Spam attacks: p2p to the rescue
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
On the Security of Polling Protocols in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Reputation Management Framework and Its Use as Currency in Large-Scale Peer-to-Peer Networks
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Collision Module Integration in a Specific Graphic Engine for Terrain Visualization
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
IEEE Intelligent Systems
Managing Multiple and Dependable Identities
IEEE Internet Computing
Journal of the American Society for Information Science and Technology
A server-mediated peer-to-peer system
ACM SIGecom Exchanges
Supporting location-based conditions in access control policies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Bottom-Up Extraction and Trust-Based Refinement of Ontology Metadata
IEEE Transactions on Knowledge and Data Engineering
A Comprehensive RMS Model for P2P e-Commerce Communities
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
Electronic Notes in Theoretical Computer Science (ENTCS)
Building Reputations for Internet Clients
Electronic Notes in Theoretical Computer Science (ENTCS)
Automatic grid assembly by promoting collaboration in peer-to-peer grids
Journal of Parallel and Distributed Computing
On complexity of normal basis multiplier using modified Booth's algorithm
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Surework: a super-peer reputation framework for p2p networks
Proceedings of the 2008 ACM symposium on Applied computing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
ACM Transactions on Information and System Security (TISSEC)
A phenotype reputation estimation function and its study of resilience to social attacks
Journal of Network and Computer Applications
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
A comprehensive and adaptive trust model for large-scale P2P networks
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A new reputation mechanism against dishonest recommendations in P2P systems
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
ICRep: an incentive compatible reputation mechanism for P2P systems
WISA'07 Proceedings of the 8th international conference on Information security applications
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
A mechanism that provides incentives for truthful feedback in peer-to-peer systems
Electronic Commerce Research
ScoreTree: a decentralised framework for credibility management of user-generated content
Proceedings of the 11th IFIP WG 6.1 international conference on Distributed applications and interoperable systems
TIDE: measuring and evaluating trustworthiness and credibility of enterprises in digital ecosystem
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
An enhanced n-way exchange-based incentive scheme for p2p file sharing (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
The application of collaborative filtering for trust management in p2p communities
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Adding a peer-to-peer trust layer to metadata generators
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
Self-protection in p2p networks: choosing the right neighbourhood
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Dynamic self-management of autonomic systems: the reputation, quality and credibility (RQC) scheme
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
SONR: A reliable reputation system of self-organized network
Journal of Network and Computer Applications
Viewpoints on emergent semantics
Journal on Data Semantics VI
Optimizing an incentives' mechanism for truthful feedback in virtual communities
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
A time-frame based trust model for p2p systems
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which the desired information can be located and downloaded while preserving the anonymity of both requestors and providers. As recent experience with P2P environments such as Gnutella shows, anonymity opens the door to possible misuses and abuses by resource providers exploiting the network as a way to spread tampered-with resources, including malicious programs, such as Trojan Horses and viruses. In this paper, we propose an approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers. Reputation sharing is based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download. The approach complements existing P2P protocols and has a limited impact on current implementations. Furthermore, it keeps the current level of anonymity of requestors and providers, as well as that of the parties sharing their view on others' reputations.