ARM4SNS Web Ressources: Difference between revisions
m (→Identity) |
|||
Line 36: | Line 36: | ||
* Social identity in the digital world: [http://chaosradio.ccc.de/archive/22C3_Proceedings.pdf Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p131)] |
* Social identity in the digital world: [http://chaosradio.ccc.de/archive/22C3_Proceedings.pdf Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p131)] |
||
* [http://www.firstmonday.org/issues/issue8_8/jordan/ The Augmented Social Network: Building identity and trust into the next-generation Internet (Ken Jordan, Jan Hauser, and Steven Foster)] |
|||
==Existing SNS== |
==Existing SNS== |
Revision as of 10:38, 9 January 2006
Reputation Management
Trust
Here you can find some descriptions of trust. Depending of the trust model the authors explain some methods used for establishing trust in P2P applications. The document gives a survey of trust systems (policy based, reputation-based, social networks-based).
The authors examine the issue of managing trust in P2P systems. They focus on reputation based schemes and give also a survey of related work.
This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible.
There is a conflict between trust and privacy. Both depend on knowledge about an entity. They work with multiple virtual identities and link evidences to an identity.
Identity is a central element of computational trust. The lack of a central authority for all entities can be used for privacy protection.
Details for the following documents will follow.
Identity
- Social identity in the digital world: Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p131)
- The Augmented Social Network: Building identity and trust into the next-generation Internet (Ken Jordan, Jan Hauser, and Steven Foster)