Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The consensus operator for combining beliefs
Artificial Intelligence
Authorization Based on Evidence and Trust
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
A Reputation System to Increase MIX-Net Reliability
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Towards a formal notion of trust
Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A logic for reasoning about evidence
UAI'03 Proceedings of the Nineteenth conference on Uncertainty in Artificial Intelligence
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Issues related to processing of evidence in evidence-based reputation systems, with a particular concern for user privacy, are discussed in our paper. The novel idea of evidence-based reputation (or trust) systems is that such systems do not rely on an objective knowledge of user identity. One has instead to consider possible privacy infringements based on the use of data (evidence) about the previous behaviour of entities in the systems. We provide a brief introduction to evidence-based trust/reputation systems, as well as to the privacy issues, addressing the common problem of many papers that narrow the considerations of privacy to anonymity only. We elaborate on the concept of pseudonymity through aspects of evidence storing and processing. This, together with a consideration of current work on trust models, leads to our specification of requirements for the trust model for evidence-based systems supporting pseudonymity.