Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
}
TY - CHAP
T1 - Attacks and Vulnerabilities of Trust and Reputation Models
AU - Such, Jose M.
PY - 2013
Y1 - 2013
N2 - Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.
AB - Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.
U2 - 10.1007/978-94-007-5583-3_27
DO - 10.1007/978-94-007-5583-3_27
M3 - Chapter
SN - 978-94-007-5582-6
T3 - Law, Governance and Technology Series
SP - 467
EP - 477
BT - Agreement Technologies
A2 - Ossowski, Sascha
PB - Springer Verlag
CY - Dordrecht
ER -