Abstract | ||
---|---|---|
There have been a number of proposals for trust and reputation-based systems. Some have been implemented, some have been analysed only by simulation. In this paper we first present a general architecture for a trust-based system, placing special emphasis on the management of context information. We investigate the effectiveness of our architecture by simulating distributed attacks on a network that uses trust/ reputation as a basis for access control decisions. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11429760_26 | iTrust |
Keywords | Field | DocType |
special emphasis,reputation-based system,combining trust,context information,general architecture,trust-based system,access control decision,access control | Information system,Information management,Reputation system,Risk analysis (business),Computer science,Computer security,Threat assessment,Access control,Computational trust,Reputation | Conference |
Volume | ISSN | ISBN |
3477 | 0302-9743 | 3-540-26042-0 |
Citations | PageRank | References |
4 | 0.43 | 18 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Cvrček | 1 | 10 | 1.92 |
Ken Moody | 2 | 58 | 4.04 |