메뉴 건너뛰기




Volumn 7, Issue 1, 2012, Pages 1-20

Addressing common vulnerabilities of reputation systems for electronic commerce

Author keywords

Attacks and defenses; E commerce; Reputation systems; Robustness and security; Vulnerabilities

Indexed keywords


EID: 84859974140     PISSN: None     EISSN: 07181876     Source Type: Journal    
DOI: 10.4067/S0718-18762012000100002     Document Type: Article
Times cited : (30)

References (87)
  • 3
    • 77957996330 scopus 로고    scopus 로고
    • Enabling usage control through reputation objects: A discussion on e-commerce and the internet of services environments
    • R. Alnemr, S. Koenig, T. Eymann, and C. Meinel, Enabling usage control through reputation objects: A discussion on e-commerce and the internet of services environments, Journal of Theoretical and Applied Electronic Commerce Research, vol. 5, no. 2, pp. 59-76, 2010.
    • (2010) Journal of Theoretical and Applied Electronic Commerce Research , vol.5 , Issue.2 , pp. 59-76
    • Alnemr, R.1    Koenig, S.2    Eymann, T.3    Meinel, C.4
  • 6
    • 34249811174 scopus 로고    scopus 로고
    • A survey of trust in computer science and the semantic web, Web Semantics: Science
    • D. Artz and Y. Gil, A survey of trust in computer science and the semantic web, Web Semantics: Science, Services and Agents on the World Wide Web, vol. 5, no. 2, pp. 58-71, 2007.
    • (2007) Services and Agents On the World Wide Web , vol.5 , Issue.2 , pp. 58-71
    • Artz, D.1    Gil, Y.2
  • 9
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • S. Capkun, L. Buttyán, and J.-P. Hubaux, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, 2003.
    • (2003) IEEE Transactions On Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3
  • 15
    • 84871044906 scopus 로고    scopus 로고
    • Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
    • Minneapolis, Minnesota, USA
    • C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, in Proceedings of the 2nd ACM Conference on Electronic Commerce, Minneapolis, Minnesota, USA, 2000, pp. 150-157.
    • (2000) Proceedings of the 2nd ACM Conference On Electronic Commerce , pp. 150-157
    • Dellarocas, C.1
  • 19
    • 84860000808 scopus 로고    scopus 로고
    • ENISA, European Network and Information Security Agency, Technical Report, October 2007
    • ENISA, Reputation-based systems: A security analysis, European Network and Information Security Agency, Technical Report, October 2007.
    • Reputation-based Systems: A Security Analysis
  • 20
    • 0242268535 scopus 로고    scopus 로고
    • The nature of human altruism
    • E. Fehr and U. Fischbacher, The nature of human altruism, Nature, vol. 425, no. 6960, pp. 785-791, 2003.
    • (2003) Nature , vol.425 , Issue.6960 , pp. 785-791
    • Fehr, E.1    Fischbacher, U.2
  • 27
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • K. Hoffman, D. Zage, and C. Nita-Rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol. 42, no. 1, pp. 1-31, 2009.
    • (2009) ACM Computing Surveys , vol.42 , Issue.1 , pp. 1-31
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 28
    • 77956378278 scopus 로고    scopus 로고
    • A Formal-Semantics-Based calculus of trust
    • J. Huang and D. Nicol, A Formal-Semantics-Based calculus of trust, IEEE Internet Computing, vol. 14, no. 5, pp. 38-46, 2010.
    • (2010) IEEE Internet Computing , vol.14 , Issue.5 , pp. 38-46
    • Huang, J.1    Nicol, D.2
  • 33
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 40
    • 11344267619 scopus 로고    scopus 로고
    • A survey of public-key cryptosystems
    • N. Koblitz and A. J. Menezes, A survey of public-key cryptosystems, SIAM Review, vol. 46, no. 4, pp. 599-634, 2004.
    • (2004) SIAM Review , vol.46 , Issue.4 , pp. 599-634
    • Koblitz, N.1    Menezes, A.J.2
  • 41
    • 0003777824 scopus 로고
    • B.S. Thesis, Department of Electrical Engineering and Computer Science, Massachussetts Institute of Technology, Massachussetts, Cambridge, USA
    • L. M. Kohnfelder, Towards a practical public-key cryptosystem, B.S. Thesis, Department of Electrical Engineering and Computer Science, Massachussetts Institute of Technology, Massachussetts, Cambridge, USA, 1978.
    • (1978) Towards a Practical Public-key Cryptosystem
    • Kohnfelder, L.M.1
  • 42
    • 77952978241 scopus 로고    scopus 로고
    • Uncertainty modeling and reduction in MANETs
    • F. Li and J. Wu, Uncertainty modeling and reduction in MANETs, IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 1035-1048, 2010.
    • (2010) IEEE Transactions On Mobile Computing , vol.9 , Issue.7 , pp. 1035-1048
    • Li, F.1    Wu, J.2
  • 46
    • 77956379499 scopus 로고    scopus 로고
    • Trust and reputation management
    • L. Liu and W. Shi, Trust and reputation management, IEEE Internet Computing, vol. 14, no. 5, pp. 10-13, 2010.
    • (2010) IEEE Internet Computing , vol.14 , Issue.5 , pp. 10-13
    • Liu, L.1    Shi, W.2
  • 47
    • 70349567489 scopus 로고    scopus 로고
    • Security threats scenarios in trust and reputation models for distributed systems
    • F. G. Marmol and G. M. Pérez, Security threats scenarios in trust and reputation models for distributed systems, Computers & Security, vol. 28, no. 7, pp. 545-556, 2009.
    • (2009) Computers & Security , vol.28 , Issue.7 , pp. 545-556
    • Marmol, F.G.1    Pérez, G.M.2
  • 48
    • 29244436370 scopus 로고    scopus 로고
    • Taxonomy of trust: Categorizing P2P reputation systems
    • S. Marti and H. Garcia-Molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol. 50, no. 4, pp. 472-484, 2006.
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 472-484
    • Marti, S.1    Garcia-Molina, H.2
  • 55
    • 34547637688 scopus 로고    scopus 로고
    • Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system
    • R. Paul and Z. Richard, Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system, Advances in Applied Microeconomics: A Research Annual, vol. 11, no. 12, pp. 127-157, 2002.
    • (2002) Advances In Applied Microeconomics: A Research Annual , vol.11 , Issue.12 , pp. 127-157
    • Paul, R.1    Richard, Z.2
  • 67
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • J. Sabater and C. Sierra, Review on computational trust and reputation models, Artificial Intelligence Review, vol. 24, no. 1, pp. 33-60, 2005.
    • (2005) Artificial Intelligence Review , vol.24 , Issue.1 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 68
    • 29244438995 scopus 로고    scopus 로고
    • Cooperative peer groups in NICE
    • R. Sherwood, S. Lee, and B. Bhattacharjee, Cooperative peer groups in NICE, Computer Networks, vol. 50, no. 4, pp. 523-544, 2006.
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 523-544
    • Sherwood, R.1    Lee, S.2    Bhattacharjee, B.3
  • 69
    • 11944249167 scopus 로고    scopus 로고
    • Reputation-based trust management
    • V. Shmatikov and C. Talcott, Reputation-based trust management, Journal of Computer Security, vol. 13, no. 1, pp. 167-190, 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.1 , pp. 167-190
    • Shmatikov, V.1    Talcott, C.2
  • 71
    • 30144435160 scopus 로고    scopus 로고
    • Trusted P2P transactions with fuzzy reputation aggregation
    • S. Song, K. Hwang, R. Zhou, and Y.-K. Kwok, Trusted P2P transactions with fuzzy reputation aggregation, IEEE Internet Computing, vol. 9, no. 6, pp. 24-34, 2005.
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 24-34
    • Song, S.1    Hwang, K.2    Zhou, R.3    Kwok, Y.-K.4
  • 72
    • 33646831908 scopus 로고    scopus 로고
    • TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
    • Chiba, Japan
    • M. Srivatsa, L. Xiong, and L. Liu, TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks, in Proceedings of the 14th International Conference on World Wide Web, Chiba, Japan, 2005, pp. 422-431.
    • (2005) Proceedings of the 14th International Conference On World Wide Web , pp. 422-431
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 81
    • 3142738238 scopus 로고    scopus 로고
    • Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong and L. Liu, Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843-857, 2004.
    • (2004) IEEE Transactions On Knowledge and Data Engineering , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 83
    • 77953686613 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against Sybil attacks
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, Sybillimit: A near-optimal social network defense against Sybil attacks, IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp. 885-898, 2010.
    • (2010) IEEE/ACM Transactions On Networking , vol.18 , Issue.3 , pp. 885-898
    • Yu, H.1    Gibbons, P.B.2    Kaminsky, M.3    Xiao, F.4
  • 85
    • 34250406938 scopus 로고
    • Fuzzy logic and approximate reasoning
    • L. A. Zadeh, Fuzzy logic and approximate reasoning, Synthese, vol. 30, no. 3, pp. 407-428, 1975.
    • (1975) Synthese , vol.30 , Issue.3 , pp. 407-428
    • Zadeh, L.A.1
  • 87
    • 34047150751 scopus 로고    scopus 로고
    • Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing
    • R. Zhou and K. Hwang, Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473, 2007.
    • (2007) IEEE Transactions On Parallel and Distributed Systems , vol.18 , Issue.4 , pp. 460-473
    • Zhou, R.1    Hwang, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.