Web-Based Reputation Management Systems: Problems and Suggested Solutions
Electronic Commerce Research
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Managing and Sharing Servents' Reputations in P2P Systems
IEEE Transactions on Knowledge and Data Engineering
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Classification features for attack detection in collaborative recommender systems
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Computing in social networks with relationship algebra
Journal of Network and Computer Applications
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
A reputation function and associated reputation management system (RMS) seem to be at the heart of all online transactional activities that require trust. However, most of the first generation RMS used are yet very basic, ad hoc and often vulnerable to various attacks. In this research, we take a holistic approach to this interesting problem of RMS design. We propose a generalized set-theoretic phenotype reputation function where its specific components can be customized to meet the reputation requirements of wide variety of reputation assessment needs encountered in today's online activities. We show the construction of canonical classes of reputation functions built on this framework. We then analyze their attack tolerance against various socio-communal reputation attacks such as gang attacks, vendetta and Dr. Jekyll & Mr. Hyde.