IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2008
DOI: 10.1109/glocom.2008.ecp.382
|View full text |Cite
|
Sign up to set email alerts
|

TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The weights r j and a j represent the review and assessment points associated with an evaluation v j . This is a simpler formula than the one proposed in , which permits faster trust calculations and also allows the application of weights even in the case where only a single evaluation has been collected from the network. …”
Section: The Twohop Trust Metric Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The weights r j and a j represent the review and assessment points associated with an evaluation v j . This is a simpler formula than the one proposed in , which permits faster trust calculations and also allows the application of weights even in the case where only a single evaluation has been collected from the network. …”
Section: The Twohop Trust Metric Architecturementioning
confidence: 99%
“…In this paper, we expand our preliminary investigation of the TwoHop system , which utilizes recommendations of peer nodes in order to evaluate the trustworthiness of service providers. TwoHop assumes that there are direct relations between participants that have interacted in the past, and its goal is to establish indirect relations between unknown participants (i.e., participants without any previous immediate interaction).…”
Section: Introductionmentioning
confidence: 99%
“…We do not consider camouflaging targets (e.g. sellers), which are considered in Oram [96] or "karma suicide attacks" in Glynos et al [97]. E.g.…”
Section: Modeling Dynamic Attacksmentioning
confidence: 99%