# Evaluation of the Iterative Multiplication Strategy for Trust Propagation in Pervasive Environments

1 DRIM - Distribution, Recherche d'Information et Mobilité
LIRIS - Laboratoire d'InfoRmatique en Image et Systèmes d'information
Abstract : There are a number of models for access control in pervasive environments that are based on trust propagation. Iterative multiplication of the trust values on a path from a source entity to a target entity is one of the common strategies for trust propagation. In this paper, we evaluate the effectiveness of iterative multiplication for trust propagation. The data set used for this evaluation is the real web of trust of Advogato.org that comprises of over $11,000$ vertices (users) and over 50,000 directed weighted edges (trust relationships between users). We find that a significantly strong positive linear correlation exists between trust values based on direct experience and the corresponding propagated trust values derived through the iterative multiplication approach. This finding provides empirical support for the access control models for pervasive environments that employ the iterative multiplication strategy for trust propagation.
Document type :
Conference papers
Domain :

https://hal.archives-ouvertes.fr/hal-01437744
Contributor : Équipe Gestionnaire Des Publications Si Liris <>
Submitted on : Tuesday, January 17, 2017 - 1:57:58 PM
Last modification on : Thursday, March 18, 2021 - 2:32:07 PM

### Citation

Omar Hasan, Lionel Brunie, Jean-Marc Pierson. Evaluation of the Iterative Multiplication Strategy for Trust Propagation in Pervasive Environments. The 6th ACM International Conference on Pervasive Services (ICPS 2009), Jul 2009, Imperial College, London, United Kingdom. pp.49-54, ⟨10.1145/1568199.1568207⟩. ⟨hal-01437744⟩

Record views