Introduction to algorithms
The official PGP user's guide
Communications of the ACM
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
IEEE Internet Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Lightweight Probabilistic Broadcast
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Managing and Sharing Servents' Reputations in P2P Systems
IEEE Transactions on Knowledge and Data Engineering
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
A Reputation and Trust Management Broker Framework for Web Applications
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Ranking systems: the PageRank axioms
Proceedings of the 6th ACM conference on Electronic commerce
Self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at eBay
Proceedings of the 6th ACM conference on Electronic commerce
On the establishment of distinct identities in overlay networks
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks
P2P '05 Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Journal of the American Society for Information Science and Technology
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
A survey of trust and reputation systems for online service provision
Decision Support Systems
A content-driven reputation system for the wikipedia
Proceedings of the 16th international conference on World Wide Web
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
ICDCSW '07 Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
SuperTrust: a secure and efficient framework for handling trust in super-peer networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Algorithmic Game Theory
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Proceedings of the 14th ACM conference on Computer and communications security
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
An axiomatic approach to personalized ranking systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
On the axiomatic foundations of ranking systems
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Trust overlay networks for global reputation aggregation in P2P grid computing
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Do incentives build robustness in bit torrent
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Enhancing peer-to-peer systems through redundancy
IEEE Journal on Selected Areas in Communications
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
Securing rating aggregation systems using statistical detectors and trust
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Towards securing data delivery in peer-to-peer streaming
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Poisonedwater: An improved approach for accurate reputation ranking in P2P networks
Future Generation Computer Systems
ReDS: reputation for directory services in P2P systems
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Sharing reputation across virtual communities
Journal of Theoretical and Applied Electronic Commerce Research
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
ReDS: reputation for directory services in P2P systems
Proceedings of the 2010 ACM workshop on Insider threats
A formal credit-based incentive model for sharing computer resources
EuroPar'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part I
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
A design for securing data delivery in mesh-based peer-to-peer streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
TRAP: open decentralized distributed spam filtering
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
A Case Study of Collaboration and Reputation in Social Web Search
ACM Transactions on Intelligent Systems and Technology (TIST)
An anti-collusion trust model in P2P networks
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems
Proceedings of the sixth ACM workshop on Scalable trusted computing
Trust as a service: a framework for trust management in cloud environments
WISE'11 Proceedings of the 12th international conference on Web information system engineering
Co-Creation: Toward a Taxonomy and an Integrated Research Perspective
International Journal of Electronic Commerce
Systematic analysis of centralized online reputation systems
Decision Support Systems
Trust evaluation initialization using contextual information
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Bounding trust in reputation systems with incomplete information
Proceedings of the second ACM conference on Data and Application Security and Privacy
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Journal of Network and Computer Applications
Credibility-Based trust management for services in cloud environments
ICSOC'11 Proceedings of the 9th international conference on Service-Oriented Computing
Journal of Theoretical and Applied Electronic Commerce Research
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market
ACM SIGSOFT Software Engineering Notes
Building and managing reputation in the environment of Chinese e-commerce: a case study on Taobao
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Propagation of trust and distrust for the detection of trolls in a social network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analytical evaluation of P2P reputation systems
International Journal of Communication Networks and Distributed Systems
Efficient user-assisted content distribution over information-centric network
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A reputation system for multirole sessions
TGC'11 Proceedings of the 6th international conference on Trustworthy Global Computing
Targeted and scalable information dissemination in a distributed reputation mechanism
Proceedings of the seventh ACM workshop on Scalable trusted computing
Sophia: A local trust system to secure key-based routing in non-deterministic DHTs
Journal of Parallel and Distributed Computing
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Trust, distrust and lack of confidence of users in online social media-sharing communities
Knowledge-Based Systems
NSS'12 Proceedings of the 6th international conference on Network and System Security
Trust Management for VANETs: Challenges, Desired Properties and Future Directions
International Journal of Distributed Systems and Technologies
Understanding the effects of P2P dynamics on trust bootstrapping
Information Sciences: an International Journal
SybilCast: broadcast on the open airwaves (extended abstract)
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Trust based recommendation systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
A paradox for trust and reputation in the e-commerce world
ACSC '13 Proceedings of the Thirty-Sixth Australasian Computer Science Conference - Volume 135
Decision making matters: A better way to evaluate trust models
Knowledge-Based Systems
Preventing spam in opportunistic networks
Computer Communications
Hi-index | 0.00 |
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a given domain for each identity within the system. These systems seek to generate an accurate assessment in the face of various factors including but not limited to unprecedented community size and potentially adversarial environments. We focus on attacks and defense mechanisms in reputation systems. We present an analysis framework that allows for the general decomposition of existing reputation systems. We classify attacks against reputation systems by identifying which system components and design choices are the targets of attacks. We survey defense mechanisms employed by existing reputation systems. Finally, we analyze several landmark systems in the peer-to-peer domain, characterizing their individual strengths and weaknesses. Our work contributes to understanding (1) which design components of reputation systems are most vulnerable, (2) what are the most appropriate defense mechanisms and (3) how these defense mechanisms can be integrated into existing or future reputation systems to make them resilient to attacks.