Abstract
The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jacob L. Moreno and H. H. Jennings. Who shall survive?: A New Appproach to the Problem of Human Interrelations. Nervous and Mental Disease Publishing Co., 1934.
Thomas Beth, Malte Borcherding, and Birgit Klein. Valuation of trust in open networks. Lecture Notes in Computer Science, 875:3–18, 1994.
Ueli Maurer. Modelling a public-key infrastreucture. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Computer Security-ESORICS ’96, number 1146 in LNCS, Springer Verlag, 1996.
Michael Reiter and Stuart Stubblebine. Toward acceptable metrics of authentication. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997.
Neal McBurnett. Pgp Web of trust statistics, 1996.
Anas Tarah and Christian Huitema. Associating metrics to certification paths. In European Symposium on Research in Computer Security (ESORICS), pp. 175–192, 1992.
Raph Levien and Alexander Aiken. Attack resistant trust metrics for public key certification. In 7th USENIX Security Symposium, San Antonio, Texas, January 1998.
Micheal Reiter and Stuart Stubblebine. Path independence for authentication in large-scale systems. In Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997.
John R. Douceur. the Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, March 2002.
Rocks in My Dryer. Dog days of summer bloggy giveaway, July 2007.
danah m. boyd and Nicole B. Ellison. Social network sites: Definition, histroy, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The PageRank citation ranking: Bringing order to the Web. Technical report, Stanford University, 1998.
Jon M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604–632, 1999.
Sepandar D. Kamcar, Mario T. Schlosser, and Hector Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks, 2003.
Amy N. Langville and Carl D. Meyer. Google’s PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, 2006.
Amy N. Langville and Carl D. Meyer. Deeper inside PageRank. Internet Mathematics, 1: 335–400, 2004.
Monica Bianchini, Marco Gori, and Franco Scarelli. Inside PageRank. Lecture Notes in Computer Technology, 5(1):92–128, February 2005.
Albert-László Barábasi. Linked: How Everything is Connected to Everything Else and What It Means. Perseus Books, 2002.
Matt Cutts, Ryan Moulton, and Kendra Carattini. A quick word about Googlebombs. Official GoogleWebmaster Central Blog, January 2007.
Jennifer Ann Golbeck. Computing and applying trust in Web-based social networks. PhD thesis, University of Maryland at College Park, College park, MD, USA, 2005. Chair-James Hendler.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Levien, R. (2009). Attack-Resistant Trust Metrics. In: Golbeck, J. (eds) Computing with Social Trust. Human–Computer Interaction Series. Springer, London. https://doi.org/10.1007/978-1-84800-356-9_5
Download citation
DOI: https://doi.org/10.1007/978-1-84800-356-9_5
Publisher Name: Springer, London
Print ISBN: 978-1-84800-355-2
Online ISBN: 978-1-84800-356-9
eBook Packages: Computer ScienceComputer Science (R0)