The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Subjective Metric of Authentication
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Spreading Activation Models for Trust Propagation
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
Collision Module Integration in a Specific Graphic Engine for Terrain Visualization
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
Robust content-driven reputation
Proceedings of the 1st ACM workshop on Workshop on AISec
Can reputation migrate? On the propagation of reputation in multi-context communities
Knowledge-Based Systems
Assigning trust to Wikipedia content
WikiSym '08 Proceedings of the 4th International Symposium on Wikis
Towards a decision model based on trust and security risk management
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
TATA: towards anonymous trusted authentication
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, the calculation of a unique trust value supposed to reflect the overall trustworthiness brought by the set of linked pseudonyms. In fact, some pieces of evidence may overlap and be overcounted, leading to an incorrect trust value. In this approach, self-recommendations are possible during the privacy/trust trade. However, this means that Sybil attacks, where thousands of virtual identities belonging to the same real-world entity recommend each other, are potentially easier to carry out, as self-recommendations are an integral part of the attack. In this paper, trust transfer is used to achieve safe fusionym and protect against Sybil attacks when pieces of evidence are limited to direct observations and recommendations based on the count of event outcomes. Trust transfer implies that recommendations move some of the trustworthiness of the recommending entity to the trustworthiness of the trustee. It is demonstrated and tailored to email anti-spam settings.