Virtual Fingerprinting as a Foundation for Reputation in Open Systems

نویسندگان

  • Adam J. Lee
  • Marianne Winslett
چکیده

The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/prevention mechanisms, and reputation systems taken for granted in traditional distributed systems. In this paper, we show that as two entities in an attribute-based trust management system interact, each learns one of a limited number of virtual fingerprints describing their communication partner. We show that these virtual fingerprints can be disclosed to other entities in the open system without divulging any attribute or absolute-identity information, thereby forming an opaque pseudo-identity that can be used as the basis for the above-mentioned types of services. We explore the use of virtual fingerprints as the basis of Xiphos, a system that allows reputation establishment without requiring explicit knowledge of entities’ civil identities. We discuss the trade-off between privacy and trust, examine the impacts of several attacks on the Xiphos system, and discuss the performance of Xiphos in a simulated grid computing system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why We Need a Non-reductionist Approach to Trust

Dynamic trust federation in grids p. 3 Being trusted in a social network : trust as relational capital p. 19 A requirements-driven trust framework for secure interoperation in open environments p. 33 Normative structures in trust management p. 48 Gathering experience in trust-based interactions p. 62 Multilateral decisions for collaborative defense against unsolicited bulk e-mail p. 77 Generati...

متن کامل

A collusion mitigation scheme for reputation systems

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...

متن کامل

Designing and Compiling a model of professional competencies of managers in managing the country's sports crises with data Theory Foundation approach

            The real areas of crises in sports testify to the incompetency of managers, therefore, identifying and increasing crisis management capacity is one of the management challenges. The aim of this study was to design and develop a model of managers' competencies in managing national and international sports crises in the country. The research method was exploratory in nature and using ...

متن کامل

Comparative study of Commercial exploitation of athletes' reputation In the legal systems of the United States, uk and Iran

Athletes are among the community reference groups that, according to their followers, their behavior patterns have an impact on the behavior of other members of the community. The same scope of influence encourages business firm to use them in their commercial ads. Certainly, this will not be a problem if the athlete is satisfied with the prior consent, but the main issue is where the business ...

متن کامل

Integrating Trust in Virtual Organisations

Organisational models cannot only be used to structure multiagent systems but also to express behaviour constraints for agents in open environments. However, sometimes these behaviour constraints cannot be exhaustively enforced, and some agents may transgress the norms put forward by a Virtual Organisation. This poses an additional burden on agents, as they cannot be sure that their acquaintanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006