NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
The effect of negative buyer feedback on prices in Internet auction markets
ICIS '00 Proceedings of the twenty first international conference on Information systems
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
E-Commerce Trust Metrics and Models
IEEE Internet Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Offline Micropayments without Trusted Hardware
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
An Optimal Strategy for Anonymous Communication Protocols
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Secure hierarchical multicast routing and multicast internet anonymity
Secure hierarchical multicast routing and multicast internet anonymity
Samsara: honor among thieves in peer-to-peer storage
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
SHARP: an architecture for secure resource peering
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
A reputation-based trust management system for P2P networks
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Fileteller: paying and getting paid for file storage
FC'02 Proceedings of the 6th international conference on Financial cryptography
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Incentive mechanisms for peer-to-peer systems
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Making p2p accountable without losing privacy
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Credibility Based Reputation Calculation in P2P Networks
ICDCIT '08 Proceedings of the 5th International Conference on Distributed Computing and Internet Technology
The effect of malicious peers in a gossip-based reputation system
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A unified security backplane for trust and reputation systems in decentralized networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Bayesian analysis of secure P2P sharing protocols
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Hi-index | 0.00 |
The decentralised, cooperative and self-organising nature of Peer-to-Peer (P2P) systems help to mitigate and even overcome many challenges which overwhelm the traditional client-server approaches. On the other hand, these very characteristics also introduce some novel issues in P2P environments. One of the critical issues is how to build the trust relationship within P2P systems. In this paper, we first discuss the desired properties that need to be considered while building trust in P2P systems. Then, we analyse two types of attacks both the ones mitigated by as well as the ones aimed at trust systems. After this, we divide the previous research work on building trust in P2P systems into two broad categories, that is, reputation-based and trade-based. We then review and discuss the advances in this area based on this classification. Finally, we point out some potential research directions in building trust securely in P2P systems.