Fig. 7From: Toward a testbed for evaluating computational trust models: experiments and analysisSelf-promoting attack – EigenTrustBack to article page