Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Using latent semantic analysis to improve access to textual information
CHI '88 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Probabilistic latent semantic indexing
Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval
Ad Hoc Wireless Networks: Protocols and Systems
Ad Hoc Wireless Networks: Protocols and Systems
SETI@home: an experiment in public-resource computing
Communications of the ACM
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Coordination in multiagent reinforcement learning: a Bayesian approach
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Grid Computing: Making the Global Infrastructure a Reality
Grid Computing: Making the Global Infrastructure a Reality
Statistical Inference
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
The Knowledge Engineering Review
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
Autonomous Agents and Multi-Agent Systems
netWorker - Cloud computing: PC functions move onto the web
Trust Modeling with Context Representation and Generalized Identities
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
Formal trust model for multiagent systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Towards a generic trust model – comparison of various trust update algorithms
iTrust'05 Proceedings of the Third international conference on Trust Management
Combining Cognitive with Computational Trust Reasoning
Trust in Agent Societies
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
On the profitability of incompetence
MABS'10 Proceedings of the 11th international conference on Multi-agent-based simulation
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Trust Management for VANETs: Challenges, Desired Properties and Future Directions
International Journal of Distributed Systems and Technologies
Hi-index | 0.00 |
We present a trust-based mechanism for the acquisition of information from possibly unreliable sources. Our mechanism addresses the case where the acquired information cannot be verified. The idea is to intersperse questions ("challenges") for which the correct answers are known. By evaluating the answers to these challenges, probabilistic conclusions about the correctness of the unverifiable information can be drawn. Less challenges need to be used if an information provider has shown to be trustworthy. This work focuses on three major issues of such a mechanism. First, how to estimate the correctness of the unverifiable information. Second, how to determine an optimal number of challenges. And finally, how to establish trust and use it to reduce the number of challenges. Our approach can resist collusion and shows great promise for various application areas such as distributed computingor peer-to-peer networks.