Applying secret sharing schemes to service reputation | IEEE Conference Publication | IEEE Xplore