Proceedings of the 1997 Workshop on New Security Paradigms - NSPW '97 1997
DOI: 10.1145/283699.283739
|View full text |Cite
|
Sign up to set email alerts
|

A distributed trust model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
290
0
5

Year Published

2003
2003
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 495 publications
(296 citation statements)
references
References 6 publications
1
290
0
5
Order By: Relevance
“…The framework presented in this paper supports a wide variety of combination functions, such as linear pool [17][18], noisy OR [28], and logistic regression [4]. We view the coefficients in these functions (one per source) as measuring the user's trust in each source, 1 and answer the question: how can a user decide how much to trust a source she does not know directly? Our answer is based on recursively propagating trust: if A has trust u in B and B has trust v in C, then A should have some trust t in C that is a function of u and v. We place restrictions on allowable methods for combining trusts that enable the efficient and local computation of derived trusts.…”
Section: Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…The framework presented in this paper supports a wide variety of combination functions, such as linear pool [17][18], noisy OR [28], and logistic regression [4]. We view the coefficients in these functions (one per source) as measuring the user's trust in each source, 1 and answer the question: how can a user decide how much to trust a source she does not know directly? Our answer is based on recursively propagating trust: if A has trust u in B and B has trust v in C, then A should have some trust t in C that is a function of u and v. We place restrictions on allowable methods for combining trusts that enable the efficient and local computation of derived trusts.…”
Section: Modelmentioning
confidence: 99%
“…Any user may assert her personal belief in the statement, which is taken from [0,1]. A high value means that the statement is accurate, credible, and/or relevant.…”
Section: Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, using trust levels, it avoids the non-trusted nodes in the routes that may use brute force attacks and may decrypt messages if enough parts of the message are available to them. This technique uses a variation of the trust models used in [17] and [18]. A node is assigned a discrete trust level in the range of to 4.…”
Section: Message Security Using Trust-based Multipath Routing : Tmrmentioning
confidence: 99%
“…However, in large-scale environments, the amount of available direct experience is often insufficient or even non-existent. In such circumstances, prediction is often based on trustor's "indirect experience" -opinions obtained from other agents that determine the target agent's reputation [17,45,1]. Simple aggregations, like a seller's ranking on eBay, rely on access to global information, like the history of the agent's behavior.…”
Section: Introductionmentioning
confidence: 99%