Skip to main content

Attack-Resistant Trust Metrics

  • Chapter

Part of the book series: Human–Computer Interaction Series ((HCIS))

Abstract

The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jacob L. Moreno and H. H. Jennings. Who shall survive?: A New Appproach to the Problem of Human Interrelations. Nervous and Mental Disease Publishing Co., 1934.

    Google Scholar 

  2. Thomas Beth, Malte Borcherding, and Birgit Klein. Valuation of trust in open networks. Lecture Notes in Computer Science, 875:3–18, 1994.

    Google Scholar 

  3. Ueli Maurer. Modelling a public-key infrastreucture. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Computer Security-ESORICS ’96, number 1146 in LNCS, Springer Verlag, 1996.

    Google Scholar 

  4. Michael Reiter and Stuart Stubblebine. Toward acceptable metrics of authentication. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997.

    Google Scholar 

  5. Neal McBurnett. Pgp Web of trust statistics, 1996.

    Google Scholar 

  6. Anas Tarah and Christian Huitema. Associating metrics to certification paths. In European Symposium on Research in Computer Security (ESORICS), pp. 175–192, 1992.

    Google Scholar 

  7. Raph Levien and Alexander Aiken. Attack resistant trust metrics for public key certification. In 7th USENIX Security Symposium, San Antonio, Texas, January 1998.

    Google Scholar 

  8. Micheal Reiter and Stuart Stubblebine. Path independence for authentication in large-scale systems. In Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997.

    Google Scholar 

  9. John R. Douceur. the Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, March 2002.

    Google Scholar 

  10. Rocks in My Dryer. Dog days of summer bloggy giveaway, July 2007.

    Google Scholar 

  11. danah m. boyd and Nicole B. Ellison. Social network sites: Definition, histroy, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.

    Google Scholar 

  12. Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The PageRank citation ranking: Bringing order to the Web. Technical report, Stanford University, 1998.

    Google Scholar 

  13. Jon M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604–632, 1999.

    Article  MATH  MathSciNet  Google Scholar 

  14. Sepandar D. Kamcar, Mario T. Schlosser, and Hector Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks, 2003.

    Google Scholar 

  15. Amy N. Langville and Carl D. Meyer. Google’s PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, 2006.

    Google Scholar 

  16. Amy N. Langville and Carl D. Meyer. Deeper inside PageRank. Internet Mathematics, 1: 335–400, 2004.

    MATH  MathSciNet  Google Scholar 

  17. Monica Bianchini, Marco Gori, and Franco Scarelli. Inside PageRank. Lecture Notes in Computer Technology, 5(1):92–128, February 2005.

    Google Scholar 

  18. Albert-László Barábasi. Linked: How Everything is Connected to Everything Else and What It Means. Perseus Books, 2002.

    Google Scholar 

  19. Matt Cutts, Ryan Moulton, and Kendra Carattini. A quick word about Googlebombs. Official GoogleWebmaster Central Blog, January 2007.

    Google Scholar 

  20. Jennifer Ann Golbeck. Computing and applying trust in Web-based social networks. PhD thesis, University of Maryland at College Park, College park, MD, USA, 2005. Chair-James Hendler.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Levien, R. (2009). Attack-Resistant Trust Metrics. In: Golbeck, J. (eds) Computing with Social Trust. Human–Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-84800-356-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-84800-356-9_5

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84800-355-2

  • Online ISBN: 978-1-84800-356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics