REGRET: reputation in gregarious societies
Proceedings of the fifth international conference on Autonomous agents
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Provable Security for Outsourcing Database Operations
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
A survey of trust and reputation systems for online service provision
Decision Support Systems
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
Privacy homomorphisms for social networks with private relationships
Computer Networks: The International Journal of Computer and Telecommunications Networking
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Handbook of Peer-to-Peer Networking
Handbook of Peer-to-Peer Networking
Multiplicative homomorphic e-voting
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Distributed caching with centralized control
Computer Communications
Enhancing OpenID through a reputation framework
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Mixed-Strategy game based trust management for clustered wireless sensor networks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management
Journal of Network and Systems Management
LFTM, linguistic fuzzy trust mechanism for distributed networks
Concurrency and Computation: Practice & Experience
Journal of Network and Systems Management
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be carried out through the Internet. Nevertheless, they are still some drawbacks due to security threats while performing such operations. Trust and reputation management rises as a novel way of solving some of those problems. In this paper we present our work TRIMS (a privacy-aware trust and reputation model for identity management systems), which applies a trust and reputation model to guarantee an acceptable level of security when deciding if a different domain might be considered reliable when receiving certain sensitive user's attributes. Specifically, we will address the problems which surfaces when a domain needs to decide whether to exchange some information with another possibly unknown domain to effectively provide a service to one of its users. This decision will be determined by the trust deposited in the targeting domain. As far as we know, our proposal is one of the first approaches dealing with trust and reputation management in a multi-domain scenario. Finally, the performed experiments have demonstrated the robustness and accuracy of our model in a wide variety of scenarios.