Share This Article:

Research on the Trust Model Based on the Groups’ Internal Recommendation in E-Commerce Environment

Abstract Full-Text HTML Download Download as PDF (Size:367KB) PP. 283-287
DOI: 10.4236/jsea.2009.24036    6,339 Downloads   9,867 Views   Citations
Author(s)    Leave a comment


The trust plays an extremely important role in online shopping. In order to make online shopping trusty, this paper puts foreword a new trust model in e-commerce environment GIR-TM (Groups’ Internal Recommendation Trust Model). First, it regarded the network as a combination of groups, and then did the internal recommendation based on these groups. The GIR-TM, in the process of recommendation, distinguished clearly between the trust degrees of recommen-dation node and the trust degrees of recommended node, and then calculated the integrated credibility value of the recommended node according to the weight of recommendation node in the group, the partial trust degree and the de-gree of recommendation when the recommendation node recommends the recommended node, and the overall credibil-ity value of recommended node as well. Lastly through listing the experimental data and comparing with the HHRB-TM (History and Honest Recommendation Based Trust Model) on the same condition, it is verified that GIR-TM is feasible and effective.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

N. REN and Q. LI, "Research on the Trust Model Based on the Groups’ Internal Recommendation in E-Commerce Environment," Journal of Software Engineering and Applications, Vol. 2 No. 4, 2009, pp. 283-287. doi: 10.4236/jsea.2009.24036.


[1] X. Li and L. Liu, “A reputation-based trust model for peer-to-peer e-commerce communities[C],” Proc of IEEE Conference on E-Commerce, ACM Press, California, pp. 275–284, 2003.
[2] M. H. Hanif Durad and C. Yuazlda, “A vision for the trust managed grid [A], Proceedings of the sixth IEEE International Symposium on Cluster Computing and the Grid [C], IEEE Computer Society Washington, DC, USA, 2006.
[3] G. Liang, L. Junzhou, and X. Yaobin, “Developing and managing trust in peer-to-peer systems [A],” proceedings of the 17th International Conference on Database and Expert Systems Applications[C], IEEE Computer Society Washington,DC,USA,2006.
[4] F. Almenarez, A. Marin, D. Diaz,and J. Sanchez, “De-veloping a model for trust management in pervasive de-vices [J],” 2006.
[5] A. J?sang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision [J],” De-cision Support Systems, Vol. 43, No. 2, pp. 618?644, 2007.
[6] W. Li, “A history and honest recommendation based trust model in peer-to-peer Networks [D],” Hunan University, pp. 28–29, September 2007.
[7] X. L. Chen, “Research on the modeling and application of initial trust for e-commerce[D],” Huazhong University of Science and Technology, 2008.
[8] A. Gummadi and J. P. Yoon. “Modeling group trust for peer-to-peer access control,” Database and Expert Sys-tems Applications, Proceedings 15th International Work-shop, pp. 971–978, 2004.
[9] W. Dou, H. M. Wang, and Y. Jia, “A recommenda-tion-based peer-to-peer trust model [J],” Journal of soft-ware, Vol. 15, No. 4, pp. 571–583, 2004.
[10] G. Zacharia and P. Maes, “Trust management through reputation mechanisms [J],” Applied Artificial Intelli-gence, Vol. 14, No. 9, 2000.

comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.