-
2
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decision Support Systems 2007; 43(2): 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
3
-
-
67249125439
-
TwoHop: metric-based trust evaluation for peer-to-peer collaboration environments
-
IEEE Xplore: New Orleans, LA, DOI: 10.1109/GLOCOM.2008.ECP.382
-
Glynos D, Argyroudis P, Douligeris C, O'Mahony D. TwoHop: metric-based trust evaluation for peer-to-peer collaboration environments. In Proceedings of the 51st Annual IEEE Global Telecommunications Conference (Globecom'08), IEEE Xplore: New Orleans, LA, 2008; 6. DOI: 10.1109/GLOCOM.2008.ECP.382
-
(2008)
Proceedings of the 51st Annual IEEE Global Telecommunications Conference (Globecom'08)
, pp. 6
-
-
Glynos, D.1
Argyroudis, P.2
Douligeris, C.3
O'Mahony, D.4
-
5
-
-
85084162792
-
-
Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium
-
Levien R, Aiken A. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium, 1998; 229-242.
-
(1998)
, pp. 229-242
-
-
Levien, R.1
Aiken, A.2
-
6
-
-
84862104601
-
-
A testbed for comparing trust computation algorithms. In Proceedings of the 25th Army Science Conference (ASC'06), Orlando, FL, USA
-
Theodorakopoulos G, Baras J. A testbed for comparing trust computation algorithms. In Proceedings of the 25th Army Science Conference (ASC'06), Orlando, FL, USA, 2006.
-
(2006)
-
-
Theodorakopoulos, G.1
Baras, J.2
-
7
-
-
0034581037
-
Ten risks of PKI: what you're not being told about public key infrastructure
-
Ellison C, Schneier B. Ten risks of PKI: what you're not being told about public key infrastructure. Computer Security Journal 2000; 16(1): 1-7.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
8
-
-
84862088584
-
-
Comparing the costs of public key authentication infrastructures. In Proceedings of the 1st Workshop on the Economics of Securing the Information Infrastructure (WESII'06), Washington, DC, USA
-
Argyroudis P, McAdoo R, O'Mahony D. Comparing the costs of public key authentication infrastructures. In Proceedings of the 1st Workshop on the Economics of Securing the Information Infrastructure (WESII'06), Washington, DC, USA, 2006.
-
(2006)
-
-
Argyroudis, P.1
McAdoo, R.2
O'Mahony, D.3
-
9
-
-
84862099863
-
-
Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling
-
Marsh S. Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.
-
(1994)
-
-
Marsh, S.1
-
10
-
-
84862076017
-
-
eBay Inc. Online Auction and Shopping Website, Available at: [Accessed 17 February 2011].
-
eBay Inc. Online Auction and Shopping Website, 2009. Available at: [Accessed 17 February 2011].
-
(2009)
-
-
-
11
-
-
84862088585
-
-
Poblano: a distributed trust model for peer-to-peer networks. Technical Report, Sun Microsystems, Inc.
-
Chen R, Yeager W. Poblano: a distributed trust model for peer-to-peer networks. Technical Report, Sun Microsystems, Inc., 2003.
-
(2003)
-
-
Chen, R.1
Yeager, W.2
-
12
-
-
35248879382
-
-
An analysis of GNUnet and the implications for anonymous, censorship-resistant networks. In Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03)
-
Kugler D. An analysis of GNUnet and the implications for anonymous, censorship-resistant networks. In Proceedings of the 3rd Workshop on Privacy Enhancing Technologies (PET'03), 2003; 161-176.
-
(2003)
, pp. 161-176
-
-
Kugler, D.1
-
14
-
-
84862099867
-
-
TrustFlow, Available at: [Accessed 28 March 2006].
-
Crowley P. TrustFlow, 2009. Available at: [Accessed 28 March 2006].
-
(2009)
-
-
Crowley, P.1
-
15
-
-
84862076021
-
-
Enhancing the Internet with Reputations: an OpenPrivacy White Paper, Available at: [Accessed 17 February 2011].
-
Labalme F, Burton K. Enhancing the Internet with Reputations: an OpenPrivacy White Paper, 2001. Available at: [Accessed 17 February 2011].
-
(2001)
-
-
Labalme, F.1
Burton, K.2
-
16
-
-
33645240198
-
-
The Free Haven Project: distributed anonymous storage service. In Proceedings of 2000 Workshop on Design Issues in Anonymity and Unobservability
-
Dingledine R, Freedman M, Molnar D. The Free Haven Project: distributed anonymous storage service. In Proceedings of 2000 Workshop on Design Issues in Anonymity and Unobservability, 2000; 67-95.
-
(2000)
, pp. 67-95
-
-
Dingledine, R.1
Freedman, M.2
Molnar, D.3
-
17
-
-
77953066525
-
-
Choosing reputable servents in a P2P network. In Proceedings of the 11th International World Wide Web Conference (W3C'02), Honolulu, Hawaii
-
Cornelli F, Damiani E, Vimercati S, Paraboschi S, Samarati P. Choosing reputable servents in a P2P network. In Proceedings of the 11th International World Wide Web Conference (W3C'02), Honolulu, Hawaii, 2002.
-
(2002)
-
-
Cornelli, F.1
Damiani, E.2
Vimercati, S.3
Paraboschi, S.4
Samarati, P.5
-
18
-
-
0042349494
-
Managing and sharing servents' reputations in P2P systems
-
Damiani E, Vimercati S, Paraboschi S, Samarati P. Managing and sharing servents' reputations in P2P systems. IEEE Transactions on Knowledge and Data Engineering 2003; 15(4): 840-854.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.4
, pp. 840-854
-
-
Damiani, E.1
Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
19
-
-
84880467894
-
-
EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference (WWW'03), Budapest, Hungary
-
Kamvar S, Schlosser M, Garcia-Molina H. EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International World Wide Web Conference (WWW'03), Budapest, Hungary, 2003; 640-651.
-
(2003)
, pp. 640-651
-
-
Kamvar, S.1
Schlosser, M.2
Garcia-Molina, H.3
-
20
-
-
39049164287
-
-
Trust evaluation in anarchy: a case study on autonomous networks. In Proceedings of the 25th IEEE International Conference on Computer Communications (Infocom'06), Barcelona, Spain
-
Jiang T, Baras J. Trust evaluation in anarchy: a case study on autonomous networks. In Proceedings of the 25th IEEE International Conference on Computer Communications (Infocom'06), Barcelona, Spain, 2006; 1-12.
-
(2006)
, pp. 1-12
-
-
Jiang, T.1
Baras, J.2
-
21
-
-
84862113042
-
-
On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the 27th IEEE International Conference on Computer Communications (Infocom'08), Phoenix, AZ, USA
-
Raya M, Papadimitratos P, Gligor V, Hubaux JP. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the 27th IEEE International Conference on Computer Communications (Infocom'08), Phoenix, AZ, USA, 2008; 1238-1246.
-
(2008)
, pp. 1238-1246
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.3
Hubaux, J.P.4
-
22
-
-
78449261973
-
An effective calculation of reputation in P2P networks
-
Prasad R, Srinivas V, Kumari V, Raju K. An effective calculation of reputation in P2P networks. Journal of Networks 2009; 4(5): 332-342.
-
(2009)
Journal of Networks
, vol.4
, Issue.5
, pp. 332-342
-
-
Prasad, R.1
Srinivas, V.2
Kumari, V.3
Raju, K.4
-
23
-
-
3142738238
-
PeerTrust: supporting reputation based trust of peer-to-peer electronic communities
-
Xiong L, Liu L. PeerTrust: supporting reputation based trust of peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 2004; 16(7): 843-857.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
24
-
-
84862067175
-
-
Problems with trusting recommenders to recommend arbitrarily deep chains, Available at: [Accessed 10 March 1998].
-
Abdul-Rahman A. Problems with trusting recommenders to recommend arbitrarily deep chains, 1998. Available at: [Accessed 10 March 1998].
-
(1998)
-
-
Abdul-Rahman, A.1
-
25
-
-
0033903726
-
-
Supporting trust in virtual communities. Proceedings of IEEE Hawaii International Conference on System Sciences
-
Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. Proceedings of IEEE Hawaii International Conference on System Sciences 2000; 33.
-
(2000)
, vol.33
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
26
-
-
2642568213
-
-
Why isn't trust transitive? In Proceedings of the 3rd International Workshop on Security Protocols
-
Christianson B, Harbison W. Why isn't trust transitive? In Proceedings of the 3rd International Workshop on Security Protocols, 1996; 171-176.
-
(1996)
, pp. 171-176
-
-
Christianson, B.1
Harbison, W.2
-
28
-
-
0034782005
-
-
Chord: a scalable peer-to-peer lookup service for internet applications. In Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
-
Stoica I, Morris R, Karger D, Kaashoek F, Balakrishnan H. Chord: a scalable peer-to-peer lookup service for internet applications. In Proceedings of 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2001; 149-160.
-
(2001)
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
29
-
-
0742267177
-
Tapestry: a resilient global-scale overlay for service deployment
-
Zhao B, Huang L, Stribling J, Rhea S, Joseph A, Kubiatowicz J. Tapestry: a resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications 2004; 22(1): 41-53.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 41-53
-
-
Zhao, B.1
Huang, L.2
Stribling, J.3
Rhea, S.4
Joseph, A.5
Kubiatowicz, J.6
-
30
-
-
0034775826
-
A scalable content-addressable network
-
ACM Press: New York, NY, DOI: doi.acm.org/10.1145/383059.383072
-
Ratnasamy S, Francis P, Handley M, Karp R, Schenker S. A scalable content-addressable network. In SIGCOMM'01: Proceedings of the 2001 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press: New York, NY, 2001; 161-172. DOI: doi.acm.org/10.1145/383059.383072
-
(2001)
SIGCOMM'01: Proceedings of the 2001 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
31
-
-
56749097285
-
CAT: a context-aware trust model for open and dynamic systems
-
ACM: New York, NY, DOI: doi.acm.org/10.1145/1363686.1364176
-
Uddin MG, Zulkernine M, Ahamed SI. CAT: a context-aware trust model for open and dynamic systems. In SAC'08: Proceedings of the 2008 ACM symposium on Applied computing, ACM: New York, NY, 2008; 2024-2029. DOI: doi.acm.org/10.1145/1363686.1364176
-
(2008)
SAC'08: Proceedings of the 2008 ACM symposium on Applied computing
, pp. 2024-2029
-
-
Uddin, M.G.1
Zulkernine, M.2
Ahamed, S.I.3
-
32
-
-
0141430048
-
Social network size in humans
-
Hill R, Dunbar R. Social network size in humans. Human Nature 2003; 14(1): 53-72.
-
(2003)
Human Nature
, vol.14
, Issue.1
, pp. 53-72
-
-
Hill, R.1
Dunbar, R.2
-
33
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
Dabek F, Kaashoek F, Karger D, Morris R, Stoica I. Wide-area cooperative storage with CFS. SIGOPS Operating Systems Review 2001; 35(5): 202-215.
-
(2001)
SIGOPS Operating Systems Review
, vol.35
, Issue.5
, pp. 202-215
-
-
Dabek, F.1
Kaashoek, F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
34
-
-
0040911004
-
A survey of Web caching schemes for the Internet
-
Wang J. A survey of Web caching schemes for the Internet. SIGCOMM Computer Communication Review 1999; 29(5): 36-46.
-
(1999)
SIGCOMM Computer Communication Review
, vol.29
, Issue.5
, pp. 36-46
-
-
Wang, J.1
-
36
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 2009; 42: 1:1-1:31.
-
(2009)
ACM Computing Surveys
, vol.42
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
37
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Sun Y, Han Z, Liu K. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 2008; 46(2): 112-119.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.2
, pp. 112-119
-
-
Sun, Y.1
Han, Z.2
Liu, K.3
-
38
-
-
84947273682
-
-
The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02)
-
Douceur J. The Sybil Attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002; 251-260.
-
(2002)
, pp. 251-260
-
-
Douceur, J.1
-
39
-
-
84862075809
-
-
AE14: The Imaginary Friends Test, Available at: [Accessed 17 February 2011].
-
Upton R. AE14: The Imaginary Friends Test, 2009. Available at: [Accessed 17 February 2011].
-
(2009)
-
-
Upton, R.1
-
40
-
-
84885797269
-
-
Sybilproof reputation mechanisms. In Proceedings of 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON'05)
-
Cheng A, Friedman E. Sybilproof reputation mechanisms. In Proceedings of 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems (P2PECON'05), 2005; 128-132.
-
(2005)
, pp. 128-132
-
-
Cheng, A.1
Friedman, E.2
-
41
-
-
84862067174
-
-
The Friend-of-a-Friend (FOAF) Project, Available at: [Accessed 17 February 2011].
-
The Friend-of-a-Friend (FOAF) Project, 2009. Available at: [Accessed 17 February 2011].
-
(2009)
-
-
|