Abstract
In peer-to-peer (P2P) environments, a peer needs to interact with unknown peers for the services provided. This requires the trust evaluation prior to and posterior to interactions. This paper presents Trust2: a novel and dynamic peer trust evaluation model, which aims to measure the credibility of peers' recommendations, and thus to filter noise in responses and obtain more accurate and objective trust values. In our model, prior to any interaction, the trust value results from the evaluations given by other peers. Posterior to interactions, the trust values results from both other peers ' evaluations and the requesting peer's experience. In the aggregation of trust evaluations, the weight to the requesting peer becomes higher and higher. Meanwhile, during this process, the credibility of each responding peer's recommendation can be measured round by round. This leads to the filtering of low credibility peers and the improvement of trust evaluations.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2005 IEEE International Conference onServices Computing, SCC 2005 |
| Editors | Sandeep Purao, Hai Jin, Frank Leymann |
| Place of Publication | Los Alamitos, CA |
| Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
| Pages | 24-31 |
| Number of pages | 8 |
| Volume | I |
| ISBN (Print) | 0769524087, 9780769524085 |
| DOIs | |
| Publication status | Published - 2005 |
| Event | 2005 IEEE International Conference on Services Computing, SCC - 2005 - Orlando, United States Duration: 11 Jul 2005 → 15 Jul 2005 |
Other
| Other | 2005 IEEE International Conference on Services Computing, SCC - 2005 |
|---|---|
| Country/Territory | United States |
| City | Orlando |
| Period | 11/07/05 → 15/07/05 |
Bibliographical note
Copyright 2005 IEEE. Reprinted from Proceedings of the 2005 IEEE international conference on services computing. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.Fingerprint
Dive into the research topics of 'Trust²: Developing trust in peer-to-peer environments'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver