2014
DOI: 10.1007/978-3-662-43813-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Reusability for Trust and Reputation Systems

Abstract: Abstract. Reputation systems have been extensively explored in various disciplines and application areas. A problem in this context is that the computation engines applied by most reputation systems available are designed from scratch and rarely consider well established concepts and achievements made by others. Thus, approved models and promising approaches may get lost in the shuffle. In this work, we aim to foster reuse in respect of trust and reputation systems by providing a hierarchical component taxonom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…In order to foster reusability of the particular components of reputation systems, Sänger and Pernul [3] propose a hierarchical component taxonomy of computation engines. The taxonomy forms the basis for setting up a repository containing design knowledge both on a conceptual and an implementation level 1 .…”
Section: Reusability For Trust and Reputation Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…In order to foster reusability of the particular components of reputation systems, Sänger and Pernul [3] propose a hierarchical component taxonomy of computation engines. The taxonomy forms the basis for setting up a repository containing design knowledge both on a conceptual and an implementation level 1 .…”
Section: Reusability For Trust and Reputation Systemsmentioning
confidence: 99%
“…Compared to [3], we want to go one step further. The selection and interpretation of adequate components for new reputation systems in a specific application area requires time, effort, and to some extent knowledge of the area.…”
Section: Research Gapmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, we identify defense mechanisms for different types of attacks by assigning reusable TRS components that can be employed to extend the functionality of the computation engine. These components are provided in the form of both a conceptual description and fully implemented reusable web-services in the component repository 1 introduced by Sänger and Pernul [10]. The additional attack view on TRS components constitutes an important extension to the yet largely functional view.…”
Section: Introductionmentioning
confidence: 99%