Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Communications of the ACM
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
E-Commerce Recommendation Applications
Data Mining and Knowledge Discovery
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
Using attribute certificates with mobile policies in electronic commerce applications
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Collaborative Reputation Mechanisms in Electronic Marketplaces
HICSS '99 Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 8 - Volume 8
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Collaborative Automated Trust Negotiation in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Proceedings of the 11th ACM conference on Computer and communications security
A trust model of p2p system based on confirmation theory
ACM SIGOPS Operating Systems Review
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Reputation-based trust management
Journal of Computer Security - Special issue on WITS'03
Fighting peer-to-peer SPAM and decoys with object reputation
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
An Architectural Approach for Decentralized Trust Management
IEEE Internet Computing
A secured hierarchical trust management framework for public computing utilities
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Journal of the American Society for Information Science and Technology
Architectural support for trust models in decentralized applications
Proceedings of the 28th international conference on Software engineering
Trade-offs between reliability and overheads in peer-to-peer reputation tracking
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Dubious feedback: fair or not?
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
A Bias-tuned Dishonesty-resistant Reputation Evaluation Method for Trust Establishment in Grid
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Fuzzy trust evaluation and credibility development in multi-agent systems
Applied Soft Computing
A survey of trust and reputation systems for online service provision
Decision Support Systems
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing decentralized reputation management using TrustGuard
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
A user-oriented contents recommendation system in peer-to-peer architecture
Expert Systems with Applications: An International Journal
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A Quantitative Comparison of Reputation Systems in the Grid
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity
IEEE Transactions on Parallel and Distributed Systems
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
Electronic Notes in Theoretical Computer Science (ENTCS)
Building Reputations for Internet Clients
Electronic Notes in Theoretical Computer Science (ENTCS)
Adaptive Reputation-Based Scheduling on Unreliable Distributed Infrastructures
IEEE Transactions on Parallel and Distributed Systems
Globally decoupled reputations for large distributed networks
Advances in Multimedia
A reputation-based system model for P2P networks
ACST'07 Proceedings of the third conference on IASTED International Conference: Advances in Computer Science and Technology
Towards content trust of web resources
Web Semantics: Science, Services and Agents on the World Wide Web
Counteracting free riding in Peer-to-Peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Trust on the world wide web: a survey
Foundations and Trends in Web Science
A new resource selection approach based on reputation driven Min-min algorithm in the grid economy
CHINA HPC '07 Proceedings of the 2007 Asian technology information program's (ATIP's) 3rd workshop on High performance computing in China: solution approaches to impediments for high performance computing
Securing peer-to-peer media streaming systems from selfish and malicious behavior
Proceedings of the 4th on Middleware doctoral symposium
A probabilistic trust model for semantic peer to peer systems
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
Securing services in nomadic computing environments
Information and Software Technology
Designing less-structured P2P systems for the expected high churn
IEEE/ACM Transactions on Networking (TON)
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems
Agents and Peer-to-Peer Computing
A Unifying Framework for Building Social Computing Applications
WSKS '08 Proceedings of the 1st world summit on The Knowledge Society: Emerging Technologies and Information Systems for the Knowledge Society
ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
SecGRID: model for maintaining trust in large-scale dynamic environments
International Journal of Grid and Utility Computing
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Trusted Reputation Management Service for Peer-to-Peer Collaboration
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Cooperation in P2P Systems through Sociological Incentive Patterns
IWSOS '08 Proceedings of the 3rd International Workshop on Self-Organizing Systems
Rater Credibility Assessment in Web Services Interactions
World Wide Web
IEEE/ACM Transactions on Networking (TON)
A trust management framework for service-oriented environments
Proceedings of the 18th international conference on World wide web
Qualitative trust modeling in SOA
Journal of Systems Architecture: the EUROMICRO Journal
A holistic mechanism against file pollution in peer-to-peer networks
Proceedings of the 2009 ACM symposium on Applied Computing
Gossip-based aggregation of trust in decentralized reputation systems
Autonomous Agents and Multi-Agent Systems
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Reputation management algorithms for DHT-based peer-to-peer environment
Computer Communications
Fuzzy Regression Based Trust Prediction in Service-Oriented Applications
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
P2P Incentive Mechanism for File Sharing and Cooperation
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
Trading Anonymity for Influence in Open Communities Voting Schemata
SOCINFO '09 Proceedings of the 2009 International Workshop on Social Informatics
RATEWeb: Reputation Assessment for Trust Establishment among Web services
The VLDB Journal — The International Journal on Very Large Data Bases
Gossip-based aggregation of trust in decentralized reputation systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Trade-offs between reliability and overheads in peer-to-peer reputation tracking
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Integrating web mining and neural network for personalized e-commerce automatic service
Expert Systems with Applications: An International Journal
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
ServiceTrust: Supporting Reputation-Oriented Service Selection
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
P2P commercial digital content exchange
Electronic Commerce Research and Applications
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Bounding virus proliferation in P2P networks with a diverse-parameter trust management scheme
IEEE Communications Letters
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A comprehensive and adaptive trust model for large-scale P2P networks
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Distributed dynamic protection of services on ad hoc and peer to peer networks
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A new trust model based on advanced D-S evidence theory for P2P networks
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Running on Karma - P2P reputation and currency systems
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A new reputation-based trust management mechanism against false feedbacks in peer-to-peer systems
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
SuperTrust - a secure and efficient framework for handling trust in super peer networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Foundations of security analysis and design IV
A provider-level reputation system for assessing the quality of SPIT mitigation algorithms
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Reputation estimation and query in peer-to-peer networks
IEEE Communications Magazine
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Recruiting new tor relays with BRAIDS
Proceedings of the 17th ACM conference on Computer and communications security
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
The design of a reliable reputation system
Electronic Commerce Research
A proactive data security framework for mission-critical sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Context based trust normalization in service-oriented environments
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Journal of Computational Methods in Sciences and Engineering - Intelligent Systems and Knowledge Management (Part II)
A point-based inventive system to prevent free-riding on P2P network environments
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Reputation-based resource allocation in market-oriented distributed systems
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Finding reliable recommendations for trust model
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Kaliphimos: a community-based peer-to-peer group management scheme
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A p2p content authentication protocol based on byzantine agreement
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A requirements-driven trust framework for secure interoperation in open environments
iTrust'06 Proceedings of the 4th international conference on Trust Management
GIVS: integrity validation for grid security
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Decoupling service and feedback trust in a peer-to-peer reputation system
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
TPOD: a trust-based incentive mechanism for peer-to-peer live broadcasting
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A group based reputation system for p2p networks
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A novel behavior-based peer-to-peer trust model
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Towards reliable and trustworthy cooperation in grid: a pre-evaluating set based trust model
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Bounding trust in reputation systems with incomplete information
Proceedings of the second ACM conference on Data and Application Security and Privacy
Decentralized reputation-based trust for assessing agent reliability under aggregate feedback
Trusting Agents for Trusting Electronic Societies
A computational reputation model in p2p networks based on trust and distrust
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Opinion filtered recommendation trust model in peer-to-peer networks
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
A scalable and robust qos architecture for wifi p2p networks
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Free and Open Source Software versus Internet content filtering and censorship: A case study
Journal of Systems and Software
Recard: using recommendation cards approach for building trust in peer-to-peer networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A behavior characteristics-based reputation evaluation method for grid entities
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Uncheatable reputation for distributed computation markets
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
A trust management scheme in structured p2p systems
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
X2BT trusted reputation system: a robust mechanism for p2p networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Secure remote execution of sequential computations
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Controlling data dissemination
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
A game-theoretic analysis of cooperation in anonymity networks
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Content Provision Strategies in the Presence of Content Piracy
Information Systems Research
@Trust: A trust model based on feedback-arbitration in structured P2P network
Computer Communications
Future Generation Computer Systems
STARS: ad-hoc peer-to-peer online social network
ICCCI'12 Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I
Self-* in Multimedia Communication Overlays
Computer Communications
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of Grid and Utility Computing
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services have reached tens of millions of users. A feature that significantly contributes to the success of many P2P applications is user anonymity. However, anonymity opens the door to possible misuses and abuses, exploiting the P2P network as a way to spread tampered with resources, including Trojan Horses, viruses, and spam. To address this problem we propose a self-regulating system where the P2P network is used to implement a robust reputation mechanism. Reputation sharing is realized through a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download. This way, spreading of malicious contents will be reduced and eventually blocked. Our approach can be straightforwardly piggybacked on existing P2P protocols and requires modest modifications to current implementations.