Integrity in Open Collaborative Authoring Systems

  • Christian Damsgaard Jensen
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Open collaborative authoring systems have become increasingly popular within the past decade. The benefits of such systems is best demonstrated by the Wiki and some of the tremendously popular applications build on Wiki technology, in particular the Wikipedia, which is a free encyclopaedia collaboratively edited by Internet users with a minimum of administration.

One of the most serious problems that have emerged in open collaborative authoring systems relates to the quality, especially completeness and correctness of information. Inaccuracies in the Wikipedia have been rumoured to cause students to fail courses, innocent people have been associated with the killing of John F. Kennedy, etc. Improving the correctness, completeness and integrity of information in collaboratively authored documents is therefore of vital importance to the continued success of such systems. In this paper we propose an integrity mechanism for open collaborative authoring systems based on a combination of classic integrity mechanisms from computer security and reputation systems. While the mechanism provides a reputation based assessment of the trustworthiness of the information in a document, the primary purpose is to prevent untrustworthy authors from compromising the integrity of the document.


Integrity Mechanism Trust Management Reputation System Integrity Level High Integrity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    What is Wiki. http://www., visited 28 December 2006
  2. 2.
    Wikipedia, the free encyclopedia., visited 28 December 2006
  3. 3.
    John Seigenthaler (2005) A false Wikipedia’ biography’. Editorial in USA TODAY, 29 November 2005Google Scholar
  4. 4.
    K. J. Biba (1977) Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, The MITRE Corporation, Bedford, Massachusetts, U.S.A.Google Scholar
  5. 5.
    Timothy Fraser (2000) LOMAC: LowWater-Mark Integrity Protection for COTS Environments. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, U.S.A.Google Scholar
  6. 6.
    Amazon website., visited 28 December 2006
  7. 7.
    Pierpaolo Dondio, Stephen Barrett, Stefan Weber and Jean-Marc Seigneur (2006) Extracting Trust from Domain Analysis: a Case Study on Wikipedia Project. In Proceedings of the 3rd International Conference on Autonomic and Trusted Computing, IEEE, 2006Google Scholar
  8. 8.
    Ilya Zaihrayeu, Paulo Pinheiro da Silva and Deborah L. McGuinness (2005) IWTrust: Improving User Trust in Answers from the Web. In Proceedings of 3rd International Conference on Trust Management, Rocquencourt, France, 2005Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Christian Damsgaard Jensen
    • 1
  1. 1.Informatics and Mathematical ModellingTechnical University of DenmarkDenmark

Personalised recommendations