AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
Autonomous Agents and Multi-Agent Systems
Towards provably secure trust and reputation systems in e-marketplaces
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Modeling trust using transactional, numerical units
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Retrieving and reusing game plays for robot soccer
ECCBR'06 Proceedings of the 8th European conference on Advances in Case-Based Reasoning
Coalition detection and identification
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
The state of the art in trust and reputation systems: a framework for comparison
Journal of Theoretical and Applied Electronic Commerce Research
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Electronic Commerce Research
Analysis of robustness in trust-based recommender systems
RIAO '10 Adaptivity, Personalization and Fusion of Heterogeneous Information
Partial identities as a foundation for trust and reputation
Engineering Applications of Artificial Intelligence
Multi-layer cognitive filtering by behavioral modeling
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Leveraging Network Properties for Trust Evaluation in Multi-agent Systems
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
An agent infrastructure for privacy-enhancing agent-based e-commerce applications
AAMAS'11 Proceedings of the 10th international conference on Advanced Agent Technology
Journal of Theoretical and Applied Electronic Commerce Research
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Building and managing reputation in the environment of Chinese e-commerce: a case study on Taobao
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Propagation of trust and distrust for the detection of trolls in a social network
Computer Networks: The International Journal of Computer and Telecommunications Networking
DART: A Distributed Analysis Of Reputation And Trust Framework
Computational Intelligence
Cheat-Proof trust model for cloud computing markets
GECON'12 Proceedings of the 9th international conference on Economics of Grids, Clouds, Systems, and Services
Improving trust modeling through the limit of advisor network size and use of referrals
Electronic Commerce Research and Applications
Trust based recommendation systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Multimedia Tools and Applications
Macau: a basis for evaluating reputation systems
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Web Intelligence and Agent Systems
Hi-index | 0.00 |
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of cheating. These systems are often evaluated by measuring their performance against simple agents that cheat randomly. Unfortunately, these systems are not often evaluated from the perspective of security---can a motivated attacker defeat the protection? Previously, it was argued that existing systems may suffer from vulnerabilities that permit effective, profitable cheating despite the use of the system. In this work, we experimentally substantiate the presence of these vulnerabilities by successfully implementing and testing a number of such 'attacks', which consist only of sequences of sales (honest and dishonest) that can be executed in the system. This investigation also reveals two new, previously-unnoted cheating techniques. Our success in executing these attacks compellingly makes a key point: security must be a central design goal for developers of trust and reputation systems.