Evaluation of P2P algorithms for probabilistic trust inference in a web of trust

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems and reputation systems. We study the use of peer-to-peer algorithms for finding trust paths and probabilistically assessing trust values in systems where trust is organised similar to the 'web of trust'. We do this through discrete event simulation of random as well as scale free trust networks based on flooding as well as selective search algorithms. Our main conclusion is that in many situations these algorithms can be seen as belonging to a single class of algorithms that perform equally, and only differ through (and are sensitive to) parameter choices. We will also see that flooding is the only applicable method if one stresses the requirement for finding all trust paths, and if networks are less connected.

Original languageEnglish
Title of host publicationComputer Performance Engineering - 5th European Performance Engineering Workshop, EPEW 2008, Proceedings
PublisherSpringer Verlag
Pages242-256
Number of pages15
ISBN (Print)3540874119, 9783540874119
DOIs
Publication statusPublished - 2008
Event5th European Performance Engineering Workshop, EPEW 2008 - Palma de Mallorca, Spain
Duration: 24 Sept 200825 Sept 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5261 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th European Performance Engineering Workshop, EPEW 2008
Country/TerritorySpain
CityPalma de Mallorca
Period24/09/0825/09/08

Keywords

  • Peer-to-peer
  • Trust inference
  • Trust paths
  • Web of trust

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Evaluation of P2P algorithms for probabilistic trust inference in a web of trust'. Together they form a unique fingerprint.

Cite this