IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
An electronic marketplace based on reputation and learning
Journal of Theoretical and Applied Electronic Commerce Research
A Computational Distributed Reputation Model for B2C E-commerce
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A distributed agent-based reputation framework enhancing trust in e-commerce
ASC '07 Proceedings of The Eleventh IASTED International Conference on Artificial Intelligence and Soft Computing
On desideratum for B2C E-commerce reputation systems
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Canadian AI'08 Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence
SETNR/A: an agent-based secure payment protocol for mobile commerce
International Journal of Intelligent Information and Database Systems
Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
This paper examines current approaches used in reputation management and defines five basic metrics for the evaluation of reputation of Trusted Third Party (TTP) hosts employed in mobile agent-based e-commerce applications. By taking these metrics into account, a new distributed reputation management scheme is proposed for quantifying and managing the reputation of the TTP-hosts based on a transaction-based feedback system. The scheme exhibits several interesting features not seen in previous work: firstly, it offers better efficiency and robustness for an application that employs it, and secondly, it credits/penalizes a TTP-host according to its transactional behavior, the transaction value and the reputation of the source of feedback. In this way, TTP-hosts may be deterred from misbehaving.