Skip to main content

A Novel Protocol for Communicating Reputation in P2P Networks

  • Conference paper
Book cover Trust Management (iTrust 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3986))

Included in the following conference series:

  • 1607 Accesses

Abstract

Many reputation systems mainly concentrate on avoiding untrustworthy agents by communicating reputation. Here arises the problem that when an agent does not know another agent very much then there is no way to notice such ambiguity. This paper shows a new protocol in which an agent can notice that ambiguity using the notion of statistics, and illustrates the facility of designing agents’ algorithms as well as existing reputation systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Awerbuch, B., Azar, Y., Lotker, Z., Patt-Shamir, B., Tuttle, M.R.: Collaborate With Strangers To Find Own Preferences. In: Proc. 17th Annual Symposium on Parallelism on Algorithms and Architectures (SPAA 2004) (2004)

    Google Scholar 

  2. Awerbuch, B., Kleinberg, R.D.: Competitive Collaborative Learning. In: Auer, P., Meir, R. (eds.) COLT 2005. LNCS (LNAI), vol. 3559, pp. 233–248. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Awerbuch, B., Patt-Shamir, B., Peleg, D., Tuttle, M.: Improved Recommendation Systems. In: Proc. ACM-SIAM Symposium on Discrete Algorithms (SODA) (2005)

    Google Scholar 

  4. Awerbuch, B., Patt-Shamir, B., Peleg, D., Tuttle, M.: Collaboration of Untrusting Peers with Changing Interests. In: Proc. 5th ACM Conference on Electric Commerce (EC) (2004)

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  6. Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for public-key infrastructure. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 59–63. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  7. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Drineas, P., Kerenidis, I., Raghavan, P.: Competitive Recommendation Systems. In: Proc. Annual ACM Symposium on Theory of Computing (2002)

    Google Scholar 

  9. Kumar, R., Raghavan, P., Rajagopalan, S., Tomkins, A.: Recommendation Systems: A Probabilistic Analysis. In: Proc. 39th Annual Symposium on Foundations of Computer Science (FOCS), pp. 664–681 (1998)

    Google Scholar 

  10. Kleinburg, J., Sandler, M.: Using Mixture Models for Collaborative Filtering. In: Proc. Thirty-sixth Annual ACM Symposium on Theory of Computing (STOC) (2004)

    Google Scholar 

  11. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. Twelfth International World Wide Web Conference (WWW 2003), pp. 640–651 (2003)

    Google Scholar 

  12. Liu, J., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proc. 35th Annual Hawaii International Conference on System Science (HICSS 2002) (2002)

    Google Scholar 

  14. Moreton, T., Twigg, A.: Enforcing Collaboration in Peer-to-Peer Routing Services. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 255–270. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)

    Google Scholar 

  16. Patel, J., Teacy, W.T.L., Jennings, N.R., Luck, M.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 193–209. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Whitby, A., Jøsang, A., Indulska, J.: Filtering Out Unfair Ratings in Bayesian Reputation Systems. In: Proc. Workshop on Trust in Agent Societies (AAMAS 2004) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yonezawa, K. (2006). A Novel Protocol for Communicating Reputation in P2P Networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_30

Download citation

  • DOI: https://doi.org/10.1007/11755593_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34295-3

  • Online ISBN: 978-3-540-34297-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics