Abstract
Today, reputation systems such as ebay’s prominent “Feedback Forum” are becoming more widespread. In such a system, reputations are formed by aggregating ratings participants give and receive. These reputations, however, are bound to a specific platform preventing participants from taking and showing their hard-earned reputations elsewhere. That makes the reputations less valuable and leaves them vulnerable to manipulation and total loss. In this paper, we propose a viable solution to these issues in which current P2P and PKI technologies are employed to shift ownership and responsibility back to the participants. Our envisioned Reputation Management System, therefore, uses contextdependent feedback gathered in questionnaires and provides security for peer transactions to ensure integrity, confidentiality and privacy.
This research was made possible, in part, by the kind support of the project unit eSolutions, T-Systems GEI GmbH, Germany. We are especially grateful to Everett Wilson for his support and constructive comments on this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the Hawai’i Int’l. Conf. on System Sciences, Hawaii (2000)
Aura, T.: Strategies against Replay Attacks. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts (1997)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the IEEE Symp. on Security and Privacy, IEEE Society Press (1996) 164–173
Casassa Mont, M., Tomasi, L., Montanari, R.: An Adaptive System Responsive to Trust Assessment Based on Peer-to-Peer Evidence Replication and Storage. Technical report HPL-2001-133, Hewlett Packard Laboratories (2001)
Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28 (1985) 1030–1040
Chen, R., Yeager, W.: Poblano— A Distributed Trust Model for Peer-to-Peer Networks (2001). http://www.jxta.org/project/www/docs/trust.pdf, 02/21/2002.
Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce, Minneapolis, MN (2000)
Dierks, T., Allen, C.: The TLS Protocol Version 1.0 (1999). http://www.rfceditor.org/rfc/rfc2246.txt, 02/28/2002.
Dingledine, R., Freedman, M. J., Molnar, D.: Accountability. In Oram, A. (ed.): Peer-to-Peer. Harnessing the Power of Disruptive Technologies. O’Reilly and Associates, Sebastopol, CA (2001)
ITU-T: Public-key and Attribute Certificate Frameworks. Recommendation X.509. (03/2000). http://www.itu.int, 05/17/2002.
Josang, A.: The Right Type of Trust for Distributed Systems. In Meadows, C., (ed.): Proc. of New Security Paradigms Workshop, ACM Press (1996) 119–131
Labalme, F., Burton, K.: Enhancing the Internet with Reputations (2001). http://www.openprivacy.org/papers/200103-white.html, 02/21/2002.
Levien, R.: Advogato’s Trust Metric (2000). http://www.advogato.org/trustmetric.html, 02/21/2002.
Lethin, R.: Reputation. In Oram A., (ed.): Peer-to-Peer. Harnessing the Power of Disruptive Technologies, O’Reilly and Associates, 2001
Maximilien, E. M., Singh, M. P.: Reputation and Endorsement for Web Services. Proceedings of the ACM SIGecom conference 3 (2002) 24–31
Oram, A.: Peer-to-Peer. Harnessing the Power of Disruptive Technologies. O’Reilly and Associates, Sebastopol, CA, USA (2001)
Padovan, B., Sackmann, S., et al.: A Prototype for an Agent-based Secure Electronic Marketplace Including Reputation Tracking Mechanisms. In: Proc. of the 34th Hawai’i Int’l. Conf. on System Sciences, IEEE Computer Society (2001)
Raub, W., Weesie, J.: Reputation and Efficiency in Social Interactions: An Example of Network Effects. American Journal of Sociology 96 (1990) 626–654
Resnick, P., Zeckhauser, R., et al.: Reputation Systems. Communications of the ACM 43 (2000) 45–48
Rivest, R. L., Shamir, A.: How to Expose an Eavesdropper. Communications of the ACM 27 (1984) 393–395
RSA Data Security, Inc.: Pkcs#12— pers. information exchange syntax std. (1999)
Sabater, J., Sierra, C.: Social Regret, a Reputation Model Based on Social Relations. Proceedings of the ACM SIGecom conference 3 (2001) 44–56
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edn. John Wiley and Sons, Inc., New York, NY, USA (1996)
Winsborough, W., Seamons, K. E., Jones, V. E.: Automated Trust Negotiation. In: DARPA Information Survivability Conference and Exposition, USA (2000)
Yu, B., Singh, M. P.: A Social Mechanism of Reputation Management in Electronic Communities. In: Cooperative Information Agents, Boston, MA, USA (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fahrenholtz, D., Lamersdorf, W. (2002). Transactional Security for a Distributed Reputation Management System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_23
Download citation
DOI: https://doi.org/10.1007/3-540-45705-4_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44137-3
Online ISBN: 978-3-540-45705-3
eBook Packages: Springer Book Archive