Feedback behavior and its role in trust assessment for peer-to-peer systems

One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Telecommunication systems 2010-08, Vol.44 (3-4), p.253-266
Hauptverfasser: Azzedin, Farag, Ridha, Ahmad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 266
container_issue 3-4
container_start_page 253
container_title Telecommunication systems
container_volume 44
creator Azzedin, Farag
Ridha, Ahmad
description One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.
doi_str_mv 10.1007/s11235-009-9263-9
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_609968392</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2080640111</sourcerecordid><originalsourceid>FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</originalsourceid><addsrcrecordid>eNp1kMFOwzAQRC0EEqXwAdws7gbbsZP4iCoKSJW4wNmykzWktEnxukj9G76FL8NRkDhxmjnMm9UOIZeCXwvOqxsUQhaacW6YkWXBzBGZCV1JZpQWx9lzUTNVl-qUnCGuOR8pMyOrJUDrXfNOPby5z26I1PUt7RLSOGyAdj1NcY-JOkRA3EKfaBji99cOILI0sFEpHjDBFs_JSXAbhItfnZOX5d3z4oGtnu4fF7cr1hRCJxYq13IVgi9r4QFAV0o1rvAOlDSSB3CVb7LWoVWVcgBSgxTgWghO-1IUc3I19e7i8LEHTHY97GOfT9qSG1PWhZE5JKZQEwfECMHuYrd18WAFt-P3dtrM5s3suJk1mZETgznbv0L8K_4f-gGOjnFu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>609968392</pqid></control><display><type>article</type><title>Feedback behavior and its role in trust assessment for peer-to-peer systems</title><source>Springer journals</source><creator>Azzedin, Farag ; Ridha, Ahmad</creator><creatorcontrib>Azzedin, Farag ; Ridha, Ahmad</creatorcontrib><description>One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.</description><identifier>ISSN: 1018-4864</identifier><identifier>EISSN: 1572-9451</identifier><identifier>DOI: 10.1007/s11235-009-9263-9</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Algorithms ; Artificial Intelligence ; Business and Management ; Collaboration ; Communications networks ; Computer Communication Networks ; Dishonesty ; End users ; Feedback ; Honesty ; International ; IT in Business ; Lead ; Multimedia ; Network management systems ; Peer to peer computing ; Peers ; Probability Theory and Stochastic Processes ; Reputations ; Studies ; Success ; Telecommunications systems ; Trust ; Working groups</subject><ispartof>Telecommunication systems, 2010-08, Vol.44 (3-4), p.253-266</ispartof><rights>Springer Science+Business Media, LLC 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</citedby><cites>FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11235-009-9263-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11235-009-9263-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Azzedin, Farag</creatorcontrib><creatorcontrib>Ridha, Ahmad</creatorcontrib><title>Feedback behavior and its role in trust assessment for peer-to-peer systems</title><title>Telecommunication systems</title><addtitle>Telecommun Syst</addtitle><description>One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.</description><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Business and Management</subject><subject>Collaboration</subject><subject>Communications networks</subject><subject>Computer Communication Networks</subject><subject>Dishonesty</subject><subject>End users</subject><subject>Feedback</subject><subject>Honesty</subject><subject>International</subject><subject>IT in Business</subject><subject>Lead</subject><subject>Multimedia</subject><subject>Network management systems</subject><subject>Peer to peer computing</subject><subject>Peers</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Reputations</subject><subject>Studies</subject><subject>Success</subject><subject>Telecommunications systems</subject><subject>Trust</subject><subject>Working groups</subject><issn>1018-4864</issn><issn>1572-9451</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kMFOwzAQRC0EEqXwAdws7gbbsZP4iCoKSJW4wNmykzWktEnxukj9G76FL8NRkDhxmjnMm9UOIZeCXwvOqxsUQhaacW6YkWXBzBGZCV1JZpQWx9lzUTNVl-qUnCGuOR8pMyOrJUDrXfNOPby5z26I1PUt7RLSOGyAdj1NcY-JOkRA3EKfaBji99cOILI0sFEpHjDBFs_JSXAbhItfnZOX5d3z4oGtnu4fF7cr1hRCJxYq13IVgi9r4QFAV0o1rvAOlDSSB3CVb7LWoVWVcgBSgxTgWghO-1IUc3I19e7i8LEHTHY97GOfT9qSG1PWhZE5JKZQEwfECMHuYrd18WAFt-P3dtrM5s3suJk1mZETgznbv0L8K_4f-gGOjnFu</recordid><startdate>20100801</startdate><enddate>20100801</enddate><creator>Azzedin, Farag</creator><creator>Ridha, Ahmad</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20100801</creationdate><title>Feedback behavior and its role in trust assessment for peer-to-peer systems</title><author>Azzedin, Farag ; Ridha, Ahmad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c315t-f7ad04ffb681beee5744ca3bae42920fea7bc20f8fd474aee25e21eadefa5b613</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Business and Management</topic><topic>Collaboration</topic><topic>Communications networks</topic><topic>Computer Communication Networks</topic><topic>Dishonesty</topic><topic>End users</topic><topic>Feedback</topic><topic>Honesty</topic><topic>International</topic><topic>IT in Business</topic><topic>Lead</topic><topic>Multimedia</topic><topic>Network management systems</topic><topic>Peer to peer computing</topic><topic>Peers</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Reputations</topic><topic>Studies</topic><topic>Success</topic><topic>Telecommunications systems</topic><topic>Trust</topic><topic>Working groups</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Azzedin, Farag</creatorcontrib><creatorcontrib>Ridha, Ahmad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Science Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>ProQuest Science Journals</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Telecommunication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Azzedin, Farag</au><au>Ridha, Ahmad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Feedback behavior and its role in trust assessment for peer-to-peer systems</atitle><jtitle>Telecommunication systems</jtitle><stitle>Telecommun Syst</stitle><date>2010-08-01</date><risdate>2010</risdate><volume>44</volume><issue>3-4</issue><spage>253</spage><epage>266</epage><pages>253-266</pages><issn>1018-4864</issn><eissn>1572-9451</eissn><abstract>One of the significant characteristics of ubiquitous environments is the need for trust management due to the vital role trust plays in the success of such environments. Recommenders constitute an important component for managing trust because they can corrupt the recommendation network by providing bogus feedback resulting in losing transactions with trustworthy nodes and committing transactions with untrustworthy nodes. Honesty checking schemes, assume that a recommender is consistent and thus does not change its recommendation behavior. In this paper, we shed light on the inconsistent recommenders’ behavior. That is, recommenders change their recommendation strategy. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking. We propose a new honesty checking algorithm and show through extensive simulation experiments its performance compared to existing honesty checking algorithms.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11235-009-9263-9</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1018-4864
ispartof Telecommunication systems, 2010-08, Vol.44 (3-4), p.253-266
issn 1018-4864
1572-9451
language eng
recordid cdi_proquest_journals_609968392
source Springer journals
subjects Algorithms
Artificial Intelligence
Business and Management
Collaboration
Communications networks
Computer Communication Networks
Dishonesty
End users
Feedback
Honesty
International
IT in Business
Lead
Multimedia
Network management systems
Peer to peer computing
Peers
Probability Theory and Stochastic Processes
Reputations
Studies
Success
Telecommunications systems
Trust
Working groups
title Feedback behavior and its role in trust assessment for peer-to-peer systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T15%3A54%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Feedback%20behavior%20and%20its%20role%20in%20trust%20assessment%20for%C2%A0peer-to-peer%20systems&rft.jtitle=Telecommunication%20systems&rft.au=Azzedin,%20Farag&rft.date=2010-08-01&rft.volume=44&rft.issue=3-4&rft.spage=253&rft.epage=266&rft.pages=253-266&rft.issn=1018-4864&rft.eissn=1572-9451&rft_id=info:doi/10.1007/s11235-009-9263-9&rft_dat=%3Cproquest_cross%3E2080640111%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=609968392&rft_id=info:pmid/&rfr_iscdi=true