale, NJ, England."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/938984.939763"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.007"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/646674.701821"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1473018.1473028"},{"key":"e_1_2_1_59_1","volume-title":"Distrust","author":"Farrell H.","unstructured":"H. Farrell. 2009. Distrust. In Trust, Distrust, and Power, R. Hardin (Ed.). Russell Sage Foundation, New York, 84--105."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1214\/06-BA101"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the 5th International Conference on Digital Information Management. Thunder Bay, ON, 266--273","author":"Fong S.","unstructured":"S. Fong and W. Chen. 2010. Social network collaborative filtering framework and online trust factors: A case study on Facebook. In Proceedings of the 5th International Conference on Digital Information Management. Thunder Bay, ON, 266--273."},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the International Conference on Future Generation Communication Technology","author":"Fong S.","unstructured":"S. Fong, Y. Zhuang, M. Yu, and I. Ma. 2012. Quantitative analysis of trust factors on social network using data mining approach. In Proceedings of the International Conference on Future Generation Communication Technology. London, UK, 70--75."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90017-N"},{"key":"e_1_2_1_66_1","volume-title":"Can we trust trust? In Trust: Making and Breaking Cooperative Relations","author":"Gambetta D.","unstructured":"D. Gambetta. 1988. Can we trust trust? In Trust: Making and Breaking Cooperative Relations, D. Gambetta (Ed.). Basil Blackwell, New York, USA, 213--237."},{"key":"e_1_2_1_67_1","volume-title":"Philosophical Theories of Probability","author":"Gillies D.","unstructured":"D. Gillies. 2000. The subjective theory. In Philosophical Theories of Probability. Routledge."},{"key":"e_1_2_1_68_1","article-title":"Betweenness centrality correlation in social networks","volume":"67","author":"Goh K.-I.","year":"2003","unstructured":"K.-I. Goh, E. Oh, B. Kahng, and D. Kim. 2003. Betweenness centrality correlation in social networks. Physical Review 67, 1 (2003), 010101:1--010101:4.","journal-title":"Physical Review"},{"key":"e_1_2_1_69_1","volume-title":"Computing with Social Trust","author":"Golbeck J.","unstructured":"J. Golbeck. 2009. Introduction to computing with social trust. In Computing with Social Trust, J. Golbeck (Ed.). Springer, London, 1--5. Human-Computer Interaction Series."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/11839354_26"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)00248-9"},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the 13th Autonomous Agents & Multi-Agent Systems Conference - Workshop on Trust in Agent Societies","author":"Hang C. W.","unstructured":"C. W. Hang and M. P. Singh. 2010. Trust-based recommendation based on graph similarity. In Proceedings of the 13th Autonomous Agents & Multi-Agent Systems Conference - Workshop on Trust in Agent Societies. Toronto, Canada."},{"key":"e_1_2_1_73_1","volume-title":"cooperation and trust in animals","author":"Harcourt A. H.","unstructured":"A. H. Harcourt. 1991. Help, cooperation and trust in animals. In Cooperation and Prosocial Behaviour, R. Hinde and J. Groebel (Eds.). Cambridge University Press, 15--26."},{"key":"e_1_2_1_74_1","volume-title":"Russell Sage Foundation","author":"Hardin R.","unstructured":"R. Hardin. 2002. Trustworthiness. Trust and Trustworthiness. Russell Sage Foundation, New York, 28--53."},{"key":"e_1_2_1_75_1","doi-asserted-by":"crossref","unstructured":"O. Hasan L. Brunie J. M. Pierson and E. Bertino. 2009. Elimination of subjectivity from trust recommendation. In 2009 IFIP Advances in Information and Communication Technology-Trust Management III. Vol. 300. Springer Boston USA. IFIP International Federation for Information Processing 65--80.","DOI":"10.1007\/978-3-642-02056-8_5"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","unstructured":"A. Heddaya and A. Helal. 1996. Reliability Availability Dependability and Performability: A User-Centered View. Technical Report. Computer Science Department Boston University.","DOI":"10.5555\/864323"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(91)90051-K"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.10.001"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1527017.1527021"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2681(01)00214-1"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(03)00140-1"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.polisci.2.1.297"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201999)","author":"J\u00f8sang A.","year":"1999","unstructured":"A. J\u00f8sang. 1999. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS\u201999)."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust","author":"J\u00f8sang A.","unstructured":"A. J\u00f8sang, E. Gray, and M. Kinateder. 2003. Analyzing topologies of transitive trust. In Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust. Pisa, Italy, 9--22."},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the 15th International Conference on Information Fusion","author":"J\u00f8sang A.","unstructured":"A. J\u00f8sang and R. Hankin. 2012. Interpretation and fusion of hyper opinions in subjective logic. In Proceedings of the 15th International Conference on Information Fusion. Singapore, 1225--1232."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/1151699.1151710"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/1082276.1082284"},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the 2nd International Conference on Trust Management (iTrust\u201904)","volume":"2995","author":"J\u00f8sang A.","unstructured":"A. J\u00f8sang and S. L. Presti. 2004. Analyzing the relationship between risk and trust. In Proceedings of the 2nd International Conference on Trust Management (iTrust\u201904), Vol. 2995. Springer, 135--145."},{"key":"e_1_2_1_93_1","unstructured":"L. R. Kalnbach and B. M. Lantz. 1997. The Effects of Optimism and Willingness to Trust on Work-Related Attitudes and Behaviors: An Application to the Commercial Vehicle Industry. Technical Report. North Dakota State University."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_95_1","volume-title":"Proceedings of the AISB Symposium on Behavior Regulation in Multi-Agent Systems (BRMAS\u201908)","author":"Keung S.","unstructured":"S. Keung and N. Griffiths. 2008. Using recency and relevance to assess trust and reputation. In Proceedings of the AISB Symposium on Behavior Regulation in Multi-Agent Systems (BRMAS\u201908). Aberdeen, UK."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460639"},{"key":"e_1_2_1_97_1","volume-title":"Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology 50 (Feb","author":"Kramer R. M.","year":"1999","unstructured":"R. M. Kramer. 1999. Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology 50 (Feb. 1999), 569--598."},{"key":"e_1_2_1_98_1","volume-title":"A blind spot of philosophy. Trust and Mistrust in International Relations","author":"Kydd A. H.","unstructured":"A. H. Kydd. 2005. A blind spot of philosophy. Trust and Mistrust in International Relations. Princeton University Press."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009935315332"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.126"},{"key":"e_1_2_1_101_1","volume-title":"The Loyola Symposium.","author":"Lazarus R. S.","unstructured":"R. S. Lazarus, J. R. Averill, and E. M. Opton. 1970. Towards a cognitive theory of emotion. In Feelings and Emotions, M. B. Arnold (Ed.). Academic Press, New York, 207--232. The Loyola Symposium."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139208967392"},{"key":"e_1_2_1_103_1","first-page":"1","article-title":"Trust in automation: Designing for appropriate reliance","volume":"40","author":"Lee J. D.","year":"2006","unstructured":"J. D. Lee and K. A. See. 2006. Trust in automation: Designing for appropriate reliance. Human Factors 40, 1 (Spring 2006), 50--80.","journal-title":"Human Factors"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.06.004"},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the World Automation Congress (WAS\u201906)","author":"Lesani M.","unstructured":"M. Lesani and S. Bagheri. 2006. Fuzzy trust inference in trust graphs and its application in semantic web social networks. In Proceedings of the World Automation Congress (WAS\u201906). Budapest, Hungary, 1--6."},{"key":"e_1_2_1_106_1","unstructured":"R. J. Lewicki and B. B. Bunker. 1995. Trust in relationships: A model of development and decline. In Conflict Cooperation and Justice: Essays Inspired by the Work of Morton Deutsch Barbara Benedict Bunker and Jeffrey Z. Rubin (Eds.). Jossey-Bass Inc. San Francisco CA 133--173. he Jossey-Bass conflict resolution series."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.2307\/2578601"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481349"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833657"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.124"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2030730"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.218"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2008.2011312"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1108\/16605371011083503"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1840784.1840804"},{"key":"e_1_2_1_117_1","volume-title":"Trust and Power","author":"Luhmann N.","unstructured":"N. Luhmann. 1979. Trust and Power. John Wiley & Sons Inc."},{"key":"e_1_2_1_118_1","unstructured":"N. Luhmann. 1990. Familiarity confidence trust: problems and alternatives. In Trust D. Gambetta (Ed.). Blackwell."},{"key":"e_1_2_1_119_1","volume-title":"Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN\u201908)","author":"Luo J.","unstructured":"J. Luo, X. Liu, Y. Zhang, D. Ye, and Z. Xu. 2008. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. In Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN\u201908). Montreal, Que, 305--311."},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2010.151"},{"key":"e_1_2_1_121_1","volume-title":"Proceedings of Annual Conference on Privacy, Security and Trust. 113--120","author":"Mahoney G.","unstructured":"G. Mahoney, W. Myrvold, and G. C. Shoja. 2005. Generic reliability trust model. In Proceedings of Annual Conference on Privacy, Security and Trust. 113--120."},{"key":"e_1_2_1_122_1","volume-title":"Proceedings of the 10th International Conference on Intelligent Systems Design and Applications","author":"Malacka O.","unstructured":"O. Malacka, J. Samek, and F. Zboril. 2010. Event driven multi-context trust model. In Proceedings of the 10th International Conference on Intelligent Systems Design and Applications. Cairo, Egypt, 912--917."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.5555\/850926.851678"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939659.1939699"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00016-3"},{"key":"e_1_2_1_126_1","doi-asserted-by":"crossref","unstructured":"S. Marsh and P. Briggs. 2009. Examining trust forgiveness and regret as computational concepts. In Computing with Social Trust J. Golbeck (Ed.). Springer 9--43. Human-Computer Interaction Series.","DOI":"10.1007\/978-1-84800-356-9_2"},{"key":"e_1_2_1_127_1","unstructured":"S. P. Marsh. 1994. Formalizing Trust as a Computational Concept. Ph.D. Dissertation. University of Stirling."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_2"},{"key":"e_1_2_1_129_1","volume-title":"Proceedings of the 12th International Conference on Information Fusion","author":"Matei I.","year":"1950","unstructured":"I. Matei, J. S. Baras, and T. Jiang. 2009. A composite trust model and its application to collaborative distributed information fusion. In Proceedings of the 12th International Conference on Information Fusion. Seattle, WA, 1950--1957."},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.2307\/258792"},{"key":"e_1_2_1_131_1","volume-title":"Proceedings of the 11th International Command and Control Research and Technology Symposium","author":"McGuinness B.","unstructured":"B. McGuinness and A. Leggatt. 2006. Information trust and distrust in a sensemaking task. In Proceedings of the 11th International Command and Control Research and Technology Symposium. San Diego, CA."},{"key":"e_1_2_1_132_1","unstructured":"Merriam and Webster Dictionary. 2015. (2015)."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.66"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.6.1.44"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139408964957"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139608964474"},{"key":"e_1_2_1_137_1","volume-title":"Proceedings of the 4th International Conference on Intelligent Computer Communication and Processing. 261--264","author":"Nagy M.","unstructured":"M. Nagy, M. Vargas-Vera, and E. Motta. 2008. Multi agent trust for belief combination on the semantic web. In Proceedings of the 4th International Conference on Intelligent Computer Communication and Processing. 261--264."},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.4"},{"key":"e_1_2_1_139_1","volume-title":"Proceedings of the 13th Conference on Information Fusion. 1--7.","author":"Nevell D. A.","unstructured":"D. A. Nevell, S. R. Maskell, P. R. Horridge, and H. L. Barnett. 2010. Fusion of data from sources with different levels of trust. In Proceedings of the 13th Conference on Information Fusion. 1--7."},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.025102"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.009"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2009.10.001"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.04.006"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1518\/155534308X284417"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.93"},{"key":"e_1_2_1_146_1","volume-title":"Germany. Dagstuhl Seminar Proceedings.","author":"Pereitra C.","year":"2009","unstructured":"C. Pereitra. 2009. Distrust is not always the complement of trust (Position Paper). Normative Multi-Agent Systems, Guido Boella, Pablo Noriega, Gabriella Pigozzi, and Harko Verhagen (Eds.). Dagstuhl, Germany. Dagstuhl Seminar Proceedings."},{"key":"e_1_2_1_147_1","volume-title":"Proceedings of the 10th International Conference on Information Fusion. Quebec, Que., 1--9.","author":"Pong P.","unstructured":"P. Pong and S. Challa. 2007. Empirical analysis of generalised uncertainty measures with dempster shafer fusion. In Proceedings of the 10th International Conference on Information Fusion. Quebec, Que., 1--9."},{"key":"e_1_2_1_148_1","volume-title":"Trust in Numbers: The Pursuit of Objectivity in Science and Public Life","author":"Porter T. M.","unstructured":"T. M. Porter. 1995. Trust in Numbers: The Pursuit of Objectivity in Science and Public Life. Princeton University Press, UK."},{"key":"e_1_2_1_149_1","doi-asserted-by":"crossref","unstructured":"R. D. Putnam. 2000. Bowling Alone. Simon and Schuster New York.","DOI":"10.1145\/358916.361990"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_22"},{"key":"e_1_2_1_151_1","first-page":"1","article-title":"Multi-agent-based agile scheduling. Robotics and Autonomous Systems","volume":"27","author":"Rabeloa R. J.","year":"1999","unstructured":"R. J. Rabeloa, L. M. Camarinha-Matos, and H. Afsarmaneshc. 1999. Multi-agent-based agile scheduling. Robotics and Autonomous Systems, Multi-Agent Systems Applications 27, 1--2 (April 1999), 15--28.","journal-title":"Multi-Agent Systems Applications"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.1.95"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.144.v41:1"},{"key":"e_1_2_1_154_1","unstructured":"D. M. Romano. 2003. The Nature of Trust: Conceptual and Operational Clarification. Ph.D. Dissertation. Department of Psychology Louisiana State University."},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.35.1.1"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544854"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289527"},{"key":"e_1_2_1_158_1","volume-title":"A Mathematical Theory of Evidence","author":"Shafer G.","unstructured":"G. Shafer. 1976. A Mathematical Theory of Evidence. Princeton University Press, Princeton, NJ."},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_2_1_161_1","first-page":"307","article-title":"A value for n-person games","volume":"28","author":"Shapley L.","year":"1953","unstructured":"L. Shapley. 1953. A value for n-person games. Annals of Mathematical Studies 28 (1953), 307--317.","journal-title":"Annals of Mathematical Studies"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506631"},{"key":"e_1_2_1_163_1","volume-title":"Proceedings of SPIE, Khanh D. Pham, Henry Zmuda, Joseph Lee Cox, and Greg J. Meyer (Eds.)","volume":"8044","author":"Shen D.","unstructured":"D. Shen, G. Chen, K. Pham, and E. Blasch. 2011. A trust-based sensor allocation algorithm in cooperative space search problems. In Proceedings of SPIE, Khanh D. Pham, Henry Zmuda, Joseph Lee Cox, and Greg J. Meyer (Eds.), Vol. 8044."},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476438"},{"key":"e_1_2_1_165_1","volume-title":"Proceedings of the IEEE 17th International Conference on Information Fusion (FUSION)","author":"Sikdar S.","unstructured":"S. Sikdar, S. Adal \u0131, M. Amin, T. Abdelzaher, K. Chan, J. H. Cho, B. Kang, and J. O\u2019Donovan. 2014. Finding true and credible information on twitter. In Proceedings of the IEEE 17th International Conference on Information Fusion (FUSION). Salamanca, Spain, 1--8."},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1993.tb01329.x"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)90026-4"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.161"},{"key":"e_1_2_1_169_1","first-page":"2","article-title":"The PGP web of trust","volume":"20","author":"Stallings W.","year":"1995","unstructured":"W. Stallings. 1995. The PGP web of trust. BYTE 20, 2 (Feb. 1995), 161--162.","journal-title":"BYTE"},{"key":"e_1_2_1_170_1","volume-title":"Proceedings of the 13th Conference on Information Fusion","author":"Stampouli D.","unstructured":"D. Stampouli, M. Brown, and G. Powell. 2010. Fusion of soft information using TBM. In Proceedings of the 13th Conference on Information Fusion. Edinburgh, Scotland, 1--8."},{"key":"e_1_2_1_171_1","volume-title":"Proceedings of SPIE (Sensor Fusion: Architectures, Algorithms, and Applications III)","volume":"3919","author":"Steinberg A. N.","unstructured":"A. N. Steinberg, C. L. Bowman, and F. E. White. 1999. Revisions to the JDL data fusion model. In Proceedings of SPIE (Sensor Fusion: Architectures, Algorithms, and Applications III), Vol. 3919. 235--251."},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861389"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.311"},{"key":"e_1_2_1_174_1","volume-title":"Proceedings of the IEEE INFOCOM Workshop","author":"Trifunovic S.","unstructured":"S. Trifunovic, F. Legendre, and C. Anastasiades. 2010. Social trust in opportunistic networks. In Proceedings of the IEEE INFOCOM Workshop. San Diego, CA."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1086\/406755"},{"key":"e_1_2_1_176_1","volume-title":"Benjamin-Cummings Pub Co","author":"Trivers R.","unstructured":"R. Trivers. 1985. Social Evolution. Benjamin-Cummings Pub Co, Cummings, CA, USA."},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1009.I9P0339"},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.5555\/1781974.1782022"},{"key":"e_1_2_1_179_1","volume-title":"Proceedings of the IEEE MILCOM","author":"Wang Y.","year":"1862","unstructured":"Y. Wang, I.-R. Chen, J. H. Cho, K. S. Chan, and A. Swami. 2013. Trust-based service composition and binding for tactical networks with multiple objectives. In Proceedings of the IEEE MILCOM. San Diego, CA, 1862--1867."},{"key":"e_1_2_1_180_1","volume-title":"Proceedings of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT\u201914)","author":"Wang Y.","unstructured":"Y. Wang, Y. C. Lu, I. R. Chen, J. H. Cho, A. Swami, and C. T. Lu. 2014. LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In Proceedings of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT\u201914). Cambridge, MA, USA."},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867713.1867715"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25840-7_3"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.11.008"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2010.153"},{"key":"e_1_2_1_185_1","unstructured":"Wikipedia. 2015. Definition of Cognition. Retrieved from http:\/\/en.wikipedia.org\/wiki\/Cognition."},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.142"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.2307\/1399351"},{"key":"e_1_2_1_188_1","volume-title":"Proceedings of the 7th Nordic Workshop on Security IT Systems (NordSec\u201903)","author":"Yan Z.","unstructured":"Z. Yan, P. Zhang, and T. Virtanen. 2003. Trust evaluation based security solutions in ad hoc networks. In Proceedings of the 7th Nordic Workshop on Security IT Systems (NordSec\u201903). Gjodotvik, Norway, 1--10."},{"key":"e_1_2_1_189_1","volume-title":"Proceedings of the IEEE International Conference on Information Theory and Information Security","author":"Yang Z.","unstructured":"Z. Yang, Y. Fan, and B. Zhang. 2010. A fusion model of overall trust relationship from multiple attributes in trusted networks based on dynamic entropy gain. In Proceedings of the IEEE International Conference on Information Theory and Information Security. Beijing, China, 323--326."},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(83)80081-5"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501458"},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.37"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102222"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815595","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:48:38Z","timestamp":1763459318000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":195,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,11,21]]}},"alternative-id":["10.1145\/2815595"],"URL":"https:\/\/doi.org\/10.1145\/2815595","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2014-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-08-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}