ARM4SNS Web Ressources: Difference between revisions

From
Jump to navigation Jump to search
Line 35: Line 35:
* [http://citeseer.csail.mit.edu/kobsa03privacy.html Privacy through Pseudonymity in User-Adaptive Systems (Alfred Kobsa, Joerg Schreck)]
* [http://citeseer.csail.mit.edu/kobsa03privacy.html Privacy through Pseudonymity in User-Adaptive Systems (Alfred Kobsa, Joerg Schreck)]


* Social identity in the digital world: [http://chaosradio.ccc.de/archive/22C3_Proceedings.pdf Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p130)]
* Social identity in the digital world: [http://chaosradio.ccc.de/archive/22C3_Proceedings.pdf Digital Identity - The Ghost in the Machine (Dr. Max Kilger, in: Proceedings of the 22C3, p131)]


==Existing SNS==
==Existing SNS==

Revision as of 10:35, 9 January 2006


Reputation Management

Trust

Here you can find some descriptions of trust. Depending of the trust model the authors explain some methods used for establishing trust in P2P applications. The document gives a survey of trust systems (policy based, reputation-based, social networks-based).

The authors examine the issue of managing trust in P2P systems. They focus on reputation based schemes and give also a survey of related work.

This paper presents an attribute vector calculus based approach for modeling a continuum of trust; which models the real world model of trust, as closely as possible.

There is a conflict between trust and privacy. Both depend on knowledge about an entity. They work with multiple virtual identities and link evidences to an identity.

Identity is a central element of computational trust. The lack of a central authority for all entities can be used for privacy protection.

Details for the following documents will follow.

Identity

Existing SNS