{"id":"https://openalex.org/W2389787","doi":"https://doi.org/10.1007/978-0-387-09428-1_2","title":"A Trust Evaluation Method Based on Logic and Probability Theory","display_name":"A Trust Evaluation Method Based on Logic and Probability Theory","publication_year":2008,"publication_date":"2008-05-17","ids":{"openalex":"https://openalex.org/W2389787","doi":"https://doi.org/10.1007/978-0-387-09428-1_2","mag":"2389787"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-09428-1_2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-09428-1_2","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09428-1_2.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2013 The International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09428-1_2.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003637115","display_name":"Reto Kohlas","orcid":null},"institutions":[{"id":"https://openalex.org/I118564535","display_name":"University of Bern","ror":"https://ror.org/02k7v4d05","country_code":"CH","type":"education","lineage":["https://openalex.org/I118564535"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Reto Kohlas","raw_affiliation_strings":["Institute of Computer Science and Applied Mathematics, University of Berne, 3012, Berne, Switzerland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Applied Mathematics, University of Berne, 3012, Berne, Switzerland","institution_ids":["https://openalex.org/I118564535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078723162","display_name":"Jacek Jonczy","orcid":null},"institutions":[{"id":"https://openalex.org/I118564535","display_name":"University of Bern","ror":"https://ror.org/02k7v4d05","country_code":"CH","type":"education","lineage":["https://openalex.org/I118564535"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Jacek Jonczy","raw_affiliation_strings":["Institute of Computer Science and Applied Mathematics, University of Berne, 3012, Berne, Switzerland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Applied Mathematics, University of Berne, 3012, Berne, Switzerland","institution_ids":["https://openalex.org/I118564535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060474108","display_name":"Rolf Haenni","orcid":null},"institutions":[{"id":"https://openalex.org/I130692619","display_name":"Bern University of Applied Sciences","ror":"https://ror.org/02bnkt322","country_code":"CH","type":"education","lineage":["https://openalex.org/I130692619"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Rolf Haenni","raw_affiliation_strings":["Bern University of Applied Sciences, 2501, Bienne, Switzerland"],"affiliations":[{"raw_affiliation_string":"Bern University of Applied Sciences, 2501, Bienne, Switzerland","institution_ids":["https://openalex.org/I130692619"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003637115"],"corresponding_institution_ids":["https://openalex.org/I118564535"],"apc_list":null,"apc_paid":null,"fwci":13.9172,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.98547536,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.779059112071991},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6789854168891907},{"id":"https://openalex.org/keywords/subjective-logic","display_name":"Subjective logic","score":0.672958493232727},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5936490893363953},{"id":"https://openalex.org/keywords/negation","display_name":"Negation","score":0.5836852192878723},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48649686574935913},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.47044557332992554},{"id":"https://openalex.org/keywords/statement","display_name":"Statement (logic)","score":0.4271330237388611},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3526381850242615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3382532298564911},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30649423599243164},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23477908968925476},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.16226640343666077},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.13173404335975647},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.08463004231452942}],"concepts":[{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.779059112071991},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6789854168891907},{"id":"https://openalex.org/C113839178","wikidata":"https://www.wikidata.org/wiki/Q7631418","display_name":"Subjective logic","level":3,"score":0.672958493232727},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5936490893363953},{"id":"https://openalex.org/C2185349","wikidata":"https://www.wikidata.org/wiki/Q190558","display_name":"Negation","level":2,"score":0.5836852192878723},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48649686574935913},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.47044557332992554},{"id":"https://openalex.org/C2777026412","wikidata":"https://www.wikidata.org/wiki/Q2684591","display_name":"Statement (logic)","level":2,"score":0.4271330237388611},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3526381850242615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3382532298564911},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30649423599243164},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23477908968925476},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.16226640343666077},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.13173404335975647},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.08463004231452942},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-0-387-09428-1_2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-09428-1_2","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09428-1_2.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2013 The International Federation for Information Processing","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.472.67","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.472.67","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://content.schweitzer-online.de/static/content/catalog/newbooks/978/038/709/9780387094274/9780387094274_Excerpt_001.pdf","raw_type":"text"},{"id":"pmh:oai:boris.unibe.ch:37112","is_oa":false,"landing_page_url":"https://boris.unibe.ch/37112/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401086","display_name":"Bern Open Repository and Information System (University of Bern)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118564535","host_organization_name":"University of Bern","host_organization_lineage":["https://openalex.org/I118564535"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kohlas, Reto; Jonczy, Jacek; Haenni, Rolf (2008). A Trust Evaluation Method Based on Logic and Probability Theory. In: Karabulut, Y\u00fccel; Mitchell, John C.; Herrmann, Peter; Jensen, Schristian Damsgaard (eds.) Trust Management II: Proceedings of IFIPTM 2008. Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (pp. 17-32). Heidelberg: Springer Verlag","raw_type":"info:eu-repo/semantics/bookPart"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-09428-1_2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-09428-1_2","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-09428-1_2.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2013 The International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1622267382","display_name":"Foundations of Resource-Bounded Reasoning and Anytime Algorithms","funder_award_id":"102652","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"},{"id":"https://openalex.org/G4744931700","display_name":null,"funder_award_id":"PP002-102652","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8883921754","display_name":"Repr\u00e4sentative L\u00e4ngsschnittstudie zur Devianz- und Intergrationsproblematik bei Jugendlichen.","funder_award_id":"10265","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320924","display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","ror":"https://ror.org/00yjd3n13"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2389787.pdf","grobid_xml":"https://content.openalex.org/works/W2389787.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W57407544","https://openalex.org/W147556552","https://openalex.org/W203480813","https://openalex.org/W1490838413","https://openalex.org/W1496458615","https://openalex.org/W1505128236","https://openalex.org/W1509631034","https://openalex.org/W1575927142","https://openalex.org/W1596502150","https://openalex.org/W1785068416","https://openalex.org/W1923357748","https://openalex.org/W1988092101","https://openalex.org/W1996360405","https://openalex.org/W2010939995","https://openalex.org/W2102922499","https://openalex.org/W2110689325","https://openalex.org/W2122237601","https://openalex.org/W2150626176","https://openalex.org/W2156186849","https://openalex.org/W2169160043","https://openalex.org/W2170858213","https://openalex.org/W2212628139","https://openalex.org/W2277514732","https://openalex.org/W2622981019","https://openalex.org/W4248305857","https://openalex.org/W4300460715","https://openalex.org/W6606082299","https://openalex.org/W6608324823","https://openalex.org/W6688625213"],"related_works":["https://openalex.org/W2389256677","https://openalex.org/W2013502867","https://openalex.org/W2353766896","https://openalex.org/W1859642347","https://openalex.org/W2123415650","https://openalex.org/W4387081478","https://openalex.org/W1806141658","https://openalex.org/W1986630940","https://openalex.org/W2071043234","https://openalex.org/W1992702849"],"abstract_inverted_index":{"We":[0],"introduce":[1],"a":[2,8,73,82],"trust":[3,118],"evaluation":[4],"method":[5,19,36,80],"applicable":[6],"in":[7,11,88],"decentralized":[9],"setting,":[10],"which":[12],"no":[13],"universally":[14],"trusted":[15],"authority":[16],"exists.":[17],"The":[18,28,48],"makes":[20],"simultaneous":[21],"use":[22],"of":[23,30,34,45,57,69,85,117],"logic":[24],"and":[25,41,67,101,108,135],"probability":[26,53,75],"theory.":[27],"result":[29],"the":[31,35,43,52,55,64,77,90,121,124],"qualitative":[32],"part":[33,50],"are":[37],"logical":[38],"arguments":[39],"for":[40,76,98,103],"against":[42],"reliability":[44,56],"an":[46,58,127],"entity.":[47],"quantitative":[49],"returns":[51],"that":[54,126],"entity":[59,128],"can":[60],"be":[61],"deduced":[62],"under":[63],"given":[65],"assumptions":[66],"pieces":[68],"evidence,":[70],"as":[71],"well":[72],"corresponding":[74,137],"counter-hypothesis.":[78],"Our":[79],"is":[81,129],"true":[83],"generalization":[84],"existing":[86],"methods,":[87],"particular":[89],"Credential":[91],"Networks.":[92],"It":[93],"relies":[94],"on":[95],"digital":[96],"signatures":[97],"authenticating":[99],"messages":[100],"accounts":[102],"many-to-many":[104],"relationships":[105],"between":[106],"entities":[107],"public":[109],"keys.":[110],"Moreover,":[111],"it":[112],"includes":[113],"eight":[114],"different":[115],"types":[116],"relations,":[119],"namely":[120],"assumption":[122],"or":[123,133],"statement":[125],"honest,":[130],"competent,":[131],"reliable,":[132],"malicious,":[134],"their":[136],"negations.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
