Proceedings of the 2007 ACM Workshop on Digital Identity Management 2007
DOI: 10.1145/1314403.1314416
|View full text |Cite
|
Sign up to set email alerts
|

Using reputation to augment explicit authorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Windley et al in [29] and [30] introduce Pythia, a reputation-based authorization system. Reputation information is sourced from applications and stored in a central repository.…”
Section: Slashdotmentioning
confidence: 99%
“…Windley et al in [29] and [30] introduce Pythia, a reputation-based authorization system. Reputation information is sourced from applications and stored in a central repository.…”
Section: Slashdotmentioning
confidence: 99%
“…Pythia, a reputation-based authorization system is introduced in [20], [21]. A central repository stores reputation information obtained from multiple applications.…”
Section: Related Workmentioning
confidence: 99%
“…The elements selection and its assignment of weights were based on CIBO moderators' experience. Our members upgrading or downgrading is done using a social reputation [21]; users obtain higher reputation in the community by having accurate contributions and receiving credits from other users. Users can be upgraded to collaborators.…”
Section: Reputation Based Social Collaborationmentioning
confidence: 99%