Skip to main content

Cooperation-Based Trust Model and Its Application in Network Security Management

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7016))

  • 1180 Accesses

Abstract

This paper presents a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. In this model, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user’s reputation is lower than some threshold.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  2. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision SupportSystem 43(2), 618–644 (2007)

    Article  Google Scholar 

  3. Marti, S., Garcia-Molina, H.: Taxonomy of trust: categorizing p2p reputation systems. Computer Networks 50(4), 472–484 (2006)

    Article  MATH  Google Scholar 

  4. eBay. The world’s online marketplace, http://www.ebay.com/

  5. Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce, pp. 324-337 (2002)

    Google Scholar 

  6. Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)

    Article  Google Scholar 

  7. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, New York (2003)

    Google Scholar 

  8. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web, Technical Report, Database Group (1998)

    Google Scholar 

  9. Repast Homepage, http://repast.sourceforge.net/

  10. Rasmusson, L., Jansson, S.: Simulated social control for secure internet commerce. In: New Security Paradigms Workshop, pp. 18–26. ACM, New York (1996)

    Google Scholar 

  11. Adar, E., Huberman, B.A.: Free riding on gnutella, Technical Report (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, W., Duan, Hx., Ren, P. (2011). Cooperation-Based Trust Model and Its Application in Network Security Management. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2011. Lecture Notes in Computer Science, vol 7016. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24650-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24650-0_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24649-4

  • Online ISBN: 978-3-642-24650-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics