A survey of attack and defense techniques for reputation systems

K Hoffman, D Zage, C Nita-Rotaru - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a
given domain for each identity within the system. These systems seek to generate an …

Trust management in distributed systems

H Li, M Singhal - Computer, 2007 - ieeexplore.ieee.org
Distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks
involve numerous entities, many of which haven't previously interacted. Trust management …

A novel trust management framework for multi-cloud environments based on trust service providers

W Fan, H Perros - Knowledge-Based Systems, 2014 - Elsevier
In this paper, we address the problem of trust management in multi-cloud environments
based on a set of distributed Trust Service Providers (TSPs). These are independent third …

Dynamic ranking of cloud services for web-based cloud communities: efficient algorithm for rating-based discovery and multi-level ranking of cloud services

AQ Md, V Vijayakumar - International Journal of Web …, 2019 - inderscienceonline.com
Trust assessment in cloud depends on QoS attributes. While evaluating the trustworthiness
of the CSPs, traditional methods of trust assessment do not take into account QoS attributes …

Two-dimensional trust rating aggregations in service-oriented applications

Y Wang, L Li - IEEE Transactions on Services Computing, 2010 - ieeexplore.ieee.org
In most existing trust evaluation studies, a single value is computed based on the ratings
given to a service provider to indicate the current trust level. This is useful but may not …

A case study in simulating PCS networks using Time Warp

CD Carothers, RM Fujimoto, YB Lin - ACM SIGSIM Simulation Digest, 1995 - dl.acm.org
There has been rapid growth in the demand for mobile communications over the past few
years. This has led to intensive research and development efforts for complex PCS …

On desideratum for B2C e-commerce reputation systems

A Gutowska, A Sloane, KA Buckley - Journal of computer science and …, 2009 - Springer
This paper reviews existing approaches to reputation systems, their constraints as well as
available solutions. Furthermore, it presents and evaluates a novel and comprehensive …

Trust-abac towards an access control system for the internet of things

H Ouechtati, NB Azzouna - Green, Pervasive, and Cloud Computing: 12th …, 2017 - Springer
In order to cope with certain challenges posed by device capacity and the nature of IoT
networks, a lightweight access control model is needed to resolve security and privacy …

Role-based recommendation and trust evaluation

Y Wang, V Varadharajan - … , E-Commerce and E-Services (CEC …, 2007 - ieeexplore.ieee.org
In general, in most trust evaluation systems, the evaluation of a target party under
investigation relies on the trust ratings from responding peers/parties who have direct …

[图书][B] Near field communications handbook

SA Ahson, M Ilyas - 2011 - books.google.com
From basic concepts to research grade material and future directions, the Near Field
Communications Handbook provides comprehensive technical coverage of this rapidly …