{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:41:02Z","timestamp":1761709262056,"version":"3.40.5"},"reference-count":53,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10,1]]},"abstract":"<p>Trust is an essential requirement to transact in the digital environment. Digital identity proves a user's presence, whereas the trust proves the standing and worthiness. Trust management can establish and verify the trust to give rise to new outcomes for online transactions such as increased perception towards buying and selling the goods and services, increased retention and loyalty, increased reputation and so on. This paper presents the need and significance of trust management in the digital environment, along with the various models and techniques available to manage the trust. A comparative analysis has been presented for the available models. The work has a lot of importance, considering the large scale proliferation of the digital environment as well as the electronic businesses.<\/p>","DOI":"10.4018\/ijvcsn.2016100101","type":"journal-article","created":{"date-parts":[[2016,10,7]],"date-time":"2016-10-07T15:05:36Z","timestamp":1475852736000},"page":"1-24","source":"Crossref","is-referenced-by-count":8,"title":["Trust Management Models for Digital Identities"],"prefix":"10.4018","volume":"8","author":[{"given":"Prasann","family":"Pradhan","sequence":"first","affiliation":[{"name":"Shri Venkateshwara University, Gajraula, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6753-1557","authenticated-orcid":true,"given":"Vikas","family":"Kumar","sequence":"additional","affiliation":[{"name":"School of Business Studies, Sharda University, Greater Noida, India"}]}],"member":"2432","reference":[{"key":"IJVCSN.2016100101-0","first-page":"211","article-title":"Distributed access-rights management with delegation certificates. In Secure Internet Programming - Security Issues for Distributed and Mobile Objects","volume":"1603","author":"T.Aura","year":"1999","journal-title":"LNCS"},{"key":"IJVCSN.2016100101-1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2014.062271"},{"issue":"3","key":"IJVCSN.2016100101-2","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.2002.tb00147.x","article-title":"In community we trust: Online security communication at eBay","volume":"7","author":"J.Boyd","year":"2002","journal-title":"Journal of Computer-Mediated Communication"},{"key":"IJVCSN.2016100101-3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"IJVCSN.2016100101-4","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","article-title":"Why isn't trust transitive?.","author":"B.Christiason","year":"1997","journal-title":"Proceedings of the International Workshop on Security Protocols"},{"key":"IJVCSN.2016100101-5","unstructured":"Corcoglioniti, F., Cerri, D., Ghioni, A., Morandi, V., & Sgobbi, F. (2007). A trust model for distributed, cooperative and competitive environments. In NeP4B Networked Peers for Business Document ID code D1.3.1."},{"key":"IJVCSN.2016100101-6","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"IJVCSN.2016100101-7","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-0-387-73655-6_2","article-title":"Trust Transfer in Distributed Systems","volume":"Vol. 238","author":"C.Dong","year":"2007","journal-title":"IFIP International Federation for information Processing"},{"key":"IJVCSN.2016100101-8","unstructured":"eBay Site: http:\/\/www.ebay.com"},{"key":"IJVCSN.2016100101-9","first-page":"213","article-title":"Can We Trust Trust? Trust: Making and Breaking Cooperative Relation","volume":"13","author":"D.Gambetta","year":"1988","journal-title":"Basil Blackwell, Ch."},{"key":"IJVCSN.2016100101-10","unstructured":"Gerck, E. (1998). Toward real-world models of trust. Retrieved from http:\/\/www.safevote.com\/papers\/trustdef.htm"},{"key":"IJVCSN.2016100101-11","unstructured":"Grandison, T. (2001). Trust specification and Analysis for Internet Applications [PhD Thesis]. Imperial College of Science Technology and Medicine, London."},{"key":"IJVCSN.2016100101-12","doi-asserted-by":"crossref","unstructured":"Grandison, T. (2003). Trust Management for Internet Applications [PhD Thesis]. Imperial College of Science Technology and Medicine, London.","DOI":"10.1007\/3-540-44875-6_7"},{"key":"IJVCSN.2016100101-13","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-0-387-73655-6_19","article-title":"A trust model for Open, Decentralized Reputation Systems","volume":"Vol. 238","author":"A.Gutcher","year":"2007","journal-title":"IFIP International Federation for information Processing"},{"key":"IJVCSN.2016100101-14","unstructured":"Haenni, R. (2005a). Towards a unifying theory of logical and probabilistic reasoning. 4th International Symposium on Imprecise Probabilities and Their ApplicationsISIPTA 05 (pp. 193-202)."},{"key":"IJVCSN.2016100101-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2004.05.010"},{"key":"IJVCSN.2016100101-16","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-1737-3_6"},{"key":"IJVCSN.2016100101-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_21"},{"key":"IJVCSN.2016100101-18","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1996.2673"},{"key":"IJVCSN.2016100101-19","article-title":"Distributed trust","author":"J.Ioannidis","year":"2005","journal-title":"Practical Handbook of Internet Computing"},{"key":"IJVCSN.2016100101-20","unstructured":"Josang, A. (1997). Artificial reasoning with subjective logic. Proceedings of the2nd Australian workshop on commonsense reasoning, Perth, Australia."},{"key":"IJVCSN.2016100101-21","unstructured":"Josang, A. (1999a). An algebra for assessing trust in certification chains. Proceedings of the6th annual symposium on network and distributed system security NDSS\u201999, San Diego, USA."},{"key":"IJVCSN.2016100101-22","unstructured":"Josang, A. (1999b). Trust-based decision making for electronic transactions. Proceedings of the Fourth Nordic workshop on secure it systems NORDEC\u201999, Stockholm, Sweden."},{"key":"IJVCSN.2016100101-23","unstructured":"Josang, A., & Pope, S. (2005). Semantic constraints for trust transitivity. In Hartmann and Stumptner (Eds), Australian Computer Society (Vol. 43, pp. 59-68)."},{"key":"IJVCSN.2016100101-24","first-page":"20","author":"K. M.Khan","year":"2010","journal-title":"Establishing Trust in Cloud Computing. In Cloud Computing"},{"key":"IJVCSN.2016100101-25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_8"},{"issue":"0","key":"IJVCSN.2016100101-26","first-page":"60","article-title":"A Hybrid Trust Management Model for MAS Based Trading Society","volume":"1","author":"K.Krishna","year":"2003","journal-title":"The International Arab Journal of Information Technology"},{"key":"IJVCSN.2016100101-27","unstructured":"Mahoney, G., Myrvold, W., & Shoja, G. C. (2005). Generic reliability trust model. Proceedings of the 3rd annual conference on privacy, security and trust PST\u201905 (pp. 113-120)."},{"key":"IJVCSN.2016100101-28","doi-asserted-by":"publisher","DOI":"10.1007\/11533733_8"},{"key":"IJVCSN.2016100101-29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61770-1_45"},{"issue":"3","key":"IJVCSN.2016100101-30","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","author":"R. C.Mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"IJVCSN.2016100101-31","doi-asserted-by":"crossref","first-page":"473","DOI":"10.5465\/amr.1998.926622","article-title":"Initial Trust Formation in New Organizational Relationships","volume":"23","author":"D. H.McKnight","year":"1998","journal-title":"Academy of Management Review"},{"key":"IJVCSN.2016100101-32","doi-asserted-by":"publisher","DOI":"10.1016\/S1047-8310(03)00005-1"},{"key":"IJVCSN.2016100101-33","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(86)90031-7"},{"key":"IJVCSN.2016100101-34","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"key":"IJVCSN.2016100101-35","unstructured":"Object Management Group. (2006). Unified Modeling Language: Superstructure."},{"key":"IJVCSN.2016100101-36","doi-asserted-by":"publisher","DOI":"10.2307\/3150499"},{"issue":"1","key":"IJVCSN.2016100101-37","first-page":"64","article-title":"Role of Service Level Agreements in SaaS business scenario","volume":"9","author":"P.Pradhan","year":"2013","journal-title":"The IUP Journal of Information Technology"},{"key":"IJVCSN.2016100101-38","doi-asserted-by":"publisher","DOI":"10.4018\/IJOM.2015070104"},{"key":"IJVCSN.2016100101-39","doi-asserted-by":"publisher","DOI":"10.4018\/IJEIS.2016010102"},{"key":"IJVCSN.2016100101-40","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317088"},{"journal-title":"\u201cCloud Computing\u201d, Implementation, Management and Security","year":"2010","author":"J. W.Rittinghouse","key":"IJVCSN.2016100101-41"},{"key":"IJVCSN.2016100101-42","doi-asserted-by":"crossref","unstructured":"Rooy, D.V., & Bus, J. (2010). Trust and privacy in the future internet- a research perspective. Proceedings of IDIS (Vol. 3, pp. 397-404).","DOI":"10.1007\/s12394-010-0058-7"},{"issue":"3","key":"IJVCSN.2016100101-43","first-page":"15","article-title":"Agent Based Trust Management Model Based on Weight Value Model for Online Auctions","volume":"1","author":"E.Sathiyamoorthy","year":"2009","journal-title":"IJNSA-International Journal of Network Security and Its Applications"},{"key":"IJVCSN.2016100101-44","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"G.Shafer","year":"1976","journal-title":"The mathematical theory of evidence"},{"key":"IJVCSN.2016100101-45","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990061"},{"key":"IJVCSN.2016100101-46","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_10"},{"issue":"3","key":"IJVCSN.2016100101-47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1867713.1867715","article-title":"Evidence-Based Trust- A Mathematical Model Geared for Multiagent Systems","volume":"5","author":"Y.Wang","year":"2010","journal-title":"ACM Transactions on Autonomous and Adaptive Systems"},{"key":"IJVCSN.2016100101-48","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_14"},{"key":"IJVCSN.2016100101-49","unstructured":"Yao, D., Tamassia, R., & Proctor, S. (2005). On improving the performance of role-based cascaded delegation in ubiquitous computing. Proceedings of IEEE\/ Create Net Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm '05) (pp. 157-168)."},{"key":"IJVCSN.2016100101-50","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_1"},{"key":"IJVCSN.2016100101-51","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/1089551.1089591","article-title":"Online Trust Forming Mechanism: Approaches and an Integrated Model","volume":"05","author":"X.Zhang","year":"2005","journal-title":"ICEC"},{"journal-title":"The official PGP user\u2019s guide","year":"1994","author":"P. R.Zimmermann","key":"IJVCSN.2016100101-52"}],"container-title":["International Journal of Virtual Communities and Social Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=168625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:29:32Z","timestamp":1654097372000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJVCSN.2016100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijvcsn.2016100101","relation":{},"ISSN":["1942-9010","1942-9029"],"issn-type":[{"type":"print","value":"1942-9010"},{"type":"electronic","value":"1942-9029"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}