Proceedings of the 28th International Conference on Software Engineering 2006
DOI: 10.1145/1134285.1134295
|View full text |Cite
|
Sign up to set email alerts
|

Architectural support for trust models in decentralized applications

Abstract: Decentralized applications are composed of distributed entities that directly interact with each other and make local autonomous decisions in the absence of a centralized coordinating authority. Such decentralized applications, where entities can join and leave the system at any time, are particularly susceptible to the attacks of malicious entities. Each entity therefore requires protective measures to safeguard itself against these entities. Trust management solutions serve to provide effective protective me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 30 publications
(24 reference statements)
0
16
0
Order By: Relevance
“…For instance, collaborative filtering makes recommendations of the form, "People like you found the following components to be helpful" [18][22], which requires that some programmers try a certain piece of code before it can be recommended to other programmers. There is one approach that might apply to end-user scripting: predicting that code will have high reusability if the author previously created code that was reused, indicating that the author has high expertise [33]. Such a model's information requirements are not very restrictive, since a component's reusability can be predicted even if it has never been reused, as long as someone previously tried to reuse one of the programmer's other components.…”
Section: Approaches For Finding Reusable Code Written By Professionalmentioning
confidence: 99%
“…For instance, collaborative filtering makes recommendations of the form, "People like you found the following components to be helpful" [18][22], which requires that some programmers try a certain piece of code before it can be recommended to other programmers. There is one approach that might apply to end-user scripting: predicting that code will have high reusability if the author previously created code that was reused, indicating that the author has high expertise [33]. Such a model's information requirements are not very restrictive, since a component's reusability can be predicted even if it has never been reused, as long as someone previously tried to reuse one of the programmer's other components.…”
Section: Approaches For Finding Reusable Code Written By Professionalmentioning
confidence: 99%
“…There is one approach that might apply to end-user scripting: predicting that code will have high reusability if the author previously created code that was reused, indicating that the author has high expertise [18]. This approach's information requirements are not very restrictive, as a component's reusability can be predicted even if it has never been reused, as long as someone previously tried to reuse one of the programmer's other components.…”
Section: Related Workmentioning
confidence: 99%
“…Some systems address this limitation by tracking the reputation of component creators, rather than just components themselves [20]. We consider several characteristics that might relate to script authors' expertise.…”
Section: Expertise Of Authormentioning
confidence: 99%
“…Selecting a longer interval reduces the number of scripts whose observation interval fell within the 6 months of available logs. Selecting half of the log period as the observation interval resulted in few cases (20) of erroneously ruling a script as not-reused, yet it provided over 900 scripts for study.…”
Section: Measures Of Reusementioning
confidence: 99%