Figure 1 - uploaded by Jeremy A Hansen
Content may be subject to copyright.
Modeling Alice's reputation as available credit 

Modeling Alice's reputation as available credit 

Source publication
Conference Paper
Full-text available
Social networking and e-commerce sites have many mechanisms with which they encourage generation of user content, represent user trust and reputation relationships, and control access to desirable digital resources. Using anonymous electronic cash (or scrip), the proposed system RepScrip provides the preceding three features and adds optional (to t...

Contexts in source publication

Context 1
... restricting the credit limit to the actual scrip each user has on hand in his account, the effective lines of credit will more closely reflect reality. See Figure 1 for an example of a user, Charlie, who offers Alice a line of credit higher than he can directly provide. 7) Con: Issuer Violating Anonymity: Disreputable issuers might try to correlate the withdrawals and subsequent de- posits to determine the identities of those performing a particular exchange. ...
Context 2
... Interactions Between Users: As depicted in Figure 1, trust and reputation are represented by the summation of the individual levels of credit that a user has from the members of his or her circle. A user may call on another to loan him some scrip for a purchase, exercising (and thereby lowering) his reputation, so users must be careful to offer credit only to others that he genuinely trusts. ...

Similar publications

Article
Full-text available
Postmarketing drug surveillance is a crucial aspect of the clinical research activities in pharmacovigilance and pharmacoepidemiology. Successful utilization of available Electronic Health Record (EHR) data can complement and strengthen postmarketing safety studies. In terms of the secondary use of EHRs, access and analysis of patient data across d...
Article
Full-text available
The blockchain is an emerging technology that serves as an immutable ledger, which allows transactions to take place in a decentralized manner. It has become a publicly available infrastructure for building decentralized applications and achieving interoperability. Blockchain-based applications ensure transparency and trust between all parties invo...
Article
The most vital concern in the realization of the Internet of Things (IoT) is to encounter the disparate communication systems and technologies. Interoperability solutions such as standards can help us to integrate plenty of diverse devices and their applications in an interoperable framework. Since Smart Grid is a non-trivial prevalent application...
Article
Full-text available
We created a tool to address two problems with using Net-Flows logs for security analysis: (1) NetFlows come in mul-tiple, incompatible formats, and (2) the sensitivity of Net-Flow logs can hinder the sharing of these logs. We call the NetFlow converter and anonymizer that we created to ad-dress these problems CANINE: Converter and ANonymizer for I...
Thesis
Full-text available
Recent years have seen a huge proliferation in the use of content in distributed applications. This observation has been exploited by researchers to construct a new paradigm called content-centric networking. Within this paradigm, applications interact with the network using a simple content request/reply abstraction. The network is then responsibl...

Citations

... In the proposed framework, credit, payment, and reputation are inextricably linked to the resource negotiation process. While we do not explicitly lay out the payment mechanism, there are many facilities for anonymous and pseudonymous electronic currency, some including reputation [21] and some not pegged to any non-electronic currency [22]. After configuring their devices' policies, users can collect the currency accumulated by (or reissue currency to) devices they control. ...
Conference Paper
Full-text available
We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing "web of trust" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.
Article
A financial transaction is an agreement, or conversation, entered between a purchaser and a dealer for the trade of an asset for virtual processing of payments. E-cash (digital money) is the crucial fee way in digital exchange, this is seen as the same as coin in the real world. A financial transaction is one wherein there is some kind of pastime that modifies the rate of the property, liabilities, or owner's fairness of a business enterprise. The ones styles of transactions are - component transactions which includes a buyer and a seller, and that they usually include cash in some way. The aim of this work was to develop a systematic ordering, comprehensive and classification of issues in the area of financial services. Spring Boot is used for the implementation of the product and it is developed with the help of swift messaging standard for easier transitions and efficient transactions. A customer will subscribe for the service which is provided by the customer service provider. The customer will have to pay the monthly fees for that service. It will be automatically debited from the bank account. The work of this project is for the customer to review the billing amount and also request for billing date extension and request for bill cancellation if needed. The complete process is divided into two parts which are inbound and outbound. There will be a queueing process which picks the customer the query and processes it one by one. The customer will initiate a query and after all the verification and validation the response will be sent to the customer.
Conference Paper
In this paper, we propose a framework for an electronic cash system that combines the benefits of anonymous transactions with online payment protocols. The paper begins with a discussion of a possible model for electronic cash system based on UML. We then discuss the implementation issue in java using the standard cryptographic packages.