Analytical evaluation of P2P reputation systems
نویسندگان
چکیده
منابع مشابه
Analytical evaluation of P2P reputation systems
Despite widespread use of reputation mechanisms in P2P systems, little has been done in the area of analytical evaluation of these mechanisms. Current approaches for evaluation involve simulation and experimentation. These approaches provide evaluation of the mechanism in a few settings in which the experiment is designed; however, it is difficult to use these simulations for direct comparison ...
متن کاملReputation in P2P Anonymity Systems
Decentralized anonymity systems tend to be unreliable, because users must choose nodes in the network without knowing the entire state of the network. Reputation systems promise to improve reliability by predicting network state. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing rep...
متن کاملTaxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy of reputation system components, their properties, and discuss how user behavior and technical constraints can conflict. In our discussion, we describe research that exemplifies compromises made to deliver a useable, ...
متن کاملPrivate Reputation Schemes for P2P systems
The risks from participating in P2P transactions are relatively high. To mitigate such risk a reputation scheme could be applied. Reputation schemes have emerged as a promising means for enabling electronic transactions with strangers. In order to gain optimal results from the reputation scheme, the privacy of feedback provider should be correctly addressed. The feedback provider should be allo...
متن کاملTowards Semantic-Based P2P Reputation Systems
Peer-to-peer (P2P) systems represent nowadays a large portion of Internet traffic, and are fundamental data sources. In a pure P2P system, since no peer has the power or responsibility to monitor and restrain others behaviours, there is no method to verify the trustworthiness of shared resources, and malicious peers can spread untrustworthy data objects to the system. Furthermore, data descript...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Networks and Distributed Systems
سال: 2012
ISSN: 1754-3916,1754-3924
DOI: 10.1504/ijcnds.2012.047897