Abstract
This paper presents a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. In this model, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user’s reputation is lower than some threshold.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision SupportSystem 43(2), 618–644 (2007)
Marti, S., Garcia-Molina, H.: Taxonomy of trust: categorizing p2p reputation systems. Computer Networks 50(4), 472–484 (2006)
eBay. The world’s online marketplace, http://www.ebay.com/
Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce, pp. 324-337 (2002)
Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, New York (2003)
Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web, Technical Report, Database Group (1998)
Repast Homepage, http://repast.sourceforge.net/
Rasmusson, L., Jansson, S.: Simulated social control for secure internet commerce. In: New Security Paradigms Workshop, pp. 18–26. ACM, New York (1996)
Adar, E., Huberman, B.A.: Free riding on gnutella, Technical Report (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, W., Duan, Hx., Ren, P. (2011). Cooperation-Based Trust Model and Its Application in Network Security Management. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2011. Lecture Notes in Computer Science, vol 7016. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24650-0_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-24650-0_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24649-4
Online ISBN: 978-3-642-24650-0
eBook Packages: Computer ScienceComputer Science (R0)