A Formal Model for Security Analysis of Trust and Reputation systems

Author(s):  
Seyed Asgary Ghasempouri ◽  
Behrouz Tork Ladani
2015 ◽  
Vol 8 (16) ◽  
pp. 2933-2946 ◽  
Author(s):  
Alessandro Aldini

2012 ◽  
Vol 7 (7) ◽  
Author(s):  
Mozhgan Tavakolifard ◽  
Kevin C. Almeroth

2016 ◽  
Vol 67 (2) ◽  
pp. 78-86 ◽  
Author(s):  
Hongye Niu ◽  
Changjun Zhou ◽  
Bin Wang ◽  
Xuedong Zheng ◽  
Shihua Zhou

Abstract Encryption is an effective way to protect the image information from attacking by intruders in the transmission applications through the Internet. This study presents an image encryption scheme on the basics of the formal model of DNA computing-splicing system and hyper-chaotic system, which utilizes the instinct properties of hyper-chaotic system and splicing model while programming the method. In our proposed algorithm, the quaternary coding is used to split the plain image into four sub-sections so that we can’t get the cipher image without any one sub-section. This new method can be used to change the plain image information drastically. The experimental results and security analysis show that our method not only has a good security but also increases the resistance to common attacks such as exhaustive attacks, statistical attacks and differential attacks.


First Monday ◽  
2019 ◽  
Author(s):  
Anna Wilson ◽  
Stefano De Paoli

Social and socioeconomic interactions and transactions often require trust. In digital spaces, the main approach to facilitating trust has effectively been to try to reduce or even remove the need for it through the implementation of reputation systems. These generate metrics based on digital data such as ratings and reviews submitted by users, interaction histories, and so on, that are intended to label individuals as more or less reliable or trustworthy in a particular interaction context. We undertake a disclosive archaeology (Introna, 2014) of typical reputation systems, identifying relevant figuration agencies including affordances and prohibitions, (cyborg) identities, (cyborg) practices and discourses, in order to examine their ethico-political agency. We suggest that conventional approaches to the design of such systems are rooted in a capitalist, competitive paradigm, relying on methodological individualism, and that the reputation technologies themselves thus embody and enact this paradigm within whatever space they operate. We question whether the politics, ethics and philosophy that contribute to this paradigm align with those of some of the contexts in which reputation systems are now being used, and suggest that alternative approaches to the establishment of trust and reputation in digital spaces need to be considered for alternative contexts.


2020 ◽  
Vol 108 ◽  
pp. 302-319 ◽  
Author(s):  
Seyed Asgary Ghasempouri ◽  
Behrouz Tork Ladani

2014 ◽  
Vol 10 (3) ◽  
pp. 57-82
Author(s):  
Neeraj Kumar Sharma ◽  
Vibha Gaur ◽  
Punam Bedi

Asymmetric information is a major problem in e-commerce transactions as it gives rise to adverse selection and moral hazard problems. Reputation mechanisms provide a solution to this problem by discouraging fraudulent behavior and encouraging honest behavior of participants in the uncertain and un-trusted environment of e-market. This paper discusses trust and reputation relationships, and highlights the importance of key reputation building parameters to enhance trustworthiness of participants. Finally, it proposes reputation metrics that guard reputation systems from various attacks by malicious participants to improve the quality of e-market and presents a working prototype.


Sign in / Sign up

Export Citation Format

Share Document