GroupLens: an open architecture for collaborative filtering of netnews
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Collaborative Reputation Mechanisms in Electronic Marketplaces
HICSS '99 Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 8 - Volume 8
PPay: micropayments for peer-to-peer systems
Proceedings of the 10th ACM conference on Computer and communications security
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Fighting peer-to-peer SPAM and decoys with object reputation
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Globally decoupled reputations for large distributed networks
Advances in Multimedia
On spreading recommendations via social gossip
Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures
Micro-Blog: sharing and querying content through mobile phones and social participation
Proceedings of the 6th international conference on Mobile systems, applications, and services
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
Improving peer-to-peer performance through server-side scheduling
ACM Transactions on Computer Systems (TOCS)
Spam characterization and detection in peer-to-peer file-sharing systems
Proceedings of the 17th ACM conference on Information and knowledge management
Cost-effective spam detection in p2p file-sharing systems
Proceedings of the 2008 ACM workshop on Large-Scale distributed systems for information retrieval
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
IEEE/ACM Transactions on Networking (TON)
A holistic mechanism against file pollution in peer-to-peer networks
Proceedings of the 2009 ACM symposium on Applied Computing
Wifi-reports: improving wireless network selection with collaboration
Proceedings of the 7th international conference on Mobile systems, applications, and services
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Towards a robust pollution control mechanism for P2P file sharing systems
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building a trusted community for mobile ad hoc networks using friend recommendation
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Enabling routing control in a DHT
IEEE Journal on Selected Areas in Communications
Communications of the ACM
Towards securing data delivery in peer-to-peer streaming
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Augmenting trust establishment in dynamic systems with social networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
A case for information-bound referencing
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
The design of a reliable reputation system
Electronic Commerce Research
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Reputation-based networked control with data-corrupting channels
Proceedings of the 14th international conference on Hybrid systems: computation and control
Ensuring content integrity for untrusted peer-to-peer content distribution networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
A design for securing data delivery in mesh-based peer-to-peer streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Future Generation Computer Systems
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems
Proceedings of the sixth ACM workshop on Scalable trusted computing
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Journal of Network and Computer Applications
Poster: on trust evaluation with missing information in reputation systems
Proceedings of the 18th ACM conference on Computer and communications security
Bounding trust in reputation systems with incomplete information
Proceedings of the second ACM conference on Data and Application Security and Privacy
Research on the immune strategy for the polluted file propagation in structured P2P networks
Computers and Electrical Engineering
An incentive mechanism to reinforce truthful reports in reputation systems
Journal of Network and Computer Applications
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Analytical evaluation of P2P reputation systems
International Journal of Communication Networks and Distributed Systems
Targeted and scalable information dissemination in a distributed reputation mechanism
Proceedings of the seventh ACM workshop on Scalable trusted computing
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
A Social-Feedback Enriched Interface for Software Download
Journal of Organizational and End User Computing
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks
The Journal of Supercomputing
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Preventing spam in opportunistic networks
Computer Communications
Hi-index | 0.02 |
In this paper, we describe Credence, a decentralized object reputation and ranking system for large-scale peer-to-peer filesharing networks. Credence counteracts pollution in these networks by allowing honest peers to assess the authenticity of online content through secure tabulation and management of endorsements from other peers. Our system enables peers to learn relationships even in the absence of direct observations or interactions through a novel, flow-based trust computation to discover trustworthy peers. We have deployed Credence as an overlay on top of the Gnutella filesharing network, with more than 10,000 downloads of our client software to date. We describe the system design, our experience with its deployment, and results from a long-term study of the trust network built by users. Data from the live deployment shows that Credence's flow-based trust computation enables users to avoid undesirable content. Honest Credence clients can identify three quarters of the decoys encountered when querying the Gnutella network.