IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Certified reputation: how an agent can trust a stranger
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Levels of Authentication Assurance: an Investigation
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Secure overlay networks for federated service provision and management
Computers and Electrical Engineering
Towards Secure Trust Bootstrapping in Pervasive Computing Environment
HASE '08 Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium
Reputation Bootstrapping for Trust Establishment among Web Services
IEEE Internet Computing
Improving Social Recommender Systems
IT Professional
Start Trusting Strangers? Bootstrapping and Prediction of Trust
WISE '09 Proceedings of the 10th International Conference on Web Information Systems Engineering
SuperTrust - a secure and efficient framework for handling trust in super peer networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Bootstrapping trust evaluations through stereotypes
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Trust establishment in the formation of Virtual Organizations
Computer Standards & Interfaces
Modeling a distributed intrusion detection system using collaborative building blocks
ACM SIGSOFT Software Engineering Notes
Network trust management in emergency situations
Journal of Computer and System Sciences
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
Journal of Network and Systems Management
Trust-based clustering for multicast key distribution scheme in ad hoc network (TBCMKDS)
International Journal of Internet Protocol Technology
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
Mobility in collaborative alert systems: building trust through reputation
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Contextual Trust Aided Enhancement of Data Availability in Peer-to-Peer Backup Storage Systems
Journal of Network and Systems Management
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
International Journal of Information Security
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security network interface for alarm systems
Computer Standards & Interfaces
Propagation of trust and distrust for the detection of trolls in a social network
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Generalized Stereotypical Trust Model
TRUSTCOM '12 Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
Behavior-based reputation management in P2P file-sharing networks
Journal of Computer and System Sciences
Automatic network intrusion detection: Current techniques and open issues
Computers and Electrical Engineering
Wireless Personal Communications: An International Journal
Journal of Network and Systems Management
Hi-index | 0.00 |
Today trust is a key factor in distributed and collaborative environments aimed to model participating entities@? behavior, and to foresee their further actions. Yet, prior to the first interaction of a newcomer in the system trust and reputation models face a great challenge: how to assign an accurate initial reputation to a newcomer? The answer needs to tackle two well-known problems: cold-start and reputation bootstrapping. Cold-start is a common issue to any system when newcomers boot for the first time, while reputation bootstrapping especially affects highly distributed scenarios, where mobile entities travel across domains and collaborate with a number of them. In this paper we focus on the two problems, which are addressed through a novel reputation bootstrapping mechanism for newcomers in a collaborative alert system aimed at detecting distributed threats. Experiments confirm the accuracy of our proposal as well as its robustness in the presence of ill-intentioned entities.