{"title":"A Model for a Testbed for Evaluating Reputation Systems","authors":"P. Chandrasekaran, B. Esfandiari","doi":"10.1109/TrustCom.2011.40","DOIUrl":null,"url":null,"abstract":"The lack of an universal model in reputation systems makes it challenging to evaluate and compare them against attacks. While there are test beds that provide application domain specific metrics to evaluate reputation systems, in this paper we propose a model for a test bed that is application agnostic. It is a workflow of graph transformations that is generic enough to accommodate a number of reputation systems in existing literature. In doing so, we note that these reputation systems work at different stages in the workflow and as a result, a byproduct of this model is a new classification method. We also describe various attacks using our model.","PeriodicalId":289926,"journal":{"name":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom.2011.40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The lack of an universal model in reputation systems makes it challenging to evaluate and compare them against attacks. While there are test beds that provide application domain specific metrics to evaluate reputation systems, in this paper we propose a model for a test bed that is application agnostic. It is a workflow of graph transformations that is generic enough to accommodate a number of reputation systems in existing literature. In doing so, we note that these reputation systems work at different stages in the workflow and as a result, a byproduct of this model is a new classification method. We also describe various attacks using our model.