NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Propagating multitrust within trust networks
Proceedings of the 2008 ACM symposium on Applied computing
Distributed Collaborative Filtering for Robust Recommendations Against Shilling Attacks
CAI '07 Proceedings of the 20th conference of the Canadian Society for Computational Studies of Intelligence on Advances in Artificial Intelligence
SCLP for Trust Propagation in Small-World Networks
Recent Advances in Constraints
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
Towards an evaluation methodology for computational trust systems
iTrust'05 Proceedings of the Third international conference on Trust Management
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
The World Wide Web encourages widely-distributed,open, decentralised systems that span multiple administrative domains. Recent research has turned to trustmanagement [4] as a framework for decentralising security decisions in such systems. However, whilst traditional security measures such as cryptography and encryption are well-understood (theoretically and empirically), the same cannot be said for computational trustmodels. This paper describes the attack-resistance ofseveral well-referenced trust models, in a move toward apossible framework and terminology for such analyses.We present a number of open questions, and considerpossible future directions in the area.