Discrete-event simulation
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
Introduction to Feedback Control Theory
Introduction to Feedback Control Theory
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Modular Fair Exchange Protocols for Electronic Commerce
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
ACM SIGecom Exchanges
Simple and fast optimistic protocols for fair electronic exchange
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Securing publish-subscribe overlay services with EventGuard
Proceedings of the 12th ACM conference on Computer and communications security
The Green Card Protocol: An Identification Protocol for Decentralized Systems
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Dubious feedback: fair or not?
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Indirect partner interaction in peer-to-peer networks: stimulating cooperation by means of structure
Proceedings of the 8th ACM conference on Electronic commerce
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Dealing with change: components versus services
Communications of the ACM
Globally decoupled reputations for large distributed networks
Advances in Multimedia
Analysis of ratings on trust inference in open environments
Performance Evaluation
RepuScore: collaborative reputation management framework for email infrastructure
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Examining the motivations of defection in large-scale open systems
Proceedings of the 2008 ACM symposium on Applied computing
Towards robust trust establishment in web-based social networks with socialtrust
Proceedings of the 17th international conference on World Wide Web
Socialtrust: tamper-resilient trust establishment in online communities
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
A robust methodology for prediction of trust and reputation values
Proceedings of the 2008 ACM workshop on Secure web services
Scalable reputation management with trustworthy user selection for P2P MMOGs
International Journal of Advanced Media and Communication
Trusted Reputation Management Service for Peer-to-Peer Collaboration
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Cooperation in P2P Systems through Sociological Incentive Patterns
IWSOS '08 Proceedings of the 3rd International Workshop on Self-Organizing Systems
Credibility Based Reputation Calculation in P2P Networks
ICDCIT '08 Proceedings of the 5th International Conference on Distributed Computing and Internet Technology
A Framework for Reputation Management in Large-Scale Distributed Systems
Computer Supported Cooperative Work in Design IV
IEEE/ACM Transactions on Networking (TON)
Secure routing in peer-to-peer distributed hash tables
Proceedings of the 2009 ACM symposium on Applied Computing
Gossip-based aggregation of trust in decentralized reputation systems
Autonomous Agents and Multi-Agent Systems
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Gossip-based aggregation of trust in decentralized reputation systems
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
The SocialTrust framework for trusted social information management: Architecture and algorithms
Information Sciences: an International Journal
A reputation-driven scheduler for autonomic and sustainable resource sharing in Grid computing
Journal of Parallel and Distributed Computing
ServiceTrust: Supporting Reputation-Oriented Service Selection
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
On the modeling of honest players in reputation systems
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Trustworthy interaction balancing in mixed service-oriented systems
Proceedings of the 2010 ACM Symposium on Applied Computing
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A new reputation mechanism against dishonest recommendations in P2P systems
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
ICRep: an incentive compatible reputation mechanism for P2P systems
WISA'07 Proceedings of the 8th international conference on Information security applications
Modeling and mining of dynamic trust in complex service-oriented systems
Information Systems
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Relating Reputation and Money in Online Markets
ACM Transactions on the Web (TWEB)
Incentive strategy based on trust model in P2P network
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
A hybrid trust management system for automated fine-grained access control
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Trust and distrust in adaptive inter-enterprise collaboration management
Journal of Theoretical and Applied Electronic Commerce Research
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
The design of a reliable reputation system
Electronic Commerce Research
A proactive data security framework for mission-critical sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
Journal of Network and Systems Management
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
EventGuard: A System Architecture for Securing Publish-Subscribe Networks
ACM Transactions on Computer Systems (TOCS)
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
MTrust: a reputation-based trust model for a mobile agent system
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Trust model based on similarity measure of vectors in p2p networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Bounding trust in reputation systems with incomplete information
Proceedings of the second ACM conference on Data and Application Security and Privacy
METrust: A mutual evaluation-based trust model for P2P networks
International Journal of Automation and Computing
A time-frame based trust model for p2p systems
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Preventing recommendation attack in trust-based recommender systems
Journal of Computer Science and Technology - Special issue on Community Analysis and Information Recommendation
Analytical evaluation of P2P reputation systems
International Journal of Communication Networks and Distributed Systems
An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks
Journal of Parallel and Distributed Computing
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
ACM Transactions on Internet Technology (TOIT)
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks
Proceedings of the 18th ACM symposium on Access control models and technologies
Reliable medical recommendation systems with patient privacy
ACM Transactions on Intelligent Systems and Technology (TIST) - Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
A mobile market for agricultural trade in Uganda
Proceedings of the 4th Annual Symposium on Computing for Development
Hi-index | 0.02 |
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. One of the fundamental challenges in distributed reputation management is to understand vulnerabilities and develop mechanisms that can minimize the potential damages to a system by malicious nodes. In this paper, we identify three vulnerabilities that are detrimental to decentralized reputation management and propose TrustGuard - a safeguard framework for providing a highly dependable and yet efficient reputation system. First, we provide a dependable trust model and a set of formal methods to handle strategic malicious nodes that continuously change their behavior to gain unfair advantages in the system. Second, a transaction based reputation system must cope with the vulnerability that malicious nodes may misuse the system by flooding feedbacks with fake transactions. Third, but not least, we identify the importance of filtering out dishonest feedbacks when computing reputation-based trust of a node, including the feedbacks filed by malicious nodes through collusion. Our experiments show that, comparing with existing reputation systems, our framework is highly dependable and effective in countering malicious nodes regarding strategic oscillating behavior, flooding malevolent feedbacks with fake transactions, and dishonest feedbacks.