Proceedings ArticleDOI
XenoTrust: event-based distributed trust management
Boris Dragovic,Evangelos Kotsovinos,Steven Hand,Peter Pietzuch +3 more
- pp 410-414
Reads0
Chats0
TLDR
XenoTrust is described, the trust management architecture used in the XenoServer Open Platform, and it is suggested that using an event-based publish /subscribe methodology for the storage, retrieval and aggregation of reputation information can help exploiting asynchrony and simplicity, as well as improving scalability.Abstract:
This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks that span the full spectrum of distributed paradigms. We suggest that using an event-based publish /subscribe methodology for the storage, retrieval and aggregation of reputation information can help exploiting asynchrony and simplicity, as well as improving scalability.read more
Citations
More filters
A Survey of Solutions to the Sybil Attack
TL;DR: The impact of the Sybil attack, an attack against identity in which an individual entity masquerades as multiple simultaneous identities, is surveyed.
Hermes: A scalable event-based middleware
TL;DR: This thesis describes the design and implementation of Hermes, a distributed, eventbased middleware platform and introduces a novel congestion control service that avoids congestion in the overlay broker network during normal operation and recovery after failure, and therefore enables a resource-efficient deployment of the middleware.
Journal ArticleDOI
Trust on the world wide web: a survey
TL;DR: A comprehensive survey of trust on the Web in all its contexts, where the role of trust in web-based social networks and algorithms for inferring trust relationships are examined.
Journal ArticleDOI
Survey of trust models in different network domains
Mohammad Momani,Subhash Challa +1 more
TL;DR: The security and trust concepts in wireless sensor networks are introduced and the difference between them are explained, stating that even though both terms are used interchangeably when defining a secure system, they are not the same.
A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications
TL;DR: A survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications identifies and defines key properties for each and summarizes the efforts of the P2P community in addressing these properties by categorizing and discussing relevant technologies and approaches.
References
More filters
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Journal ArticleDOI
The many faces of publish/subscribe
TL;DR: This paper factors out the common denominator underlying these variants: full decoupling of the communicating entities in time, space, and synchronization to better identify commonalities and divergences with traditional interaction paradigms.
Proceedings ArticleDOI
Decentralized trust management
TL;DR: This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
Dissertation
Formalising Trust as a Computational Concept
TL;DR: The thesis presents a testbed populated by simple trusting agents which substantiates the utility of the formalism and provides a step in the direction of a proper understanding and definition of human trust.
Proceedings ArticleDOI
Supporting trust in virtual communities
A Abdul-Rahman,Stephen Hailes +1 more
TL;DR: In this article, a trust model that is grounded in real-world social trust characteristics, and based on a reputation mechanism, or word-of-mouth, is proposed for the virtual medium.