{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T23:42:15Z","timestamp":1776728535011,"version":"3.51.2"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,6,16]],"date-time":"2015-06-16T00:00:00Z","timestamp":1434412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF CISE","award":["IIS-0905493, CNS-1115375, IIP-1230740"],"award-info":[{"award-number":["IIS-0905493, CNS-1115375, IIP-1230740"]}]},{"name":"Intel ISTC on Cloud Computing"},{"name":"China Scholarship Council and working at State Key Laboratory of High-end Server & Storage Technology"},{"name":"National Science Foundation of China","award":["661100194, 61272173"],"award-info":[{"award-number":["661100194, 61272173"]}]},{"name":"Graduate Creative Talents Project of DUT(DUT12ZD104, DUT13LK38, DUT12RC(3) 80)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2015,6,20]]},"abstract":"<jats:p>\n            Distributed service networks are popular platforms for service providers to offer services to consumers and for service consumers to acquire services from unknown parties. eBay and Amazon are two well-known examples of enabling and hosting such service networks to connect service providers to service consumers. Trust management is a critical component for scaling such distributed service networks to a large and growing number of participants. In this article, we present ServiceTrust\n            <jats:sup>++<\/jats:sup>\n            , a feedback quality--sensitive and attack resilient trust management scheme for empowering distributed service networks with effective trust management capability. Compared with existing trust models, ServiceTrust\n            <jats:sup>++<\/jats:sup>\n            has several novel features. First, we present six attack models to capture both independent and colluding attacks with malicious cliques, malicious spies, and malicious camouflages. Second, we aggregate the feedback ratings based on the variances of participants\u2019 feedback behaviors and incorporate feedback similarity as weight into the local trust algorithm. Third, we compute the global trust of a participant by employing conditional trust propagation based on the feedback similarity threshold. This allows ServiceTrust\n            <jats:sup>++<\/jats:sup>\n            to control and prevent malicious spies and malicious camouflage peers from boosting their global trust scores by manipulating the feedback ratings of good peers and by taking advantage of the uniform trust propagation. Finally, we systematically combine a trust-decaying strategy with a threshold value--based conditional trust propagation to further strengthen the robustness of our global trust computation against sophisticated malicious feedback. Experimental evaluation with both simulation-based networks and real network dataset Epinion show that ServiceTrust\n            <jats:sup>++<\/jats:sup>\n            is highly resilient against all six attack models and highly effective compared to EigenTrust, the most popular and representative trust propagation model to date.\n          <\/jats:p>","DOI":"10.1145\/2754934","type":"journal-article","created":{"date-parts":[[2015,6,17]],"date-time":"2015-06-17T14:42:25Z","timestamp":1434552145000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Reliable and Resilient Trust Management in Distributed Service Provision Networks"],"prefix":"10.1145","volume":"9","author":[{"given":"Zhiyuan","family":"Su","sequence":"first","affiliation":[{"name":"State Key Laboratory of High-end Server &amp; Storage Technology, Dalian University of Technology, Georgia Institute of Technology, Jinan, Shandong, China"}]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Liaoning, China"}]},{"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Liaoning, China"}]},{"given":"Yang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532640"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of 3rd European Symposium on Research in Computer Security (ESORICS\u201994)","author":"Beth T.","unstructured":"T. Beth , M. Borcherding , and B. Klein . 1994. Valuation of trust in open networks. 1994 . In Proceedings of 3rd European Symposium on Research in Computer Security (ESORICS\u201994) . Springer, Berlin, 1--18. T. Beth, M. Borcherding, and B. Klein. 1994. Valuation of trust in open networks. 1994. In Proceedings of 3rd European Symposium on Research in Computer Security (ESORICS\u201994). Springer, Berlin, 1--18."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.74"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.06.027"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 13th Americas Conference on Information Systems. 339--351","author":"Dwyer C.","unstructured":"C. Dwyer , S. R. Hiltz , and K. Passerini . 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace . In Proceedings of the 13th Americas Conference on Information Systems. 339--351 . C. Dwyer, S. R. Hiltz, and K. Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the 13th Americas Conference on Information Systems. 339--351."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078316.2078319"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082473.1082551"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183463.1183470"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 23th International Joint Conference on Artificial Intelligence (IJCAI). 1--7.","author":"Hazard C. J.","unstructured":"C. J. Hazard and M. P. Singh . 2013. Macau: A basis for evaluating reputation systems . In Proceedings of the 23th International Joint Conference on Artificial Intelligence (IJCAI). 1--7. C. J. Hazard and M. P. Singh. 2013. Macau: A basis for evaluating reputation systems. In Proceedings of the 23th International Joint Conference on Artificial Intelligence (IJCAI). 1--7."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"e_1_2_1_13_1","volume-title":"Proceeding of 11th International Conference on Autonomous Agents Multiagent Systems. 299--306","author":"Jiang S. W.","unstructured":"S. W. Jiang , J. Zhang , and Y. S. Ong . 2012. A multiagent evolutionary framework based on trust for multiobjective optimization . In Proceeding of 11th International Conference on Autonomous Agents Multiagent Systems. 299--306 . S. W. Jiang, J. Zhang, and Y. S. Ong. 2012. A multiagent evolutionary framework based on trust for multiobjective optimization. In Proceeding of 11th International Conference on Autonomous Agents Multiagent Systems. 299--306."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 14th International Command and Control Research and Technology Symposium","author":"Jin-Hee C.","unstructured":"C. Jin-Hee , S. Ananthram Swami , and I. Chen . 2009. Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks . In Proceedings of the 14th International Command and Control Research and Technology Symposium . Washington, DC. C. Jin-Hee, S. Ananthram Swami, and I. Chen. 2009. Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks. In Proceedings of the 14th International Command and Control Research and Technology Symposium. Washington, DC."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 10th International Conference on Modeling Decisions for Artificial Intelligence (MDAI\u201913)","author":"J\u00f8sang A.","unstructured":"A. J\u00f8sang , G.-B. Guo , M. S. Pini , F. Santini , and Y. Xu . 2013. Combining recommender and reputation systems to produce better online advice . In Proceedings of the 10th International Conference on Modeling Decisions for Artificial Intelligence (MDAI\u201913) . 126--138. A. J\u00f8sang, G.-B. Guo, M. S. Pini, F. Santini, and Y. Xu. 2013. Combining recommender and reputation systems to produce better online advice. In Proceedings of the 10th International Conference on Modeling Decisions for Artificial Intelligence (MDAI\u201913). 126--138."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754397"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of IFIPTM 2008\u2014Joint Trust and PST Conferences on Privacy, Trust Management and Security. Springer, 119--134","author":"Lathia N.","unstructured":"N. Lathia , S. Hailes , and L. Capra . 2008. Trust-based collaborative filtering . In Proceedings of IFIPTM 2008\u2014Joint Trust and PST Conferences on Privacy, Trust Management and Security. Springer, 119--134 . N. Lathia, S. Hailes, and L. Capra. 2008. Trust-based collaborative filtering. In Proceedings of IFIPTM 2008\u2014Joint Trust and PST Conferences on Privacy, Trust Management and Security. Springer, 119--134."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of 10th International Conference on Autonomous Agents Multiagent Systems. 1151--1152","author":"Liu S.-Y.","unstructured":"S.-Y. Liu , J. Zhang , C.-Y. Miao , Y. L. Theng , and A. C. Kot . 2011. iCLUB: An integrated clustering-based approach to improve the robustness of reputation systems . In Proceedings of 10th International Conference on Autonomous Agents Multiagent Systems. 1151--1152 . S.-Y. Liu, J. Zhang, C.-Y. Miao, Y. L. Theng, and A. C. Kot. 2011. iCLUB: An integrated clustering-based approach to improve the robustness of reputation systems. In Proceedings of 10th International Conference on Autonomous Agents Multiagent Systems. 1151--1152."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.26"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"S. Nepal W. Sherchan and A. Bouguettaya. 2014. Service trust management for E-Government applications. Advanced Web Services 339--362.  S. Nepal W. Sherchan and A. Bouguettaya. 2014. Service trust management for E-Government applications. Advanced Web Services 339--362.","DOI":"10.1007\/978-1-4614-7535-4_14"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of 17th International Joint Conference on Artificial Intelligence. 903--910","author":"Ng A. Y.","unstructured":"A. Y. Ng , A. X. Zheng , and M. I. Jordan . 2001. Link analysis, eigenvectors and stability . In Proceedings of 17th International Joint Conference on Artificial Intelligence. 903--910 . A. Y. Ng, A. X. Zheng, and M. I. Jordan. 2001. Link analysis, eigenvectors and stability. In Proceedings of 17th International Joint Conference on Artificial Intelligence. 903--910."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.05.002"},{"key":"e_1_2_1_26_1","unstructured":"L. Page S. Brin R. Motwani and T. Winograd. 1998. The PageRank citation ranking: Bringing order to the web. Technical Report Stanford Digital Library Technologies Project Stanford InfoLab Stanford CA.  L. Page S. Brin R. Motwani and T. Winograd. 1998. The PageRank citation ranking: Bringing order to the web. Technical Report Stanford Digital Library Technologies Project Stanford InfoLab Stanford CA."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0209-3"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of 5th IFIP WG 11.11 International Conference on Trust Management. 253--264","author":"Seyedi A.","unstructured":"A. Seyedi , R. Saadi , and V. Issarny . 2011. Proximity-based trust inference for mobile social networking . In Proceedings of 5th IFIP WG 11.11 International Conference on Trust Management. 253--264 . A. Seyedi, R. Saadi, and V. Issarny. 2011. Proximity-based trust inference for mobile social networking. In Proceedings of 5th IFIP WG 11.11 International Conference on Trust Management. 253--264."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.31"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.56"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1867713.1867715"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI\u201907)","author":"Wang Y. H.","unstructured":"Y. H. Wang and M. P. Singh . 2007. Formal trust model for multiagent systems . In Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI\u201907) .1551--1556. Y. H. Wang and M. P. Singh. 2007. Formal trust model for multiagent systems. In Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI\u201907).1551--1556."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2283696.2283900"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 25th AAAI Conference on Artificial Intelligence (AAAI \u201911)","author":"Witkowski J.","unstructured":"J. Witkowski , S. Seuken , and D. C. Parkes . 2011. Incentive-compatible escrow mechanisms . In Proceedings of the 25th AAAI Conference on Artificial Intelligence (AAAI \u201911) . J. Witkowski, S. Seuken, and D. C. Parkes. 2011. Incentive-compatible escrow mechanisms. In Proceedings of the 25th AAAI Conference on Artificial Intelligence (AAAI \u201911)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"H. Yu Z. Q. Shen C. Leung C. Miao and V. R. Lesser. 2013. A survey of multi-agent trust management systems. Access IEEE 35--50.  H. Yu Z. Q. Shen C. Leung C. Miao and V. R. Lesser. 2013. A survey of multi-agent trust management systems. Access IEEE 35--50.","DOI":"10.1109\/ACCESS.2013.2259892"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2754934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2754934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:40Z","timestamp":1750227400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2754934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,16]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6,20]]}},"alternative-id":["10.1145\/2754934"],"URL":"https:\/\/doi.org\/10.1145\/2754934","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,16]]},"assertion":[{"value":"2014-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}