Social trust: a cognitive approach
Trust and deception in virtual societies
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
A survey of trust and reputation systems for online service provision
Decision Support Systems
A service-centric model for intrusion detection in next-generation networks
Computer Standards & Interfaces
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Integrating players, reputation and ranking to manage cheating in MMOGs
Proceedings of the Fifth International Conference on the Foundations of Digital Games
Hi-index | 0.00 |
A collaborative system for dynamic refinement of security in peer-to-peer and mobile ad hoc networks is described in this paper. This is based on a closed loop system where live distributed trust measures are used to modify access control settings in a changing threat environment. A service oriented trust overlay architecture and model underlies this system. In this model, services have associated trust thresholds - the more sensitive the service, the higher the threshold. The results of simulations of the dynamics of this kind of system are presented and a variety of algorithmic approaches to managing trust are analysed and discussed. It is demonstrated that this dynamic system has the potential to enhance security and access control efficiency and that it displays properties of robustness when faced with malicious entities that attempt to corrupt the system.