Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1755688.1755735acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

A game theoretic model for digital identity and trust in online communities

Published: 13 April 2010 Publication History

Abstract

Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communities or e-commerce environments, which have significant security consequences. This work aims to contribute to construction of an analytical foundation for digital identity and trust by adopting a quantitative approach. A game theoretic model is developed to quantify community effects and other factors in trust decisions. The model captures factors such as peer pressure and personality traits. The existence and uniqueness of a Nash equilibrium solution is studied and shown for the trust game defined. In addition, synchronous and asynchronous update algorithms are shown to converge to the Nash equilibrium solution. A numerical analysis is provided for a number of scenarios that illustrate the interplay between user behavior and community effects.

References

[1]
Audun Josang, Roslan Ismail, and Colin Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., vol. 43, no. 2, pp. 618--644, 2007.
[2]
"eRep: Social Knowledge for e-Governance," March 2009, FP6 European project aimed at providing theory-driven and empirically backed-up guidelines for designing reputation technologies.
[3]
J. C. Ely, D. Fudenberg, and D. K. Levine, "When is Reputation Bad?," SSRN eLibrary, 2004.
[4]
K. Aberer and Z. Despotovic, "On reputation in game theory - application to online settings," 2004.
[5]
P. Resnick, R. J. Zeckhauser, J. Swanson, and K. Lockwood, "The Value of Reputation on eBay: A Controlled Experiment," SSRN eLibrary, 2002.
[6]
P. Resnick and R. Zeckhauser, "Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system," in The Economics of the Internet and E-Commerce, Michael R. Baye, Ed., vol. 11 of Advances in Applied Microeconomics, pp. 127--157. Elsevier Science, 2002.
[7]
P. Nurmi, "A bayesian framework for online reputation systems," in Proc. of AICT-ICIW 2006, Washington, DC, USA, 2006, p. 121, IEEE Computer Society.
[8]
T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory, SIAM, Philadelphia, PA, 2nd edition, 1999.
[9]
R. Horn and C. R. Johnson, Matrix Analysis, New York, NY: Cambridge University Press, 1985.
[10]
D. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Compuation: Numerical Methods, Prentice Hall, Upper Saddle River, NJ, 1989.

Cited By

View all
  • (2022)Dijital Oyun Ortamında NFT Kullanımı ve Oyna-Kazan Modelinin Yapısal AnaliziStructural Analysis Of NFT Usage And Play To Earn Model In Digital Gaming EnvironmentTRT Akademi10.37679/trta.11430107:16(970-1005)Online publication date: 30-Sep-2022
  • (2021)A game‐theoretic approach for ensuring trustworthiness in cyber‐physical systems with applications to multiloop UAV controlTransactions on Emerging Telecommunications Technologies10.1002/ett.404232:5Online publication date: 7-May-2021
  • (2020)Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)10.1109/COMSNETS48256.2020.9027362(626-629)Online publication date: Jan-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
April 2010
363 pages
ISBN:9781605589367
DOI:10.1145/1755688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital identity
  2. game theory
  3. online communities
  4. trust

Qualifiers

  • Research-article

Conference

ASIA CCS '10
Sponsor:

Acceptance Rates

ASIACCS '10 Paper Acceptance Rate 25 of 166 submissions, 15%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Dijital Oyun Ortamında NFT Kullanımı ve Oyna-Kazan Modelinin Yapısal AnaliziStructural Analysis Of NFT Usage And Play To Earn Model In Digital Gaming EnvironmentTRT Akademi10.37679/trta.11430107:16(970-1005)Online publication date: 30-Sep-2022
  • (2021)A game‐theoretic approach for ensuring trustworthiness in cyber‐physical systems with applications to multiloop UAV controlTransactions on Emerging Telecommunications Technologies10.1002/ett.404232:5Online publication date: 7-May-2021
  • (2020)Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)10.1109/COMSNETS48256.2020.9027362(626-629)Online publication date: Jan-2020
  • (2017)Positive and negative behavioral analysis in social networksWIREs Data Mining and Knowledge Discovery10.1002/widm.12037:3Online publication date: 27-Mar-2017
  • (2014)Game theoretic analysis of multiparty access control in online social networksProceedings of the 19th ACM symposium on Access control models and technologies10.1145/2613087.2613097(93-102)Online publication date: 25-Jun-2014
  • (2012)An Informed Model of Personal Information Release in Social Networking SitesProceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust10.1109/SocialCom-PASSAT.2012.137(636-645)Online publication date: 3-Sep-2012
  • (2011)Towards a Game Theoretical Model for Identity Validation in Social Network Sites2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing10.1109/PASSAT/SocialCom.2011.208(1081-1088)Online publication date: Oct-2011
  • (2011)A novel reputation-based model for e-commerceOperational Research10.1007/s12351-011-0114-613:1(113-138)Online publication date: 6-May-2011
  • (2011)Digital trust gamesProceedings of the Second international conference on Decision and Game Theory for Security10.1007/978-3-642-25280-8_15(182-200)Online publication date: 14-Nov-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media