DOI: 10.22215/etd/2009-08777
|View full text |Cite
|
Sign up to set email alerts
|

The exploration-resistant trust (ERT) model for open distributed systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(41 citation statements)
references
References 42 publications
0
41
0
Order By: Relevance
“…The reason is that the recommendation trust will definitely decline to a low value no more than Al if entity j deceives entity i. This is where the punishment mechanism works as can be seen from (4). Obviously,a>O.5 indicates a good recommendation.…”
Section: Bmentioning
confidence: 99%
See 2 more Smart Citations
“…The reason is that the recommendation trust will definitely decline to a low value no more than Al if entity j deceives entity i. This is where the punishment mechanism works as can be seen from (4). Obviously,a>O.5 indicates a good recommendation.…”
Section: Bmentioning
confidence: 99%
“…When entity suffers from bad 375 recommendation and a <0.5, recommendation trust descend sharply as the value of� shows. Next time, we will use (4) to calculate its recommendation trust which is harder to increase and thus need much more times of good recommendation. At last, we can see from (5) no matter how large the recommendation trust is, it can never exceeds direct trust.…”
Section: Bmentioning
confidence: 99%
See 1 more Smart Citation
“…Most recently, researchers have identified the existence of cheaters (exploitation) in artificial societies employing trust and reputation models [7], [8], and the existence of inaccurate witnesses [9], [10], and [11]. Kerr and Cohen [7] examined the security of several e-commerce marketplaces employing a trust and reputation system.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, Kerr and Cohen assume that buyers are honest in the witness information provided to one another and consequently do not consider collusion attacks. Salehi-Abari and White [8] introduced and formally modeled the con-man attack and demonstrated the vulnerability of several trust models against this attack. This work also did not consider any collusion attacks.…”
Section: Introductionmentioning
confidence: 99%