The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Communications of the ACM
ACM Transactions on Information and System Security (TISSEC)
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
Associating Metrics to Certification Paths
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Computing and applying trust in web-based social networks
Computing and applying trust in web-based social networks
Network monitors and contracting systems: competition and innovation
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
A survey of trust and reputation systems for online service provision
Decision Support Systems
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Truth in advertising: lightweight verification of route integrity
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Secure or insure?: a game-theoretic analysis of information security games
Proceedings of the 17th international conference on World Wide Web
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
P2P '08 Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing
Methods for empirical game-theoretic analysis
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
iTrust'05 Proceedings of the Third international conference on Trust Management
Using game theory to analyze wireless ad hoc networks
IEEE Communications Surveys & Tutorials
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Hi-index | 0.00 |
The Introduction-Based Routing Protocol (IBRP) leverages implicit trust relationships and per-node discretion to create incentives to avoid associating with misbehaving network participants. Nodes exercise discretion through their policies for offering or accepting introductions. We empirically demonstrate the robustness of IBRP against different attack scenarios. We also use empirical game-theoretic techniques to assess the strategic stability of compliant policies, and find preliminary evidence that IBRP encourages the adoption of policies that limit damage from misbehaving nodes. We argue that IBRP scales to Internet-sized networks, and can be deployed as an overlay on the current Internet, requiring no modifications to applications, operating systems or core network services, thus minimizing cost of adoption.