TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks

@inproceedings{Srivatsa2005TrustGuardCV,
  title={TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks},
  author={Mudhakar Srivatsa and Li Xiong and Ling Liu},
  booktitle={WWW},
  year={2005}
}
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. One of the fundamental challenges in distributed reputation management is to understand vulnerabilities and develop mechanisms that can minimize the potential damages to a system by malicious nodes. In this paper, we identify three vulnerabilities that are… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 254 CITATIONS

The design of a reliable reputation system

  • Electronic Commerce Research
  • 2010
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Machine Learning Based Reputation System for Defending Against Malicious Node Behavior

  • IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
  • 2008
VIEW 19 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce

VIEW 11 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

EMLTrust: An enhanced Machine Learning based Reputation System for MANETs

VIEW 18 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Secure Reputation Framework for BitTorrent

  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2012
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

An Efficient Feedback-based Trust Model for Pervasive Computing

VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

MailTrust: A Mail Reputation Mechanism Based on Improved TrustGuard

  • 2010 International Conference on Communications and Mobile Computing
  • 2010
VIEW 7 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2005
2019

CITATION STATISTICS

  • 40 Highly Influenced Citations

  • Averaged 6 Citations per year from 2017 through 2019