A Reputation Response Set for Email Identifiers

نویسندگان

  • Nathaniel S. Borenstein
  • Murray S. Kucherawy
چکیده

This document defines a response set for describing assertions a reputation service provider can make about email identifiers, for use in generating reputons. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reputation in the Academic World

This paper proposes a computational model based on peer reviews for assessing the reputation of researchers and research work. We argue that by relying on peer opinions, we address some of the pitfalls of current approaches for calculating the reputation of authors and papers. We also introduce a much needed feature for review management: calculating the reputation of reviews and reviewers. 1 M...

متن کامل

Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data

Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems that can assign a value of trust to each IP address sending email messages. By analyzing the query patterns of each node utilizing reputation information, reputation systems can calculate a reputation score for each ...

متن کامل

Exposure to superfluous information reduces cooperation and increases antisocial punishment in reputation-based interactions

*Correspondence: Claus Wedekind, Department of Ecology and Evolution, University of Lausanne, Biophore, CH-1015 Lausanne, Switzerland e-mail: [email protected] Human cooperation is often based on reputation gained from previous interactions with third parties. Such reputation can be built on generous or punitive actions, and both, one’s own reputation and the reputation of others have been...

متن کامل

Reputation and Distribution in a Gift Giving Game

The folk theorem allows a very unequal division between players. In nonrepeated experimental games with many equilibria, such as ultimatum, observed play involves a relatively equal division between players. In a two-player repeated game setting there is a simple intuition about this: a poor player has little to lose by deviating from his equilibrium strategy. So a rich player ought to be willi...

متن کامل

Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks

In this work, we describe a method for establishing authenticated channels in a wireless ad-hoc network. The presented protocol is fully self-organized, and it also provides an identification framework. The two main contributions are (1) a fully self-organized protocol that establishes an authenticated communication channel between nodes of a wireless ad-hoc network and (2) a secure identifier ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • RFC

دوره 7073  شماره 

صفحات  -

تاریخ انتشار 2013