ARM4SNS Web Ressources: Difference between revisions
No edit summary |
|||
(33 intermediate revisions by 4 users not shown) | |||
Line 3: | Line 3: | ||
==Reputation Management== |
==Reputation Management== |
||
* [http://icapeople.epfl.ch/sbuchegg/sonjaThesis.pdf Coping with Misbehavior in Mobile Ad-hoc Networks (PhD. thesis Sonja. Buchegger)] |
* [http://icapeople.epfl.ch/sbuchegg/sonjaThesis.pdf Coping with Misbehavior in Mobile Ad-hoc Networks (PhD. thesis Sonja. Buchegger)] |
||
* [http://citeseer.ist.psu.edu/707123.html Reputation-Based Trust Management (Vitaly Shmatikov, Carolyn Talcott)] |
|||
* [http://citeseer.ist.psu.edu/garcia-martinez02cryptographic.html A Cryptographic Reputation Scheme for Peer-to-Peer Networks (Antonio Garcia-Martinez, John Chuang)] |
|||
* [http://en.wikipedia.org/wiki/Halo_effect Halo Effect] |
|||
==Trust== |
|||
Here you can find some descriptions of trust. Depending of the trust model the authors explain some methods used for establishing trust in P2P applications. The document gives a survey of trust systems (policy based, reputation-based, social networks-based). |
|||
* [http://citeseer.ist.psu.edu/suryanarayana04survey.html A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications (Girish Suryanarayana, Richard N. Taylor)] <br><br> |
|||
The authors examine the issue of managing trust in P2P systems. They focus on reputation based schemes and give also a survey of related work. |
|||
* [http://citeseer.ist.psu.edu/ooi03managing.html Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques (Beng Chin Ooi, Chu Yee Liau, Kian-Lee Tau)]<br><br> |
|||
This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible. |
|||
* [http://citeseer.ist.psu.edu/shankar02trust.html On trust for ubiquitous computing (N. Shankar and W. A. Arbaugh, 2002)] <br><br> |
|||
There is a conflict between trust and privacy. Both depend on knowledge about an entity. They work with multiple virtual identities and link evidences to an identity. |
|||
* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-38.pdf Trading Privacy for Trust (Jean-Marc Seigneur, Christian Damsgaard Jensen)] <br><br> |
|||
Identity is a central element of computational trust. The lack of a central authority for all entities can be used for privacy protection. |
|||
* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-48.pdf The role of identity in pervasive computational trust (Jean-Marc Seigneur, Christian Damsgaard Jensen)] <br><br> |
|||
Details for the following documents will follow. |
|||
* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-37.pdf Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss (Jean-Marc Seigneur, Christian Damsgaard Jensen)] |
|||
==Identity== |
|||
* [http://cactus.eas.asu.edu/partha/Papers-PDF/2004/dewan-iee-online.pdf Trustworthy Identification in a Privacy Driven Virtual World (Prashant Dewan, Partha Dasgupta)] |
|||
* [http://www.wu.ece.ufl.edu/mypapers/IEEE_COM_MAG_location.pdf Quest for Personal Control over Mobile Location Privacy (Q. He, D. Wu, and P. Khosla, IEEE Communications Magazine, vol. 42, no. 5, pp. 130-136, May 2004)] |
|||
* [http://citeseer.csail.mit.edu/kobsa03privacy.html Privacy through Pseudonymity in User-Adaptive Systems (Alfred Kobsa, Joerg Schreck)] |
|||
* Social identity in the digital world: [http://chaosradio.ccc.de/archive/22C3_Proceedings.pdf Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p131)] |
|||
* [http://www.firstmonday.org/issues/issue8_8/jordan/ The Augmented Social Network: Building identity and trust into the next-generation Internet (Ken Jordan, Jan Hauser, and Steven Foster)] |
|||
==Existing SNS== |
|||
* [http://reddit.com Reddit] |
|||
* [http://www.cs.uu.nl/people/henkp/henkp/pgp/pathfinder/plot/ PGP/GPG web of trust] |
|||
==Similar Projects== |
|||
* [http://www.shotcode.com/home Shotcode] (from [http://www.op3.com/ OP3 AB Sweden]) |
|||
** Commercial Service for printed tags with associated urls |
|||
** Tags represent a unique id, some central server translates this into url (server run by OP3) |
|||
** Proprietary 2d barcode format (a circular sequence) |
|||
** Client software (proprietary of course) exists for a variety of mobile phones (51 models up to now) |
|||
** Demo video: http://www.shotcode.com/resources/uploads/Media/demomovie.mpg (17mb) |
|||
** Formally known as "Bango spots" (http://www.bango.net/spot ) |
|||
* http://www.semacode.org/ |
|||
** SDK for Creating Tags containing URLs (using Datamatrix code) |
|||
** Used e.g. in the U.S. for Nextbus links on bus stops (Nextbus provides vehicle arrival information and real-time maps, especially for but not limited to (?) bus schedules, http://www.nextbus.com ) |
|||
* http://www.semapedia.org/ |
|||
** Easily create tags from urls (based on Semacode) |
|||
* There's even a game based on Semacodes: http://www.conqwest2004.com/ |
|||
** Looks like a giant commercial for NOKIA 6225 phones, including a "buy here" link on their website |
|||
Most 2D barcode projects are designed/used to encode URLs. See RFC 4151 and http://www.taguri.org for a way to create URI schemes (e.g. to encode a public key fingerprint) on the fly. |
|||
==Bar Codes== |
|||
* [http://de.wikipedia.org/wiki/Barcode#2-D-Strichcode Übersicht über verschiedene 2D Barcodes (Wikipedia)] |
|||
=== AZTEC Code === |
|||
* Kurzbeschreibung: http://www.tkb-4u.com/code/barcode/aztec.php |
|||
* etwa 2k Daten; z.B. Online Tickets der Deutschen Bahn |
|||
=== QR Code === |
|||
* Kurzbeschreibung: http://en.wikipedia.org/wiki/QR_Code |
|||
* etwa 2k Daten |
|||
* sehr verbreitet in Japan und insb. 30 Mio. japanischen Mobiltelefonen |
|||
* leider zu patentbehaftet: "QR Code is open in the sense that the specification of QR Code is disclosed and that the patent right owned by Denso Wave is not exercised." |
|||
=== Data Matrix === |
|||
* Kurzbeschreibung: http://de.wikipedia.org/wiki/DataMatrix |
|||
* etwa 1.5k Daten; z.B. STAMPIT Briefmarken, Online Tickets der Deutschen Bahn, Semacode/Semapedia |
|||
* ISO/IEC16022 und "public domain" (i.e. bezahlen für ISO Standard, aber frei benutzen (?)) |
|||
* Technische Details: http://grandzebu.net/informatique/codbar-en/datamatrix.htm (Achtung Augenkrebs!) |
|||
* Leider bisher keine freie (as in freedom) Implementation entdeckt, nichtmal eine mit Quelltext. (?) |
|||
{| |
|||
|- |
|||
| [[Image:2dcodes_datamatrix.png|frame|Datamatrix Code]] |
|||
| [[Image:2dcodes_aztec.png|frame|AZTEC Code]] |
|||
| [[Image:2dcodes_qrcode.png|frame|QR Code]] |
|||
|} |
|||
==Random Stuff== |
|||
[http://www.woodmann.com/fravia/crctut1.htm CRC and how to Reverse it] |
Latest revision as of 22:53, 6 February 2006
Reputation Management
Trust
Here you can find some descriptions of trust. Depending of the trust model the authors explain some methods used for establishing trust in P2P applications. The document gives a survey of trust systems (policy based, reputation-based, social networks-based).
The authors examine the issue of managing trust in P2P systems. They focus on reputation based schemes and give also a survey of related work.
This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible.
There is a conflict between trust and privacy. Both depend on knowledge about an entity. They work with multiple virtual identities and link evidences to an identity.
Identity is a central element of computational trust. The lack of a central authority for all entities can be used for privacy protection.
Details for the following documents will follow.
Identity
- Social identity in the digital world: Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p131)
- The Augmented Social Network: Building identity and trust into the next-generation Internet (Ken Jordan, Jan Hauser, and Steven Foster)
Existing SNS
Similar Projects
- Shotcode (from OP3 AB Sweden)
- Commercial Service for printed tags with associated urls
- Tags represent a unique id, some central server translates this into url (server run by OP3)
- Proprietary 2d barcode format (a circular sequence)
- Client software (proprietary of course) exists for a variety of mobile phones (51 models up to now)
- Demo video: http://www.shotcode.com/resources/uploads/Media/demomovie.mpg (17mb)
- Formally known as "Bango spots" (http://www.bango.net/spot )
- http://www.semacode.org/
- SDK for Creating Tags containing URLs (using Datamatrix code)
- Used e.g. in the U.S. for Nextbus links on bus stops (Nextbus provides vehicle arrival information and real-time maps, especially for but not limited to (?) bus schedules, http://www.nextbus.com )
- http://www.semapedia.org/
- Easily create tags from urls (based on Semacode)
- There's even a game based on Semacodes: http://www.conqwest2004.com/
- Looks like a giant commercial for NOKIA 6225 phones, including a "buy here" link on their website
Most 2D barcode projects are designed/used to encode URLs. See RFC 4151 and http://www.taguri.org for a way to create URI schemes (e.g. to encode a public key fingerprint) on the fly.
Bar Codes
AZTEC Code
- Kurzbeschreibung: http://www.tkb-4u.com/code/barcode/aztec.php
- etwa 2k Daten; z.B. Online Tickets der Deutschen Bahn
QR Code
- Kurzbeschreibung: http://en.wikipedia.org/wiki/QR_Code
- etwa 2k Daten
- sehr verbreitet in Japan und insb. 30 Mio. japanischen Mobiltelefonen
- leider zu patentbehaftet: "QR Code is open in the sense that the specification of QR Code is disclosed and that the patent right owned by Denso Wave is not exercised."
Data Matrix
- Kurzbeschreibung: http://de.wikipedia.org/wiki/DataMatrix
- etwa 1.5k Daten; z.B. STAMPIT Briefmarken, Online Tickets der Deutschen Bahn, Semacode/Semapedia
- ISO/IEC16022 und "public domain" (i.e. bezahlen für ISO Standard, aber frei benutzen (?))
- Technische Details: http://grandzebu.net/informatique/codbar-en/datamatrix.htm (Achtung Augenkrebs!)
- Leider bisher keine freie (as in freedom) Implementation entdeckt, nichtmal eine mit Quelltext. (?)