Feedback behavior and its role in trust assessment for peer-to-peer systems
One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing...
Gespeichert in:
Veröffentlicht in: | Telecommunication systems 2010-08, Vol.44 (3-4), p.253-266 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 266 |
---|---|
container_issue | 3-4 |
container_start_page | 253 |
container_title | Telecommunication systems |
container_volume | 44 |
creator | Azzedin, Farag Ridha, Ahmad |
description | One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms. |
doi_str_mv | 10.1007/s11235-009-9263-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_609968392</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2080640111</sourcerecordid><originalsourceid>FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</originalsourceid><addsrcrecordid>eNp1kMFOwzAQRC0EEqXwAdws7gbbsZP4iCoKSJW4wNmykzWktEnxukj9G76FL8NRkDhxmjnMm9UOIZeCXwvOqxsUQhaacW6YkWXBzBGZCV1JZpQWx9lzUTNVl-qUnCGuOR8pMyOrJUDrXfNOPby5z26I1PUt7RLSOGyAdj1NcY-JOkRA3EKfaBji99cOILI0sFEpHjDBFs_JSXAbhItfnZOX5d3z4oGtnu4fF7cr1hRCJxYq13IVgi9r4QFAV0o1rvAOlDSSB3CVb7LWoVWVcgBSgxTgWghO-1IUc3I19e7i8LEHTHY97GOfT9qSG1PWhZE5JKZQEwfECMHuYrd18WAFt-P3dtrM5s3suJk1mZETgznbv0L8K_4f-gGOjnFu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>609968392</pqid></control><display><type>article</type><title>Feedback behavior and its role in trust assessment for peer-to-peer systems</title><source>Springer journals</source><creator>Azzedin, Farag ; Ridha, Ahmad</creator><creatorcontrib>Azzedin, Farag ; Ridha, Ahmad</creatorcontrib><description>One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.</description><identifier>ISSN: 1018-4864</identifier><identifier>EISSN: 1572-9451</identifier><identifier>DOI: 10.1007/s11235-009-9263-9</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Algorithms ; Artificial Intelligence ; Business and Management ; Collaboration ; Communications networks ; Computer Communication Networks ; Dishonesty ; End users ; Feedback ; Honesty ; International ; IT in Business ; Lead ; Multimedia ; Network management systems ; Peer to peer computing ; Peers ; Probability Theory and Stochastic Processes ; Reputations ; Studies ; Success ; Telecommunications systems ; Trust ; Working groups</subject><ispartof>Telecommunication systems, 2010-08, Vol.44 (3-4), p.253-266</ispartof><rights>Springer Science+Business Media, LLC 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</citedby><cites>FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11235-009-9263-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11235-009-9263-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Azzedin, Farag</creatorcontrib><creatorcontrib>Ridha, Ahmad</creatorcontrib><title>Feedback behavior and its role in trust assessment for peer-to-peer systems</title><title>Telecommunication systems</title><addtitle>Telecommun Syst</addtitle><description>One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.</description><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Business and Management</subject><subject>Collaboration</subject><subject>Communications networks</subject><subject>Computer Communication Networks</subject><subject>Dishonesty</subject><subject>End users</subject><subject>Feedback</subject><subject>Honesty</subject><subject>International</subject><subject>IT in Business</subject><subject>Lead</subject><subject>Multimedia</subject><subject>Network management systems</subject><subject>Peer to peer computing</subject><subject>Peers</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Reputations</subject><subject>Studies</subject><subject>Success</subject><subject>Telecommunications systems</subject><subject>Trust</subject><subject>Working groups</subject><issn>1018-4864</issn><issn>1572-9451</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kMFOwzAQRC0EEqXwAdws7gbbsZP4iCoKSJW4wNmykzWktEnxukj9G76FL8NRkDhxmjnMm9UOIZeCXwvOqxsUQhaacW6YkWXBzBGZCV1JZpQWx9lzUTNVl-qUnCGuOR8pMyOrJUDrXfNOPby5z26I1PUt7RLSOGyAdj1NcY-JOkRA3EKfaBji99cOILI0sFEpHjDBFs_JSXAbhItfnZOX5d3z4oGtnu4fF7cr1hRCJxYq13IVgi9r4QFAV0o1rvAOlDSSB3CVb7LWoVWVcgBSgxTgWghO-1IUc3I19e7i8LEHTHY97GOfT9qSG1PWhZE5JKZQEwfECMHuYrd18WAFt-P3dtrM5s3suJk1mZETgznbv0L8K_4f-gGOjnFu</recordid><startdate>20100801</startdate><enddate>20100801</enddate><creator>Azzedin, Farag</creator><creator>Ridha, Ahmad</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20100801</creationdate><title>Feedback behavior and its role in trust assessment for peer-to-peer systems</title><author>Azzedin, Farag ; Ridha, Ahmad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Business and Management</topic><topic>Collaboration</topic><topic>Communications networks</topic><topic>Computer Communication Networks</topic><topic>Dishonesty</topic><topic>End users</topic><topic>Feedback</topic><topic>Honesty</topic><topic>International</topic><topic>IT in Business</topic><topic>Lead</topic><topic>Multimedia</topic><topic>Network management systems</topic><topic>Peer to peer computing</topic><topic>Peers</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Reputations</topic><topic>Studies</topic><topic>Success</topic><topic>Telecommunications systems</topic><topic>Trust</topic><topic>Working groups</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Azzedin, Farag</creatorcontrib><creatorcontrib>Ridha, Ahmad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>ProQuest Science Journals</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Telecommunication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Azzedin, Farag</au><au>Ridha, Ahmad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Feedback behavior and its role in trust assessment for peer-to-peer systems</atitle><jtitle>Telecommunication systems</jtitle><stitle>Telecommun Syst</stitle><date>2010-08-01</date><risdate>2010</risdate><volume>44</volume><issue>3-4</issue><spage>253</spage><epage>266</epage><pages>253-266</pages><issn>1018-4864</issn><eissn>1572-9451</eissn><abstract>One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11235-009-9263-9</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1018-4864 |
ispartof | Telecommunication systems, 2010-08, Vol.44 (3-4), p.253-266 |
issn | 1018-4864 1572-9451 |
language | eng |
recordid | cdi_proquest_journals_609968392 |
source | Springer journals |
subjects | Algorithms Artificial Intelligence Business and Management Collaboration Communications networks Computer Communication Networks Dishonesty End users Feedback Honesty International IT in Business Lead Multimedia Network management systems Peer to peer computing Peers Probability Theory and Stochastic Processes Reputations Studies Success Telecommunications systems Trust Working groups |
title | Feedback behavior and its role in trust assessment for peer-to-peer systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T15%3A54%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Feedback%20behavior%20and%20its%20role%20in%20trust%20assessment%20for%C2%A0peer-to-peer%20systems&rft.jtitle=Telecommunication%20systems&rft.au=Azzedin,%20Farag&rft.date=2010-08-01&rft.volume=44&rft.issue=3-4&rft.spage=253&rft.epage=266&rft.pages=253-266&rft.issn=1018-4864&rft.eissn=1572-9451&rft_id=info:doi/10.1007/s11235-009-9263-9&rft_dat=%3Cproquest_cross%3E2080640111%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=609968392&rft_id=info:pmid/&rfr_iscdi=true |