Computing and using reputations for internet ratings
Proceedings of the 3rd ACM conference on Electronic Commerce
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Simulation of a distributed recommendation system for pervasive networks
Proceedings of the 2005 ACM symposium on Applied computing
A reputation-based trust management system for P2P networks
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Security for interactions in pervasive networks: applicability of recommendation systems
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Hi-index | 0.00 |
In Peer-to-Peer (P2P) communities, users make personal trust evaluations of each other based on their experiences and observations. The available information of the peer's past behaviour, i.e., reputation, is often incomplete, so the credibility of evaluations is a concern and the relevance of the available information varies. In this paper, we propose functions for producing tailored trustworthiness estimations in P2P communities based on the peers' past behaviour. The presented mechanism provides some flexibility for applying it to different kinds of P2P networks.