Communications of the ACM
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Deconstructing the Kazaa Network
WIAPP '03 Proceedings of the The Third IEEE Workshop on Internet Applications
ISEC '02 Proceedings of the Third International Symposium on Electronic Commerce
[15] Peer-to-Peer Architecture Case Study: Gnutella Network
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Fighting peer-to-peer SPAM and decoys with object reputation
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Preventing DDoS Attacks Based on Credit Model for P2P Streaming System
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
The secure transmission of messages via computer networks is, in many scenarios, considered to be a solved problem. However, a related problem, being almost as crucial, has been widely ignored: To whom to entrust information? We argue that confidentiality modeling is a question of trust. Therefore, the article at hand addresses this problem based on a reputation system. We consider a Peer-to-Peer network whose participants decide on whether or not to make information available to other nodes based on the author's trust relationships. Documents are only forwarded to another node if, according to the sender's local view, the recipient is considered to be sufficiently trustworthy. In contrast to most existing reputation systems, trust relationships are considered only with respect to a specific domain. Privacy is preserved by limiting the revelation of trust relationships.