Privacy Issues with Sharing and Computing Reputation across Communities
暂无分享,去创建一个
[1] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[2] Barbara Carminati,et al. Computing Reputation for Collaborative Private Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.
[3] Christian Damsgaard Jensen,et al. Trading Privacy for Trust , 2004, iTrust.
[4] Brad R. Rawlins,et al. Measuring the relationship between organizational transparency and employee trust. , 2008 .
[5] Siani Pearson,et al. A Privacy-Enhanced Peer-to-Peer Reputation System , 2003, EC-Web.
[6] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[7] Ehud Gudes,et al. Sharing Reputation Across Virtual Communities , 2010, J. Theor. Appl. Electron. Commer. Res..
[8] Sandra Steinbrecher. Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities , 2006, SEC.
[9] Bharat Bhargava,et al. Trading Privacy for Trust in Online Interactions , 2007 .
[10] Sandra Steinbrecher,et al. Multilateral Secure Cross-Community Reputation Systems for Internet Communities , 2008, TrustBus.
[11] Yang Bo,et al. A Reputation System with Privacy and Incentive , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[12] Joachim Posegga,et al. On Structural Signatures for Tree Data Structures , 2012, ACNS.
[13] Ehud Gudes,et al. CROSS-COMMUNITY REPUTATION: POLICIES AND ALTERNATIVES , 2008 .
[14] Ehud Gudes,et al. Schemes for Privately Computing Trust and Reputation , 2010, IFIPTM.
[15] Daniel J. Solove. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , 2007 .
[16] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[17] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[18] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[19] Jeffrey S. Rosenschein,et al. Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.
[20] Ehud Gudes,et al. Methods for Computing Trust and Reputation While Preserving Privacy , 2009, DBSec.
[21] Luca Longo,et al. A Translation Mechanism for Recommendations , 2008, IFIPTM.
[22] Elisa Bertino,et al. Structural signatures for tree data structures , 2008, Proc. VLDB Endow..
[23] Ehud Gudes,et al. A Robust and Knot-Aware Trust-Based Reputation Model , 2008, IFIPTM.
[24] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[25] Elisa Bertino,et al. k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments , 2010, SEC.
[26] Elisa Bertino,et al. A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[27] P. Adler,et al. Social Capital: Prospects for a New Concept , 2002 .