In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors of their models by examples, with few (if not no) formal analyses. In this article, we state the basic security properties such systems require and we show that current systems may not satisfy them on specific scenarios, which can be used by malicious entities to take advantage of the system. We also present a new reputation scheme, designed to satisfy these properties, and we compare it to existing research works. © 2008 Springer Berlin Heidelberg.
CITATION STYLE
Cuppens, F., Cuppens-Boulahia, N., & Thomas, J. A. (2008). A robust reputation scheme for decentralized group management systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5352 LNCS, pp. 71–85). https://doi.org/10.1007/978-3-540-89862-7_5
Mendeley helps you to discover research relevant for your work.