Reputation-based trust management
نویسندگان
چکیده
We propose a formal model for reputation-based trust management. In contrast to credential-based trust management, in our framework an agent’s reputation serves as the basis for trust. For example, an access control policy may consider the agent’s reputation when deciding whether to offer him a license for accessing a protected resource. The underlying semantic model is an event semantics inspired by the actor model, and assumes that each agent has only partial knowledge of the events that have occurred. Restrictions on agents’ behavior are formalized as licenses, with “good” and “bad” behavior interpreted as, respectively, license fulfillment and violation. An agent’s reputation comprises four kinds of evidence: completely fulfilled licenses, ongoing licenses without violations or misuses, licenses with violated obligations, and misused licenses. This approach enables precise formal modeling of scenarios involving reputations, such as financial transactions based on credit histories and information sharing between untrusted agents.
منابع مشابه
Trust, Reputation and Quality of E-Banking Services (Case Study: Melli Bank Customers)
In today’s very competitive world gaining competitive advantage is bound to arranging products and services of companies and businesses in accordance with customers’ needs. For this purpose, gaining reputation in E-service can be quite helpful. Thus the goal of the present research is studying the effect of E-Banking Service Quality on Bank Reputation. So a coherent collection of structures wer...
متن کاملReputation - Based Trust Management ( extended abstract )
We propose a formal model for reputation-based trust management. In contrast to conventional, credential-based trust management, in reputation-based trust management an agent’s past behavior is used to decide whether to grant him access to a protected resource. We use an event semantics inspired by the actor model, and assume that each principal has only partial knowledge of the events that hav...
متن کاملReputation-based Trust Management in Peer-to-Peer File Sharing Systems
Trust is required in file sharing peer-to-peer (P2P) systems to achieve better cooperation among peers and reduce malicious uploads. In reputation-based P2P systems, reputation is used to build trust among peers based on their past transactions and feedbacks from other peers. In these systems, reputable peers will usually be selected to upload requested files, decreasing significantly malicious...
متن کاملReputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy
Trust is required in file sharing peer-to-peer (P2P) systems to achieve better cooperation among peers and reduce malicious uploads. In reputation-based P2P systems, reputation is used to build trust among peers based on their past transactions and feedbacks from other peers. In these systems, reputable peers will usually be selected to upload requested files, decreasing significantly malicious...
متن کاملReputation-based trust management systems and their applicability to grids
This paper reviews the main reputation-based trust systems. We directed our analysis trying to identify how these systems fulfill the requirements of grid computing, anticipating a further inclusion of reputation-based technologies for bringing trust in grid systems. We analyzed a wide area of developments, from reputation systems used in ecommerce to systems coming from agent research, P2P and...
متن کاملA Classification Scheme for Trust Functions in Reputation-Based Trust Management
Reputation is an important means to establish trust in decentralized environments such as the Semantic Web. In reputation-based trust management, an entity’s reputation is usually built on feedback from those who have direct interactions with the entity. A trust function is used to infer one’s trustworthiness based on such feedback. Many trust functions have been proposed in the literature. The...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Computer Security
دوره 13 شماره
صفحات -
تاریخ انتشار 2005