Sciweavers

572 search results - page 3 / 115
» Reputation Management Survey
Sort
View
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 9 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
WETICE
2005
IEEE
14 years 1 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
TKDE
2010
272views more  TKDE 2010»
13 years 5 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
ICIS
2000
13 years 8 months ago
Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems
Reputation reporting systems have emerged as an important risk management mechanism in online trading communities. However, the predictive value of these systems can be compromise...
Chrysanthos Dellarocas
ICDCSW
2007
IEEE
14 years 1 months ago
Taxonomy of Email Reputation Systems
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...
Dmitri Alperovitch, Paul Judge, Sven Krasser