Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Reputation and Trust Management Broker Framework for Web Applications
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
A survey of trust and reputation systems for online service provision
Decision Support Systems
Trust management tools for internet applications
iTrust'03 Proceedings of the 1st international conference on Trust management
iTrust'05 Proceedings of the Third international conference on Trust Management
A probabilistic trust model for handling inaccurate reputation sources
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
Research on the Trust-Adaptive Scheduling for Data-Intensive Applications on Data Grids
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Hi-index | 0.00 |
Centrally managed, traditional security systems put limits on collaborative activities among huge number of entities in current open networks (such as Grids). This requires new approaches to handling security in large distributed systems and the need for new research especially in areas concerned with the provision of security through collaboration. This paper presents the design of a large-scale, self-managing Trust Management Framework (TMF) that makes efficient use of apparently invisible evidences that are scattered across potentially global networks. The TMF's design dictates a layered architecture for capturing evidence at the data layer of a network, transforming it into formed reputations in the information layer and utilizing these reputations to determine trustworthiness of an entity in the knowledge layer of the network. In essence, the main focus of the proposed work is to automate the acquisition of scattered evidence and the formulation, evolution and dissemination of reputations in a scalable way in order to make improved security decisions.