Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Communications of the ACM
Communications of the ACM
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
Strategies against Replay Attacks
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 7 - Volume 7
Reputation and endorsement for web services
ACM SIGecom Exchanges - Chains of commitment
Social ReGreT, a reputation model based on social relations
ACM SIGecom Exchanges - Chains of commitment
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A survey of trust and reputation systems for online service provision
Decision Support Systems
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Foundations of security analysis and design IV
Hi-index | 0.00 |
Today, reputation systems such as ebay's prominent "Feed-back Forum" are becoming more widespread. In such a system, reputations are formed by aggregating ratings participants give and receive. These reputations, however, are bound to a specific platform preventing participants from taking and showing their hard-earned reputations elsewhere. That makes the reputations less valuable and leaves them vulnerable to manipulation and total loss. In this paper, we propose a viable solution to these issues in which current P2P and PKI technologies are employed to shift ownership and responsibility back to the participants. Our envisioned Reputation Management System, therefore, uses context-dependent feedback gathered in questionnaires and provides security for peer transactions to ensure integrity, confidentiality and privacy.