Taxonomy of attacks and defense mechanisms in P2P reputation systems—Lessons for reputation system designers

E Koutrouli, A Tsalgatidou - Computer Science Review, 2012 - Elsevier
Robust and credible reputation systems are essential for the functionality of Peer-to-Peer
(P2P) applications. However, they themselves are susceptible to various types of attacks …

Trading privacy for trust

JM Seigneur, CD Jensen - International Conference on Trust Management, 2004 - Springer
Both privacy and trust relate to knowledge about an entity. However, there is an inherent
conflict between trust and privacy: the more knowledge a first entity knows about a second …

Video security for ambient intelligence

L Snidaro, C Micheloni… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
Moving toward the implementation of the intelligent building idea in the framework of
ambient intelligence, a video security application for people detection, tracking, and …

[PDF][PDF] Trust, security and privacy in global computing

JM Seigneur - 2005 - tara.tcd.ie
During the past thirty years, the world of computing has evolved from large centralised
computing centres to an increasingly distributed computing environment, where computation …

Certain trust: a trust model for users and agents

S Ries - Proceedings of the 2007 ACM symposium on Applied …, 2007 - dl.acm.org
One of the challenges for ubiquitous computing and P2P systems is to find reliable partners
for interactions. We believe that this problem can be solved by assigning trust values to …

Trustworthy pervasive computing: The hard security problems

K Ranganathan - … Workshops, 2004. Proceedings of the Second, 2004 - ieeexplore.ieee.org
We examine five security problems that are barriers to mainstream pervasive computing.
These are: device authentication, privacy, trust management, device assurance, recourse …

[图书][B] Modeling trust for users and agents in ubiquitous computing

S Ries, J Kangasharju, M Mühlhäuser - 2007 - Springer
Finding reliable partners for interactions is one of the challenges in ubiquitous computing
and P2P systems. We believe, that this problem can be solved by assigning trust values to …

Trust-based route selection in dynamic source routing

CD Jensen, PO Connell - International conference on trust management, 2006 - Springer
Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed
infrastructure. Nodes rely on each other to route packets to other mobile nodes or toward …

Engineering trust based collaborations in a global computing environment

C English, S Terzis, W Wagealla - … , iTrust 2004, Oxford, UK, March 29-April …, 2004 - Springer
Trust management seems a promising approach for dealing with security concerns in
collaborative applications in a global computing environment. However, the characteristics …

[PDF][PDF] A new algorithm of trust formation in wireless sensor networks

M Momani, JI Agbinya… - … Broadband and Ultra …, 2006 - opus.lib.uts.edu.au
This paper introduces a new algorithm for calculating trust in Wireless Sensor Networks
based on the quality of services characteristics expected to be fulfilled by nodes. Figure 3 …