Data Mining Application: Attack Resistant Trust Metrics
Exploring the Applications of Attack Resistant Trust Metrics
Keywords:
data mining, trust metrics, scalar assumption, group assumption, quantitative framework, attack resistance, optimum, theoretical upper bounds, real world deployment, Advogato website, distributed name server, metadata verification, peer-to-peer networks, music sharing systems, spam resistant e-mail deliveryAbstract
This Dissertation characterizes the space of trust metrics, under both the scalar assumption where each assertion is evaluated independently, and the group assumption where a group of assertions are evaluated in tandem. We present a quantitative framework for evaluating the attack resistance of trust metrics,and give examples of trust metrics that are within a small factor of optimum compared to theoretical upper bounds. We discuss experiences with a real world deployment of a group trust metric, the Advogato website. Finally, we explore possible applications of attack resistant trust metrics, including using it as to build a distributed name server, verifying metadata in peer-to-peer networks such as music sharing systems, and a proposal for highly spam resistant e-mail delivery.Downloads
Download data is not yet available.
Published
2012-02-01
Issue
Section
Articles