메뉴 건너뛰기




Volumn 5, Issue 6, 2012, Pages 594-613

Collaborative service evaluation with the TwoHop trust framework

Author keywords

Peer to peer networks; Security; Service oriented trust evaluation; Trust metric

Indexed keywords

NETWORK SECURITY; PEER TO PEER NETWORKS;

EID: 84862103909     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.355     Document Type: Article
Times cited : (6)

References (41)
  • 2
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Josang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decision Support Systems 2007; 43(2): 618-644.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 5
    • 85084162792 scopus 로고    scopus 로고
    • Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium
    • Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium, 1998; 229-242.
    • (1998) , pp. 229-242
    • Levien, R.1    Aiken, A.2
  • 6
    • 84862104601 scopus 로고    scopus 로고
    • A testbed for comparing trust computation algorithms. In Proceedings of the 25th Army Science Conference (ASC'06), Orlando, FL, USA
    • Theodorakopoulos G, Baras J. A testbed for comparing trust computation algorithms. In Proceedings of the 25th Army Science Conference (ASC'06), Orlando, FL, USA, 2006.
    • (2006)
    • Theodorakopoulos, G.1    Baras, J.2
  • 7
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: what you're not being told about public key infrastructure
    • Ellison C, Schneier B. Ten risks of PKI: what you're not being told about public key infrastructure. Computer Security Journal 2000; 16(1): 1-7.
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 8
    • 84862088584 scopus 로고    scopus 로고
    • Comparing the costs of public key authentication infrastructures. In Proceedings of the 1st Workshop on the Economics of Securing the Information Infrastructure (WESII'06), Washington, DC, USA
    • Argyroudis P, McAdoo R, O'Mahony D. Comparing the costs of public key authentication infrastructures. In Proceedings of the 1st Workshop on the Economics of Securing the Information Infrastructure (WESII'06), Washington, DC, USA, 2006.
    • (2006)
    • Argyroudis, P.1    McAdoo, R.2    O'Mahony, D.3
  • 9
    • 84862099863 scopus 로고
    • Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling
    • Marsh S. Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.
    • (1994)
    • Marsh, S.1
  • 10
    • 84862076017 scopus 로고    scopus 로고
    • eBay Inc. Online Auction and Shopping Website, Available at: [Accessed 17 February 2011].
    • eBay Inc. Online Auction and Shopping Website, 2009. Available at: [Accessed 17 February 2011].
    • (2009)
  • 11
    • 84862088585 scopus 로고    scopus 로고
    • Poblano: a distributed trust model for peer-to-peer networks. Technical Report, Sun Microsystems, Inc.
    • Chen R, Yeager W. Poblano: a distributed trust model for peer-to-peer networks. Technical Report, Sun Microsystems, Inc., 2003.
    • (2003)
    • Chen, R.1    Yeager, W.2
  • 12
    • 35248879382 scopus 로고    scopus 로고
    • An analysis of GNUnet and the implications for anonymous, censorship-resistant networks. In Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03)
    • Kugler D. An analysis of GNUnet and the implications for anonymous, censorship-resistant networks. In Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03), 2003; 161-176.
    • (2003) , pp. 161-176
    • Kugler, D.1
  • 14
    • 84862099867 scopus 로고    scopus 로고
    • TrustFlow, Available at: [Accessed 28 March 2006].
    • Crowley P. TrustFlow, 2009. Available at: [Accessed 28 March 2006].
    • (2009)
    • Crowley, P.1
  • 15
    • 84862076021 scopus 로고    scopus 로고
    • Enhancing the Internet with Reputations: an OpenPrivacy White Paper, Available at: [Accessed 17 February 2011].
    • Labalme F, Burton K. Enhancing the Internet with Reputations: an OpenPrivacy White Paper, 2001. Available at: [Accessed 17 February 2011].
    • (2001)
    • Labalme, F.1    Burton, K.2
  • 16
    • 33645240198 scopus 로고    scopus 로고
    • The Free Haven Project: distributed anonymous storage service. In Proceedings of 2000 Workshop on Design Issues in Anonymity and Unobservability
    • Dingledine R, Freedman M, Molnar D. The Free Haven Project: distributed anonymous storage service. In Proceedings of 2000 Workshop on Design Issues in Anonymity and Unobservability, 2000; 67-95.
    • (2000) , pp. 67-95
    • Dingledine, R.1    Freedman, M.2    Molnar, D.3
  • 17
    • 77953066525 scopus 로고    scopus 로고
    • Choosing reputable servents in a P2P network. In Proceedings of the 11th International World Wide Web Conference (W3C'02), Honolulu, Hawaii
    • Cornelli F, Damiani E, Vimercati S, Paraboschi S, Samarati P. Choosing reputable servents in a P2P network. In Proceedings of the 11th International World Wide Web Conference (W3C'02), Honolulu, Hawaii, 2002.
    • (2002)
    • Cornelli, F.1    Damiani, E.2    Vimercati, S.3    Paraboschi, S.4    Samarati, P.5
  • 19
    • 84880467894 scopus 로고    scopus 로고
    • EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference (WWW'03), Budapest, Hungary
    • Kamvar S, Schlosser M, Garcia-Molina H. EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference (WWW'03), Budapest, Hungary, 2003; 640-651.
    • (2003) , pp. 640-651
    • Kamvar, S.1    Schlosser, M.2    Garcia-Molina, H.3
  • 20
    • 39049164287 scopus 로고    scopus 로고
    • Trust evaluation in anarchy: a case study on autonomous networks. In Proceedings of the 25th IEEE International Conference on Computer Communications (Infocom'06), Barcelona, Spain
    • Jiang T, Baras J. Trust evaluation in anarchy: a case study on autonomous networks. In Proceedings of the 25th IEEE International Conference on Computer Communications (Infocom'06), Barcelona, Spain, 2006; 1-12.
    • (2006) , pp. 1-12
    • Jiang, T.1    Baras, J.2
  • 21
    • 84862113042 scopus 로고    scopus 로고
    • On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the 27th IEEE International Conference on Computer Communications (Infocom'08), Phoenix, AZ, USA
    • Raya M, Papadimitratos P, Gligor V, Hubaux JP. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the 27th IEEE International Conference on Computer Communications (Infocom'08), Phoenix, AZ, USA, 2008; 1238-1246.
    • (2008) , pp. 1238-1246
    • Raya, M.1    Papadimitratos, P.2    Gligor, V.3    Hubaux, J.P.4
  • 22
    • 78449261973 scopus 로고    scopus 로고
    • An effective calculation of reputation in P2P networks
    • Prasad R, Srinivas V, Kumari V, Raju K. An effective calculation of reputation in P2P networks. Journal of Networks 2009; 4(5): 332-342.
    • (2009) Journal of Networks , vol.4 , Issue.5 , pp. 332-342
    • Prasad, R.1    Srinivas, V.2    Kumari, V.3    Raju, K.4
  • 23
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: supporting reputation based trust of peer-to-peer electronic communities
    • Xiong L, Liu L. PeerTrust: supporting reputation based trust of peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 2004; 16(7): 843-857.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 24
    • 84862067175 scopus 로고    scopus 로고
    • Problems with trusting recommenders to recommend arbitrarily deep chains, Available at: [Accessed 10 March 1998].
    • Abdul-Rahman A. Problems with trusting recommenders to recommend arbitrarily deep chains, 1998. Available at: [Accessed 10 March 1998].
    • (1998)
    • Abdul-Rahman, A.1
  • 25
    • 0033903726 scopus 로고    scopus 로고
    • Supporting trust in virtual communities. Proceedings of IEEE Hawaii International Conference on System Sciences
    • Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. Proceedings of IEEE Hawaii International Conference on System Sciences 2000; 33.
    • (2000) , vol.33
    • Abdul-Rahman, A.1    Hailes, S.2
  • 26
    • 2642568213 scopus 로고    scopus 로고
    • Why isn't trust transitive? In Proceedings of the 3rd International Workshop on Security Protocols
    • Christianson B, Harbison W. Why isn't trust transitive? In Proceedings of the 3rd International Workshop on Security Protocols, 1996; 171-176.
    • (1996) , pp. 171-176
    • Christianson, B.1    Harbison, W.2
  • 28
    • 0034782005 scopus 로고    scopus 로고
    • Chord: a scalable peer-to-peer lookup service for internet applications. In Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
    • Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H. Chord: a scalable peer-to-peer lookup service for internet applications. In Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2001; 149-160.
    • (2001) , pp. 149-160
    • Stoica, I.1    Morris, R.2    Karger, D.3    Kaashoek, F.4    Balakrishnan, H.5
  • 32
    • 0141430048 scopus 로고    scopus 로고
    • Social network size in humans
    • Hill R, Dunbar R. Social network size in humans. Human Nature 2003; 14(1): 53-72.
    • (2003) Human Nature , vol.14 , Issue.1 , pp. 53-72
    • Hill, R.1    Dunbar, R.2
  • 34
    • 0040911004 scopus 로고    scopus 로고
    • A survey of Web caching schemes for the Internet
    • Wang J. A survey of Web caching schemes for the Internet. SIGCOMM Computer Communication Review 1999; 29(5): 36-46.
    • (1999) SIGCOMM Computer Communication Review , vol.29 , Issue.5 , pp. 36-46
    • Wang, J.1
  • 36
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 2009; 42: 1:1-1:31.
    • (2009) ACM Computing Surveys , vol.42
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 37
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Sun Y, Han Z, Liu K. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 2008; 46(2): 112-119.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.2 , pp. 112-119
    • Sun, Y.1    Han, Z.2    Liu, K.3
  • 38
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02)
    • Douceur J. The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002; 251-260.
    • (2002) , pp. 251-260
    • Douceur, J.1
  • 39
    • 84862075809 scopus 로고    scopus 로고
    • AE14: The Imaginary Friends Test, Available at: [Accessed 17 February 2011].
    • Upton R. AE14: The Imaginary Friends Test, 2009. Available at: [Accessed 17 February 2011].
    • (2009)
    • Upton, R.1
  • 40
    • 84885797269 scopus 로고    scopus 로고
    • Sybilproof reputation mechanisms. In Proceedings of 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON'05)
    • Cheng A, Friedman E. Sybilproof reputation mechanisms. In Proceedings of 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON'05), 2005; 128-132.
    • (2005) , pp. 128-132
    • Cheng, A.1    Friedman, E.2
  • 41
    • 84862067174 scopus 로고    scopus 로고
    • The Friend-of-a-Friend (FOAF) Project, Available at: [Accessed 17 February 2011].
    • The Friend-of-a-Friend (FOAF) Project, 2009. Available at: [Accessed 17 February 2011].
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.