The official PGP user's guide
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
A survey of web caching schemes for the Internet
ACM SIGCOMM Computer Communication Review
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Proceedings of the International Workshop on Security Protocols
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Managing and Sharing Servents' Reputations in P2P Systems
IEEE Transactions on Knowledge and Data Engineering
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
CAT: a context-aware trust model for open and dynamic systems
Proceedings of the 2008 ACM symposium on Applied computing
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The TwoHop trust framework is a collaborative system for computing trust towards service providers in a peer-to-peer network. TwoHop participants share their trust information so that peers without prior interaction may establish indirect trust relationships. TwoHop imposes a limit of two hops on trust delegation chains, which allows for increased efficiency in the trust calculation process. In addition, it provides multiple edges between nodes in the trust graph, allowing for the existence of both service evaluations and recommendations for service evaluators. In this paper, we present an improved version of the TwoHop trust calculation algorithm along with a formal description of its model of trust. We evaluate its key characteristics against those of other trust frameworks and compare it with the EigenTrust algorithm and to an improved version of the PeerTrust algorithm in terms of performance. Our simulation results indicate the robustness of our design against dishonest participants and its ability to scale to accommodate the needs of large peer-to-peer networks. Copyright © 2012 John Wiley & Sons, Ltd.