ARM4SNS Web Ressources: Difference between revisions

From
Jump to navigation Jump to search
Line 15: Line 15:
This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible.
This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible.
* [http://citeseer.ist.psu.edu/shankar02trust.html On trust for ubiquitous computing (N. Shankar and W. A. Arbaugh, 2002)] <br><br>
* [http://citeseer.ist.psu.edu/shankar02trust.html On trust for ubiquitous computing (N. Shankar and W. A. Arbaugh, 2002)] <br><br>

There is a conflict between trust and privacy. Both depend on knowledge about an entity. They work with multiple virtual identities and link evidences to an identity.
* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-38.pdf Trading Privacy for Trust (Jean-Marc Seigneur, Christian Damsgaard Jensen)] <br><br>

Identity is a central element of computational trust. The lack of a central authority for all entities can be used for privacy protection.
* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-48.pdf The role of identity in pervasive computational trust (Jean-Marc Seigneur, Christian Damsgaard Jensen)] <br><br>


Details for the following documents will follow.
Details for the following documents will follow.
Line 20: Line 26:


* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-37.pdf Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss (Jean-Marc Seigneur, Christian Damsgaard Jensen)]
* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-37.pdf Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss (Jean-Marc Seigneur, Christian Damsgaard Jensen)]

* [https://www.cs.tcd.ie/publications/tech-reports/reports.04/TCD-CS-2004-38.pdf Trading Privacy for Trust (Jean-Marc Seigneur, Christian Damsgaard Jensen)]


==Identity==
==Identity==

Revision as of 09:49, 19 December 2005


Reputation Management

Trust

Here you can find some descriptions of trust. Depending of the trust model the authors explain some methods used for establishing trust in P2P applications. The document gives a survey of trust systems (policy based, reputation-based, social networks-based).

The authors examine the issue of managing trust in P2P systems. They focus on reputation based schemes and give also a survey of related work.

This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible.

There is a conflict between trust and privacy. Both depend on knowledge about an entity. They work with multiple virtual identities and link evidences to an identity.

Identity is a central element of computational trust. The lack of a central authority for all entities can be used for privacy protection.

Details for the following documents will follow.

Identity

Existing SNS