Reputation and social network analysis in multi-agent systems
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Trust Metrics, Models and Protocols for Electronic Commerce Transactions
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
A Framework and Ontology for Dynamic Web Services Selection
IEEE Internet Computing
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
P2P reputation management: Probabilistic estimation vs. social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
From simulations to theorems: a position paper on research in the field of computational trust
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Foundations of security analysis and design IV
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
Spread spectrum image steganography
IEEE Transactions on Image Processing
Hi-index | 0.01 |
In this paper we present a few non cryptographic methods for improving the security, integrity and reliability of real time services. The methods presented in this paper apply to real time transmitting systems, which are based on the Peer-to-Peer (P2P) model. A basic idea of the first technique is to use agents for detecting steganographic content in packet headers, so packets with suspicious entries in the IP header fields will be blocked or the fields will be erased. The two other presented techniques are based on reputation and trust systems, so trust and reputation basic definitions, types and modelling methods are shown. Also a simple design scheme of using these mechanisms in a P2P real-time data transmitting infrastructure is presented. Additionally, we describe an idea of path selecting technique, which can be used to avoid paths that are susceptible to eavesdropping.