2013 IEEE International Conference on Services Computing 2013
DOI: 10.1109/scc.2013.31
|View full text |Cite
|
Sign up to set email alerts
|

ServiceTrust: Trust Management in Service Provision Networks

Abstract: Abstract-Service provision networks are popular platforms for decentralized service management. eBay and Amazon are two representative examples of enabling and hosting service provision networks for their customers. Trust management is a critical component for scaling service provision networks to larger set of participants. This paper presents ServiceTrust, a quality sensitive and attack resilient trust management facility for service provision networks. ServiceTrust has three unique features. First, it encap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
54
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 32 publications
(54 citation statements)
references
References 10 publications
0
54
0
Order By: Relevance
“…Unfortunately, as we show in this paper that the trust model in [Su, et al 2013] is severely handicapped and is vulnerable to malicious spies with camouflage or colluding collectives. This observation motivates us to develop ServiceTrust ++ to against the six threat models by incorporating the above-mentioned three unique features.…”
Section: Introductionmentioning
confidence: 93%
See 4 more Smart Citations
“…Unfortunately, as we show in this paper that the trust model in [Su, et al 2013] is severely handicapped and is vulnerable to malicious spies with camouflage or colluding collectives. This observation motivates us to develop ServiceTrust ++ to against the six threat models by incorporating the above-mentioned three unique features.…”
Section: Introductionmentioning
confidence: 93%
“…Moreover, by using trust propagation with uniform distribution in global trust computation, the benefit of feedback similarity weighted local trust is further decreased because malicious peers acting as spies or camouflage can continue to gain higher global trust by collecting local trust values from good peers. For example, our experiments in Section 4.5 show that trust propagation with uniform distribution are vulnerable under Threat model E and Threat model F even for the trust model in [Su, et al 2013] where feedback similarity is utilized in local trust computation.…”
Section: Global Trust Computation By Controlled Propagationmentioning
confidence: 99%
See 3 more Smart Citations