2009 33rd Annual IEEE International Computer Software and Applications Conference 2009
DOI: 10.1109/compsac.2009.40
|View full text |Cite
|
Sign up to set email alerts
|

Computing Reputation for Collaborative Private Networks

Abstract: The use of collaborative network services is increasing, therefore

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…However, the design of these audit-based tools is complicated by several issues, like the implications an audit system might have on users privacy and/or the limitations on what it is possible to audit in current OSNs. A preliminary work in this direction has been done in the context of trust values used for OSN access control purposes [52]. However, we would like to remark that the system proposed in this paper represents just the core set of functionalities needed to provide a sophisticated tool for OSN message filtering.…”
Section: Discussionmentioning
confidence: 99%
“…However, the design of these audit-based tools is complicated by several issues, like the implications an audit system might have on users privacy and/or the limitations on what it is possible to audit in current OSNs. A preliminary work in this direction has been done in the context of trust values used for OSN access control purposes [52]. However, we would like to remark that the system proposed in this paper represents just the core set of functionalities needed to provide a sophisticated tool for OSN message filtering.…”
Section: Discussionmentioning
confidence: 99%
“…The complexity of the scheme is quite high since it requires O(n 3 ) messages where n is the number of contributing nodes. Another relevant paper was presented recently by Nin et al [21]. [21] also uses Homomorphic encryption similar to two of our schemes, but their reputation model is quite different and is not a Trust-set based model like ours.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Up to now, we are aware of very few works addressing this issue (see, e.g., Nin et al [2009]). As we have seen in Section 6.3, trust is one of the key parameters on which access control decisions should be based in an open environment like the Web.…”
Section: Further Research Directions In Access Controlmentioning
confidence: 99%