Home > Research > Publications & Outputs > Attacks and Vulnerabilities of Trust and Reputa...
View graph of relations

Attacks and Vulnerabilities of Trust and Reputation Models

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Attacks and Vulnerabilities of Trust and Reputation Models. / Such, Jose M.
Agreement Technologies. ed. / Sascha Ossowski. Dordrecht: Springer Verlag, 2013. p. 467-477 (Law, Governance and Technology Series; Vol. 8).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Such, JM 2013, Attacks and Vulnerabilities of Trust and Reputation Models. in S Ossowski (ed.), Agreement Technologies. Law, Governance and Technology Series, vol. 8, Springer Verlag, Dordrecht, pp. 467-477. https://doi.org/10.1007/978-94-007-5583-3_27

APA

Such, J. M. (2013). Attacks and Vulnerabilities of Trust and Reputation Models. In S. Ossowski (Ed.), Agreement Technologies (pp. 467-477). (Law, Governance and Technology Series; Vol. 8). Springer Verlag. https://doi.org/10.1007/978-94-007-5583-3_27

Vancouver

Such JM. Attacks and Vulnerabilities of Trust and Reputation Models. In Ossowski S, editor, Agreement Technologies. Dordrecht: Springer Verlag. 2013. p. 467-477. (Law, Governance and Technology Series). doi: 10.1007/978-94-007-5583-3_27

Author

Such, Jose M. / Attacks and Vulnerabilities of Trust and Reputation Models. Agreement Technologies. editor / Sascha Ossowski. Dordrecht : Springer Verlag, 2013. pp. 467-477 (Law, Governance and Technology Series).

Bibtex

@inbook{e544c39140934466922eb61e9af9b544,
title = "Attacks and Vulnerabilities of Trust and Reputation Models",
abstract = "Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.",
author = "Such, {Jose M.}",
year = "2013",
doi = "10.1007/978-94-007-5583-3_27",
language = "English",
isbn = "978-94-007-5582-6",
series = "Law, Governance and Technology Series",
publisher = "Springer Verlag",
pages = "467--477",
editor = "Ossowski, {Sascha }",
booktitle = "Agreement Technologies",

}

RIS

TY - CHAP

T1 - Attacks and Vulnerabilities of Trust and Reputation Models

AU - Such, Jose M.

PY - 2013

Y1 - 2013

N2 - Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.

AB - Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.

U2 - 10.1007/978-94-007-5583-3_27

DO - 10.1007/978-94-007-5583-3_27

M3 - Chapter

SN - 978-94-007-5582-6

T3 - Law, Governance and Technology Series

SP - 467

EP - 477

BT - Agreement Technologies

A2 - Ossowski, Sascha

PB - Springer Verlag

CY - Dordrecht

ER -