Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Comparing Hybrid Peer-to-Peer Systems
Proceedings of the 27th International Conference on Very Large Data Bases
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Trusting Information Sources One Citizen at a Time
ISWC '02 Proceedings of the First International Semantic Web Conference on The Semantic Web
A Social Mechanism of Reputation Management in Electronic Communities
CIA '00 Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
The impact of DHT routing geometry on resilience and proximity
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Identity Crisis: Anonymity vs. Reputation in P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Preserving peer replicas by rate-limited sampled voting
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
PPay: micropayments for peer-to-peer systems
Proceedings of the 10th ACM conference on Computer and communications security
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Enhancing reputation mechanisms via online social networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Free-riding and whitewashing in peer-to-peer systems
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Proceedings of the 11th ACM conference on Computer and communications security
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Trust management with delegation in grouped peer-to-peer communities
Proceedings of the eleventh ACM symposium on Access control models and technologies
A reputation mechanism for layered communities
ACM SIGecom Exchanges
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
New metrics for reputation management in P2P networks
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
Computing trusted authority scores in peer-to-peer web search networks
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
FairPeers: Efficient Profit Sharing in Fair Peer-to-Peer Market Places
Journal of Network and Systems Management
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Making p2p accountable without losing privacy
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search
Proceedings of the 2008 ACM symposium on Applied computing
Socialtrust: tamper-resilient trust establishment in online communities
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Q-rater: A collaborative reputation system based on source credibility theory
Expert Systems with Applications: An International Journal
CellTrust: a reputation model for C2C commerce
Electronic Commerce Research
Reputation management algorithms for DHT-based peer-to-peer environment
Computer Communications
Towards a Cluster Based Incentive Mechanism for P2P Networks
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
The SocialTrust framework for trusted social information management: Architecture and algorithms
Information Sciences: an International Journal
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Reputation estimation and query in peer-to-peer networks
IEEE Communications Magazine
Foundations and Trends in Information Retrieval
Hi-index | 0.00 |
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy of reputation system components, their properties, and discuss how user behavior and technical constraints can conflict. In our discussion, we describe research that exemplifies compromises made to deliver a useable, implementable system.