{"id":"https://openalex.org/W2296278438","doi":"https://doi.org/10.1504/ijtmcc.2015.072455","title":"Mitigating malicious feedback attacks in trust management systems","display_name":"Mitigating malicious feedback attacks in trust management systems","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2296278438","doi":"https://doi.org/10.1504/ijtmcc.2015.072455","mag":"2296278438"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijtmcc.2015.072455","pdf_url":null,"source":{"id":"https://openalex.org/S4210179907","display_name":"International Journal of Trust Management in Computing and Communications","issn_l":"2048-8378","issn":["2048-8378","2048-8386"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1504/ijtmcc.2015.072455","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003643909","display_name":"Soon Keow Chong","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Soon Keow Chong","raw_affiliation_strings":["Computer Science from Deakin University, Geelong, Australia in 2012.","Faculty of Science, Engineering and Built Environment, Deakin University, Australia.","Parallel and Distributed Computing Lab, School of Information Technology, Deakin University, Victoria 3217, Australia","School of Information Technology,","School of Information Technology, Faculty of Science, Engineering and Built Environment, Deakin University, Australia."],"affiliations":[{"raw_affiliation_string":"Parallel and Distributed Computing Lab, School of Information Technology, Deakin University, Victoria 3217, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Computer Science from Deakin University, Geelong, Australia in 2012.","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Faculty of Science, Engineering and Built Environment, Deakin University, Australia.","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology,","institution_ids":[]},{"raw_affiliation_string":"School of Information Technology, Faculty of Science, Engineering and Built Environment, Deakin University, Australia.","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019489166","display_name":"Jemal Abawajy","orcid":"https://orcid.org/0000-0001-8962-1222"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jemal H. Abawajy","raw_affiliation_strings":["Computer Science from Deakin University, Geelong, Australia in 2012.","Faculty of Science, Engineering and Built Environment, Deakin University, Australia.","Parallel and Distributed Computing Lab, School of Information Technology, Deakin University, Victoria 3217, Australia","School of Information Technology,","School of Information Technology, Faculty of Science, Engineering and Built Environment, Deakin University, Australia."],"affiliations":[{"raw_affiliation_string":"Computer Science from Deakin University, Geelong, Australia in 2012.","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Parallel and Distributed Computing Lab, School of Information Technology, Deakin University, Victoria 3217, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Faculty of Science, Engineering and Built Environment, Deakin University, Australia.","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Faculty of Science, Engineering and Built Environment, Deakin University, Australia.","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology,","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5003643909"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.702179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":66,"max":73},"biblio":{"volume":"3","issue":"1","first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9785,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9785,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9433,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9272,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7185793},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.53207636},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4738724},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4467172},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.43791857}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijtmcc.2015.072455","pdf_url":null,"source":{"id":"https://openalex.org/S4210179907","display_name":"International Journal of Trust Management in Computing and Communications","issn_l":"2048-8378","issn":["2048-8378","2048-8386"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijtmcc.2015.072455","pdf_url":null,"source":{"id":"https://openalex.org/S4210179907","display_name":"International Journal of Trust Management in Computing and Communications","issn_l":"2048-8378","issn":["2048-8378","2048-8386"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1490117225","https://openalex.org/W1502759548","https://openalex.org/W1519690092","https://openalex.org/W1550481629","https://openalex.org/W1757531142","https://openalex.org/W1967889051","https://openalex.org/W1974993770","https://openalex.org/W1976409582","https://openalex.org/W1988061902","https://openalex.org/W1997747829","https://openalex.org/W1999022078","https://openalex.org/W2030242765","https://openalex.org/W2105766332","https://openalex.org/W2133074729","https://openalex.org/W2164806821","https://openalex.org/W2171104217","https://openalex.org/W2171168198","https://openalex.org/W2189459290","https://openalex.org/W2294590970","https://openalex.org/W2294757943"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2530322880","https://openalex.org/W2478288626","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2350741829","https://openalex.org/W2001405890","https://openalex.org/W1596801655"],"abstract_inverted_index":{"In":[0],"electronic":[1],"commerce":[2],"(e-commerce)":[3],"environment,":[4],"trust":[5,24,54,78],"management":[6,25,55,79],"has":[7],"been":[8],"identified":[9],"as":[10],"vital":[11],"component":[12],"for":[13,69],"establishing":[14],"and":[15,71,94],"maintaining":[16],"successful":[17],"relational":[18],"exchanges":[19],"between":[20],"the":[21,29,33,43,50,53,88,95,103],"trading":[22,34],"partners.As":[23],"systems":[26,80],"depend":[27],"on":[28],"feedbacks":[30,75],"provided":[31],"by":[32],"partners,":[35],"they":[36],"are":[37],"fallible":[38],"to":[39,48,76],"strategic":[40],"manipulation":[41,84],"of":[42,52,73,87,97],"rating":[44,83],"attacks.Therefore,":[45],"in":[46,110],"order":[47],"improve":[49],"reliability":[51],"systems,":[56],"an":[57,67],"approach":[58,68,90,105],"that":[59,102],"addresses":[60],"feedback-related":[61],"vulnerabilities":[62],"is":[63,91],"paramount.This":[64],"paper":[65],"proposes":[66],"identifying":[70,111],"actioning":[72],"falsified":[74,112],"make":[77],"robust":[81],"against":[82],"attacks.The":[85],"viability":[86],"proposed":[89,104],"studied":[92],"experimentally":[93],"results":[96],"various":[98],"simulation":[99],"experiments":[100],"show":[101],"can":[106],"be":[107],"highly":[108],"effective":[109],"feedbacks.":[113]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2296278438","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-13T19:13:35.413065","created_date":"2016-06-24"}