DistOS-2011W Reputation: Difference between revisions
No edit summary |
mNo edit summary |
||
Line 24: | Line 24: | ||
Since this won't be the actual page the paper is written on, I'm going to dump possibly relevant links here. If they actually get used I'll make them into proper references. | Since this won't be the actual page the paper is written on, I'm going to dump possibly relevant links here. If they actually get used I'll make them into proper references. | ||
http://www.kirkarts.com/wiki/images/1/13/Resnick_eBay.pdf - eBay's reputation system | http://www.kirkarts.com/wiki/images/1/13/Resnick_eBay.pdf - eBay's reputation system | ||
http://portal.acm.org/citation.cfm?id=544741.544809 - ''An Evidential Model of Distributed Reputation Management'' | |||
Revision as of 23:11, 3 March 2011
Members
- Waheed Ahmed
- Trevor Gelowsky
- Michael Du Plessis
- Nicolas Lessard
The problem
Emerge vs. Impose reputation on the system
What currently exists?
- Digital signatures
- Certificates signed by trusted organizations
Public-key infrastructure
Introduction
In order to build secure chain of trust Public-Key Infrastructure is used for internet based communication. It consists of various things like security policy , Certificate authority , registration authority , certificate distribution system PKI enabled applications.
Uses and Need
With development of modern e-commerce based businesses which has minimal customer face-to-face interactions is demanding more security and integrity. The online web based stores where huge amount of transactions take place needs to ensure customers that there information is confidential and processed through a secure channel. This is where implementation of PKI steps in to provide mechanisms to ensure trusted relationships are established and maintained. The specific security functions in which a PKI can provide foundation are confidentiality, integrity, non-repudiation,and authentication.
Dissemination
Maintaining History
Querying Reputation
Since this won't be the actual page the paper is written on, I'm going to dump possibly relevant links here. If they actually get used I'll make them into proper references.
http://www.kirkarts.com/wiki/images/1/13/Resnick_eBay.pdf - eBay's reputation system http://portal.acm.org/citation.cfm?id=544741.544809 - An Evidential Model of Distributed Reputation Management
Possible implementations
Conclusion
References
- Joel Weise : "Public Key Infrastructure Overview " http://www.sun.com/blueprints/0801/publickey.pdf Accessed 2nd March 2011
- Security Glossary : http://www.cafesoft.com/support/security-glossary.html Accessed on 2nd March 2011
- Mattila, Anssi; and Mattila, Minna "What is the Effect of Product Attributes on Public-Key Infrastructure adoption? " http://internetjournals.net/journals/tir/2006/January/Paper%2003.pdf Accessed on 2nd March 2011
- Krukow, K. A Logical Framework for Reputation Systems
and History-based Access Control. School of Electronics and Computer Science University of Southampton, UK. (March 3, 2011) [1]