Content uploaded by Xinxin Fan
Author content
All content in this area was uploaded by Xinxin Fan on May 22, 2017
Content may be subject to copyright.
8th International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing , Collaboratecom Pittsburgh, PA, United States, October
A. EigenTrust Overview
Threat Models and Trust based Service Selection Methods
Threat Model A.
Threat Model
Threat Model C.
Threat Model D.
Threat Model
Threat Model
Deterministic v.s. Probabilistic Service Selection.
Vulnebilities Inherent in EigenTrust
Local ust Rating.
Feedback Credibility.
Utilizing Circle of Friends.
0
9
.
rtDFP=O%
-
�ig&nTrustDFP=10%
08
E>genTrustDFP=2O%
_Eig&nTrustDFP=3Q%
05
04
Percentageofmalbouspeers(%)
A. Attack Resilient Local Trust Computation
Aggregating Local Trust Values Using Feedback Credibili
Pbabilistic Trust Ppagation thugh Circle of Friends
Combining local trust and feedback similarity.
Threshold-based Probabilistic Trust Propagation.
[
_
_
Algorithm Complexity Analysis.
A. Pameter Conguration
Eectiveness of Feedback Credibili
Eectiveness of Circle of Friends