Item-based collaborative filtering recommendation algorithms
Proceedings of the 10th international conference on World Wide Web
Incentives for sharing in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
CuboidTrust: a global reputation-based trust model in peer-to-peer networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Peer-to-peer virtual communities are often established dynamically with peers that are unrelated and unknown to each other. Peers have to manage the risk involved with the transactions without prior knowledge about each other's reputation. SimiTrust, a reputation management scheme, is proposed for P2P virtual communities. A unique global trust value, computed by aggregating similarity-weighted recommendations of the peers who have interacted with him and reflecting the degree that the community as a whole trusts a peer, is assigned to each peer in the community. Different from previous global-trust based schemes, SimiTrust does not need any pre-trusted peers to ensure algorithm convergence and invalidates the assumption that the peers with high trust value will give the honest recommendation. Theoretical analyses and experiments show that the scheme is still robust under more general conditions where malicious peers cooperate in an attempt to deliberately subvert the system, converges more quickly and decreases the number of inauthentic files downloaded more effectively than previous schemes.