The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, more and more people use the Internet to transact. In order to be successful transactions, it is need to establish a certain trust relationship between people In order to manage the trust relationship, trust model have been proposed. Based on the past trust model, a Dynamic Trust Model based on Perceived Risk is given in the paper. The perceived risk is divided into six dimensions under...
One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. In this paper, a set of parameters are identified for describing the trust of a peer. And a trust model based on fuzzy techniques is presented. The trust model uses Amplifier of Malicious Behavior (AMB) to intensify malicious behaviors and helps peers identify...
Risk is associated with almost every activity that is done in trust computing. Analyzing the Risk involved in a trust computing is important to decide whether to proceed with the transaction or not. In this paper, SMT, a trust computing mechanism is proposed for large-scale P2P systems based on risk evaluating properties. SMT incorporates two risk evaluating properties to reflect the dynamic trust...
We propose and clarify the manner in which a distributed information retrieval (IR) is conducted using a Peer-to-Peer (P2P) technology that has approximately the same accuracy as a current index-integrated search engine with the statistical information calculated from the contents We need to solve the following problems to develop distributed IR services for distributed objects in peers without indices...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
Reputation-based trust models using statistical learning have been intensively studied for distributed systems where peers behave maliciously. However practical applications of such models in environments with both malicious and rational behaviors are still very little understood. This paper studies the relation between accuracy of a computational trust model and its ability to effectively enforce...
A new generation of distributed systems and applications rely on the cooperation of diverse user populations motivated by self-interest. While they can utilize "reputation systems" to reduce selfish behaviors that disrupt or manipulate the network for personal gain, current reputations face a key challenge in large dynamic networks: vulnerability to peer collusion. In this paper, we propose...
In this paper, we present a group trust management system S3Trust for collaborative services in peer-to-peer grid systems. S3Trust is based on personalized trust rating and selective aggregation algorithms. Leveraging the robustness of a simplistic but elegant co-constraint aggregation algorithm (inspired by H-index) under incomplete and uncertain circumstances, S3Trust offers a robust and lightweight...
Peer-to-Peer (P2P) systems are distributed self-organized systems without a controlling entity where peers need to make trust decisions regarding who they will transact with. P2P reputation systems exploit past transactional information to provide members of P2P networks with measures which will help them make such trust decisions. However, these systems are vulnerable themselves to various types...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.