12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > Representing, proving and sharing trustworthine...
View graph of relations

« Back

Representing, proving and sharing trustworthiness of web resources using veracity

Research output: Contribution in Book/Report/ProceedingsPaper

Published

  • Gregoir Burel
  • Amparo Elizabeth Cano Basave
  • Matthew Rowe
  • Alfonso Sosa
Publication date2010
Host publicationKnowledge Engineering and Management by the Masses 17th International Conference, EKAW 2010, Lisbon, Portugal, October 11-15, 2010. Proceedings
EditorsPhilipp Cimiano, H. Sofia Pinto
Place of publicationBerlin
PublisherSpringer Verlag
Pages421-430
Number of pages10
ISBN (Print)978-3-642-16437-8
Original languageEnglish

Conference

ConferenceIn proceedings of the International Conference on Knowledge Engineering and Knowledge Management (EKAW) 2010
CountryPortugal
Period1/09/10 → …

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume6317
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceIn proceedings of the International Conference on Knowledge Engineering and Knowledge Management (EKAW) 2010
CountryPortugal
Period1/09/10 → …

Abstract

The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be trusted is a difficult task for humans, often leading to blind trust. In this paper we present a model and the corresponding veracity ontology which allows trust to be placed in web content by web agents. Our approach differs from current work by allowing the trustworthiness of web content to be securely distributed across arbitrary domains and asserted through the provision of machine-readable proofs (i.e. by citing another piece of information, or stating the credentials of the user/agent). We provide a detailed scenario as motivation for our work and demonstrate how the ontology can be used.