• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 19
Next 10 →

Trust Evaluation through User Reputation and Provenance Analysis

by Davide Ceolin, Paul Groth, Willem Robert Van Hage, Wan Fokkink
"... Abstract. Trust is a broad concept which, in many systems, is reduced to reputation estimation. However, reputation is just one way of determining trust. The estimation of trust can be tackled from other perspectives as well, including by looking at provenance. In this work, we look at the combinati ..."
Abstract - Cited by 8 (3 self) - Add to MetaCart
at the combination of reputation and provenance to determine trust values. Concretely, the first contribution of this paper is a standard procedure for computing reputation-based trust assessments. The second is a procedure for computing trust values based on provenance information, represented by means of the W3C

Analyzing User Demographics and User Behavior for Trust Assessment

by Davide Ceolin, Paul Groth, Archana Nottamk, Wan Fokkink, Willem Robert Van Hage
"... Abstract. In many systems, the determination of trust is reduced to reputation estimation. However, reputation is just one way of determin-ing trust. The estimation of trust can be tackled from a variety of other perspectives. In this chapter, we model trust relying on user reputation, user demograp ..."
Abstract - Add to MetaCart
demographics and from provenance. We then explore the effects of combining trust computed through these different methods. Concretely, the first contribution of this chapter is a study of the correlations of demographics with trust. This study helps us to understand which cat-egories of users are better

ARTSense: Anonymous Reputation and Trust in Participatory Sensing

by Xinlei (oscar Wang, Wei Cheng, Prasant Mohapatra, Tarek Abdelzaher
"... Abstract—With the proliferation of sensor-embedded mobile computing devices, participatory sensing is becoming popular to collect information from and outsource tasks to participating users. These applications deal with a lot of personal information, e.g., users ’ identities and locations at a speci ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
. Our solution consists of a privacy-preserving provenance model, a data trust assessment scheme and an anonymous reputation management protocol. We have shown that ARTSense achieves the anonymity and security requirements. Validations are done to show that we can capture the trust of information

1Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing

by Xinlei (oscar Wang, Student Member, Wei Cheng, Prasant Mohapatra, Tarek Abdelzaher
"... Abstract—Mobile sensing is becoming a popular paradigm to collect information from and outsource tasks to mobile users. These applications deal with lot of personal information, e.g., identity and location. Therefore, we need to pay a deeper attention to privacy and anonymity. However, the knowledge ..."
Abstract - Add to MetaCart
of a privacy-preserving provenance model, a data trust assessment scheme and an anonymous reputation management protocol. In contrast to other recent solutions, our scheme does not require a trusted third party and both positive and negative reputation updates can be enforced. In the trust assessment

An Architecture for Justified Assessments of Service Provider Reputation

by Nathan Griffiths, Simon Miles
"... Abstract—In a service-oriented system, an accurate assess-ment of reputation is essential for selecting between alternative providers. In many cases, providers have differing characteristics that must be considered alongside reliability, including their cost, experience, quality, and use of sub-prov ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
-providers, etc. Existing meth-ods for reputation assessment are limited in terms of the extent to which the full interaction history and context is considered. While factors such as cost and quality might be considered, the assessment of reputation is typically based only on a combination of direct experience

Portable reputation: Proving ownership of reputations across portals

by Eep S. Kumar, Paul Koster
"... Abstract. User reputation has become a valuable commodity for enabling trusted transactions on the Internet especially with strangers in virtual communities. However, the reputation information about the various users are normally locked-up in the silos of different web-portals where the members int ..."
Abstract - Add to MetaCart
information of others, which are proven to belong to them in a reliable and cryptographically secure way. Users can appropriately weigh the reputation from different web-portals according to their individual choice and trust in the different web-portals. The solution has the advantage that it does not require

Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing,” to appear in a future issue of

by Xinlei (oscar Wang, Student Member, Wei Cheng, Prasant Mohapatra, Tarek Abdelzaher - IEEE Transactions on Mobile Computing
"... Abstract—Mobile sensing is becoming a popular paradigm to collect information from and outsource tasks to mobile users. These applications deal with lot of personal information, e.g., identity and location. Therefore, we need to pay a deeper attention to privacy and anonymity. However, the knowledge ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
of a privacy-preserving provenance model, a data trust assessment scheme and an anonymous reputation management protocol. In contrast to other recent solutions, our scheme does not require a trusted third party and both positive and negative reputation updates can be enforced. In the trust assessment

Trust and Provenance You Can’t Have One Without The Other

by Krzysztof Janowicz
"... Abstract. On the social web content is no longer generated by a small number of established authorities but by a huge number of mostly anonymous users. On the semantic web new content is created by combining existing information from different sources on the fly. In both cases trust is of fundamenta ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
is of fundamental importance. Is the user providing new content trustworthy? How trustworthy is information inferred from such content? Trust ratings are one approach to define a measure for user reputation. Provenance in turn, provides meta information about the creation and processing of content. It answers

Rule-Based Trust Assessment on the Semantic Web

by Ian Jacobi, Lalana Kagal, Ankesh Khandelwal
"... The Semantic Web is a decentralized forum on which anyone can publish structured data or extend and reuse existing data. This inherent openness of the Semantic Web raises questions about the trustworthiness of the data. Data is usually deemed trustworthy based on several factors including its sourc ..."
Abstract - Add to MetaCart
trust values to data, sources, rules, etc. on the Web, provenance ontologies to capture data generation, and declarative rules to combine these values to form different trust assessment models. These trust assessment models can be used to transfer trust from known to unknown data. We discuss how AIR, a

A Reputation-Based Approach for Efficient Filtration of Spam

by Vipul Ved Prakash, Adam J. O’Donnell , 2005
"... Cloudmark’s collaborative approach to fighting spam—with its additional attribute of “reputation” added to a community of real users who identify, report, and corroborate suspect messages in real time—has proven more effective and faster than traditional blocking or filtering methods. At the core of ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Cloudmark’s collaborative approach to fighting spam—with its additional attribute of “reputation” added to a community of real users who identify, report, and corroborate suspect messages in real time—has proven more effective and faster than traditional blocking or filtering methods. At the core
Next 10 →
Results 1 - 10 of 19
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University