{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:47:59Z","timestamp":1770515279868,"version":"3.49.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,4,26]],"date-time":"2016-04-26T00:00:00Z","timestamp":1461628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2016,5,5]]},"abstract":"<jats:p>\n            Trust systems represent a significant trend in decision support for social networks\u2019 service provision. The basic idea is to allow users to rate each other even without being direct neighbours. In this case, the purpose is to derive a trust score for a given user, which could be of help to decide whether to trust other users or not. In this article, we investigate the properties of trust propagation within social networks, based on the notion of\n            <jats:italic>transitivity<\/jats:italic>\n            , and we introduce the\n            <jats:bold>\n              <jats:italic>TISoN<\/jats:italic>\n            <\/jats:bold>\n            model to generate and evaluate\n            <jats:bold>T<\/jats:bold>\n            rust\n            <jats:bold>I<\/jats:bold>\n            nference within online\n            <jats:bold>So<\/jats:bold>\n            cial\n            <jats:bold>N<\/jats:bold>\n            etworks. To do so, (\n            <jats:italic>i<\/jats:italic>\n            ) we develop a novel\n            <jats:bold>\n              <jats:italic>TPS<\/jats:italic>\n            <\/jats:bold>\n            algorithm for\n            <jats:bold>T<\/jats:bold>\n            rust\n            <jats:bold>P<\/jats:bold>\n            ath\n            <jats:bold>S<\/jats:bold>\n            earching where we define neighbours\u2019 priority based on their direct trust degrees, and then select trusted paths while controlling the path length; and, (\n            <jats:italic>ii<\/jats:italic>\n            ) we develop different\n            <jats:bold>\n              <jats:italic>TIM<\/jats:italic>\n            <\/jats:bold>\n            algorithms for\n            <jats:bold>T<\/jats:bold>\n            rust\n            <jats:bold>I<\/jats:bold>\n            nference\n            <jats:bold>M<\/jats:bold>\n            easuring and build a trust network. In addition, we analyse existing algorithms and we demonstrate that our proposed model better computes transitive trust values than do the existing models. We conduct extensive experiments on a real online social network dataset, Advogato. Experimental results show that our work is scalable and generates better results than do the pioneering approaches of the literature.\n          <\/jats:p>","DOI":"10.1145\/2858791","type":"journal-article","created":{"date-parts":[[2016,4,26]],"date-time":"2016-04-26T12:09:00Z","timestamp":1461672540000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["TISoN"],"prefix":"10.1145","volume":"34","author":[{"given":"Sana","family":"Hamdi","sequence":"first","affiliation":[{"name":"LIPAH, Faculty of Sciences of Tunis, University of El-Manar, Tunisia"}]},{"given":"Alda Lopes","family":"Gancarski","sequence":"additional","affiliation":[{"name":"SAMOVAR, Telecom SudParis, CNRS, Universit\u00e9 Paris-Saclay"}]},{"given":"Amel","family":"Bouzeghoub","sequence":"additional","affiliation":[{"name":"SAMOVAR, Telecom SudParis, CNRS, Universit\u00e9 Paris-Saclay"}]},{"given":"Sadok Ben","family":"Yahia","sequence":"additional","affiliation":[{"name":"LIPAH, Faculty of Sciences of Tunis, University of El-Manar, Tunisia"}]}],"member":"320","published-online":{"date-parts":[[2016,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.084"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the International Workshop on Security Protocols. Springer-Verlag","author":"Christianson Bruce","unstructured":"Bruce Christianson and William S. Harbison . 1997. Why isn\u2019t trust transitive? In Proceedings of the International Workshop on Security Protocols. Springer-Verlag , London, UK, 171--176. Bruce Christianson and William S. Harbison. 1997. Why isn\u2019t trust transitive? In Proceedings of the International Workshop on Security Protocols. Springer-Verlag, London, UK, 171--176."},{"key":"e_1_2_1_3_1","volume-title":"Analysis and generative model for trust networks. Technique Report","author":"Dandekar Pranav","year":"2010","unstructured":"Pranav Dandekar . 2010. Analysis and generative model for trust networks. Technique Report ( 2010 ), 1--5. Pranav Dandekar. 2010. Analysis and generative model for trust networks. Technique Report (2010), 1--5."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.191"},{"key":"e_1_2_1_6_1","unstructured":"Russel Hardin. 2004. Trust and Trustworthiness. Russell Sage Foundation.  Russel Hardin. 2004. Trust and Trustworthiness. Russell Sage Foundation."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.251"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.010"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_14"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 2nd Usenixl Conference on File and Storage Technologies (FAST\u201903)","author":"J\u00f8sang Audun","year":"2003","unstructured":"Audun J\u00f8sang and Simon Pope . 2003 . Analysing topologies of transitive trust . In Proceedings of the 2nd Usenixl Conference on File and Storage Technologies (FAST\u201903) . Audun J\u00f8sang and Simon Pope. 2003. Analysing topologies of transitive trust. In Proceedings of the 2nd Usenixl Conference on File and Storage Technologies (FAST\u201903)."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Second Asia-Pacific Conferences on Conceptual Modelling, APCCM 2005","author":"J\u00f8sang Audun","year":"2005","unstructured":"Audun J\u00f8sang and Simon Pope . 2005 . Semantic constraints for trust transitivity . In Proceedings of the Second Asia-Pacific Conferences on Conceptual Modelling, APCCM 2005 , January 30 - February 4, 2005, Newcastle, Australia (CRPIT), Sven Hartmann and Markus Stumptner (Eds.), Vol. 43. Australian Computer Society, 59--68. Audun J\u00f8sang and Simon Pope. 2005. Semantic constraints for trust transitivity. In Proceedings of the Second Asia-Pacific Conferences on Conceptual Modelling, APCCM 2005, January 30 - February 4, 2005, Newcastle, Australia (CRPIT), Sven Hartmann and Markus Stumptner (Eds.), Vol. 43. Australian Computer Society, 59--68."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2009.00334.x"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference (AAAI\u201905)","author":"Massa Paolo","year":"2005","unstructured":"Paolo Massa and Paolo Avesani . 2005 . Controversial users demand local trust metrics: An experimental study on epinions.com community . In Proceedings of the 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference (AAAI\u201905) . 121--126. Paolo Massa and Paolo Avesani. 2005. Controversial users demand local trust metrics: An experimental study on epinions.com community. In Proceedings of the 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference (AAAI\u201905). 121--126."},{"key":"e_1_2_1_16_1","volume-title":"BIS 2008 Workshop Proceedings, Dominik Flejter, Sawomir Grzonkowski, Tomasz Kaczmarek, Marek Kowalkiewicz, Tadhg Nagle, and Jonny Parkes (Eds.). 31--43","author":"Massa Paolo","year":"2008","unstructured":"Paolo Massa and Kasper Souren . 2008 . Trustlet, open research on trust metrics . In BIS 2008 Workshop Proceedings, Dominik Flejter, Sawomir Grzonkowski, Tomasz Kaczmarek, Marek Kowalkiewicz, Tadhg Nagle, and Jonny Parkes (Eds.). 31--43 . Paolo Massa and Kasper Souren. 2008. Trustlet, open research on trust metrics. In BIS 2008 Workshop Proceedings, Dominik Flejter, Sawomir Grzonkowski, Tomasz Kaczmarek, Marek Kowalkiewicz, Tadhg Nagle, and Jonny Parkes (Eds.). 31--43."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.123"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772778"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2009.11.003"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2008.41"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.03.006"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.04.015"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858791","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:43Z","timestamp":1750225723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858791"}},"subtitle":["Trust Inference in Trust-Oriented Social Networks"],"short-title":[],"issued":{"date-parts":[[2016,4,26]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,5,5]]}},"alternative-id":["10.1145\/2858791"],"URL":"https:\/\/doi.org\/10.1145\/2858791","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"value":"1046-8188","type":"print"},{"value":"1558-2868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,26]]},"assertion":[{"value":"2015-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}