Sciweavers

386 search results - page 33 / 78
» A logic of trust and reputation
Sort
View
76
Voted
CSE
2009
IEEE
15 years 4 months ago
Trust Is in the Eye of the Beholder
We carefully investigate humanity’s intuitive understanding of trust and extract from it fundamental properties that succinctly synthesize how trust works. From this detailed ch...
Dimitri do B. DeFigueiredo, Earl T. Barr, Shyhtsun...
ATAL
2007
Springer
15 years 3 months ago
The Examination of an Information-Based Approach to Trust
This article presents the results of experiments performed with agents based on an operalization of an information-theoretic model for trust. Experiments have been performed with t...
Maaike Harbers, Rineke Verbrugge, Carles Sierra, J...
ICDCSW
2007
IEEE
15 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
SEMWEB
2004
Springer
15 years 3 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
68
Voted
SAC
2006
ACM
15 years 3 months ago
BambooTrust: practical scalable trust management for global public computing
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effect...
Evangelos Kotsovinos, Aled Williams