Communications of the ACM
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
A Probabilistic Framework for Decentralized Management of Trust and Quality
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
P2P Networking and Applications
P2P Networking and Applications
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Dishonest behaviors in online rating systems: cyber competition, attack models, and attack generator
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Incentive compatible mechanism in P2P systems
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
From simulations to theorems: a position paper on research in the field of computational trust
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Towards a formal framework for computational trust
FMCO'06 Proceedings of the 5th international conference on Formal methods for components and objects
Struggling with misbehaviours in trust systems
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Trust-aware in-network aggregation for wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Effective Usage of Computational Trust Models in Rational Environments
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Collusion in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
Trust evaluation initialization using contextual information
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
A reputation multi-agent system in semantic web
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Trust measures for competitive agents
Knowledge-Based Systems
Non-cryptographic methods for improving real time transmission security and integrity
Annales UMCS, Informatica - Security Systems
A semantic reputation mechanism in p2p semantic web
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Digital trust games: an experimental study
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
Users' attachment in trust networks: reputation vs. effort
International Journal of Bio-Inspired Computation
Hi-index | 0.00 |
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in the literature as a viable solution to the problem. The current work in the field can be roughly divided into two groups: social networks that rely on aggregating the entire available feedback in the network in hope achieving as much robustness against possible misbehavior as possible and probabilistic models that rely on the well known probabilistic estimation techniques but use only a limited fraction of the available feedback. In this paper we provide first an overview of these techniques and then a comprehensive comparison of the two classes of approaches. We test their performance against various classes of collusive peer behavior and analyze their properties with respect to the implementation costs they incur and trust semantics they offer to the decision makers.