{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T07:04:07Z","timestamp":1765609447160},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"3-4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s10660-010-9064-y","type":"journal-article","created":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T18:23:37Z","timestamp":1283192617000},"page":"239-270","source":"Crossref","is-referenced-by-count":56,"title":["The design of a reliable reputation system"],"prefix":"10.1007","volume":"10","author":[{"given":"Gayatri","family":"Swamynathan","sequence":"first","affiliation":[]},{"given":"Kevin C.","family":"Almeroth","sequence":"additional","affiliation":[]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,31]]},"reference":[{"key":"9064_CR1","doi-asserted-by":"crossref","unstructured":"Aberer,\u00a0K., & Despotovic,\u00a0Z. (2001). Managing trust in a peer-2-peer information system. In Proceedings of CIKM.","DOI":"10.1145\/502585.502638"},{"key":"9064_CR2","doi-asserted-by":"crossref","unstructured":"Ahn, Y. Y., Han,\u00a0S., Kwak,\u00a0H., Moon,\u00a0S., & Jeong,\u00a0H. (2007). Analysis of topological characteristics of huge online social networking services. In Proceedings of world wide web (WWW) conference.","DOI":"10.1145\/1242572.1242685"},{"key":"9064_CR3","unstructured":"Artz,\u00a0D., & Gil,\u00a0Y. (2007). A\u00a0survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web, 5(2)."},{"key":"9064_CR4","doi-asserted-by":"crossref","unstructured":"Bhattacharjee,\u00a0R., & Goel,\u00a0A. (2005). Avoiding ballot stuffing in eBay-like reputation systems. In Proceedings of workshop on economics of peer-to-peer systems (P2PEcon).","DOI":"10.1145\/1080192.1080203"},{"key":"9064_CR5","unstructured":"Buchegger,\u00a0S., & Boudec, J. L. (2001). Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of Euromicro international conference on parallel, distributed and network-based computing (Euromicro-PDP)."},{"key":"9064_CR6","unstructured":"Buchegger,\u00a0S., & Boudec, J. L. (2004). A\u00a0robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of workshop on economics of peer-to-peer systems (P2PEcon)."},{"key":"9064_CR7","unstructured":"Burton,\u00a0K. (2002). Design of the openprivacy distributed reputation system. http:\/\/www.peerfear.org\/papers\/openprivacy-reputation.pdf ."},{"key":"9064_CR8","doi-asserted-by":"crossref","unstructured":"Buttyan,\u00a0L., & Hubaux, J. P. (2003). Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8(5).","DOI":"10.1023\/A:1025146013151"},{"key":"9064_CR9","doi-asserted-by":"crossref","unstructured":"Cheng,\u00a0A., & Friedman,\u00a0E. (2005). Sybilproof reputation mechanisms. In Proceedings of workshop on economics of peer-to-peer systems (P2PEcon).","DOI":"10.1145\/1080192.1080202"},{"key":"9064_CR10","doi-asserted-by":"crossref","unstructured":"Dagum,\u00a0C. (1980). The generation and distribution of income, the Lorenz curve and the Gini ratio. Economie Appliqu\u00e9e, 33.","DOI":"10.3406\/ecoap.1980.4290"},{"key":"9064_CR11","doi-asserted-by":"crossref","unstructured":"Damiani,\u00a0E., Di Vimercati, D. C., Paraboschi,\u00a0S., Samarati,\u00a0P., & Violante,\u00a0F. (2002). A\u00a0reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of ACM conference on computer and communications security (CCCS).","DOI":"10.1145\/586110.586138"},{"key":"9064_CR12","doi-asserted-by":"crossref","unstructured":"Dellarocas,\u00a0C. (2000). Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of ACM conference on electronic commerce (EC).","DOI":"10.1145\/352871.352889"},{"key":"9064_CR13","doi-asserted-by":"crossref","unstructured":"Dewan,\u00a0P., & Dasgupta,\u00a0P. (2004). Pride: peer-to-peer reputation infrastructure for decentralized environments. In Proceedings of world wide web (WWW) conference on alternate track papers and posters.","DOI":"10.1145\/1013367.1013535"},{"key":"9064_CR14","doi-asserted-by":"crossref","unstructured":"Dimitriou,\u00a0T., Karame,\u00a0G., & Christou,\u00a0I. (2007). Supertrust: a secure and efficient framework for handling trust in super-peer networks. In Proceedings of ACM symposium on principles of distributed computing (PODC).","DOI":"10.1145\/1281100.1281180"},{"key":"9064_CR15","unstructured":"Domingos,\u00a0P. (2005). Mining social networks for viral marketing. IEEE Intelligent Systems, 20(1)."},{"key":"9064_CR16","doi-asserted-by":"crossref","unstructured":"Douceur,\u00a0J. (2002). The Sybil attack. In Proceedings of international workshop on peer-to-peer systems (IPTPS).","DOI":"10.1007\/3-540-45748-8_24"},{"key":"9064_CR17","doi-asserted-by":"crossref","unstructured":"Feldman,\u00a0M., Lai,\u00a0K., Stoica,\u00a0I., & Chuang,\u00a0J. (2004). Robust incentive techniques for peer-to-peer networks. In Proceedings of ACM conference on electronic commerce (EC).","DOI":"10.1145\/988772.988788"},{"key":"9064_CR18","doi-asserted-by":"crossref","unstructured":"Fernandes,\u00a0A., Kotsovinos,\u00a0E., Ostring,\u00a0S., & Dragovic,\u00a0B. (2004). Pinocchio: incentives for honest participation in distributed trust management. In Proceedings of international conference on trust management (iTrust).","DOI":"10.1007\/978-3-540-24747-0_6"},{"key":"9064_CR19","doi-asserted-by":"crossref","unstructured":"Friedman,\u00a0E., & Resnick,\u00a0P. (2001). The social cost of cheap pseudonyms. Journal of Economics and Management Strategy, 10(2).","DOI":"10.1162\/105864001300122476"},{"key":"9064_CR20","unstructured":"Gilbert,\u00a0A., Abraham,\u00a0A., & Paprzycki,\u00a0M. (2004). A\u00a0system for ensuring data integrity in grid environments. In Proceedings of IEEE international conference on information technology: computers and communications (ITCC)."},{"key":"9064_CR21","unstructured":"Gnutella (2001). The Gnutella protocol specification v0.4."},{"key":"9064_CR22","doi-asserted-by":"crossref","unstructured":"Grandison,\u00a0T., & Sloman,\u00a0M. (2000). A\u00a0survey of trust in internet application. IEEE Communications Surveys and Tutorials, 4(4).","DOI":"10.1109\/COMST.2000.5340804"},{"key":"9064_CR23","doi-asserted-by":"crossref","unstructured":"Hasan,\u00a0O., Brunie,\u00a0L., Pierson, J. M., & Bertino,\u00a0E. (2009). Elimination of subjectivity from trust recommendation. In Proceedings of the IFIP international conference on trust management.","DOI":"10.1007\/978-3-642-02056-8_5"},{"key":"9064_CR24","doi-asserted-by":"crossref","unstructured":"Hogg,\u00a0T., & Adamic,\u00a0L. (2004). Enhancing reputation mechanisms via online social networks. In Proceedings of ACM conference on electronic commerce (EC).","DOI":"10.1145\/988772.988811"},{"key":"9064_CR25","doi-asserted-by":"crossref","unstructured":"Jensen,\u00a0C., Davis,\u00a0J., & Farnham,\u00a0S. (2002). Finding others online: reputation systems for social online spaces. In Proceedings of ACM SIGCHI.","DOI":"10.1145\/503376.503456"},{"key":"9064_CR26","unstructured":"Josang,\u00a0A., & Pope,\u00a0S. (2005). Semantic constraints for trust transitivity. In Proceedings of the Asia-Pacific conferences on conceptual modelling (APCCM)."},{"key":"9064_CR27","doi-asserted-by":"crossref","unstructured":"Josang,\u00a0A., Ismail,\u00a0R., & Boyd,\u00a0C. (2007). A\u00a0survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2).","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"9064_CR28","doi-asserted-by":"crossref","unstructured":"Kamvar, S. D., Schlosser, M. T., & Garcia-Molina,\u00a0H. (2003). The eigentrust algorithm for reputation management in P2P networks. In Proceedings of world wide web (WWW) conference.","DOI":"10.1145\/775152.775242"},{"key":"9064_CR29","doi-asserted-by":"crossref","unstructured":"Kerr,\u00a0R., & Cohen,\u00a0R. (2009). An experimental testbed for evaluation of trust and reputation systems. In Proceedings of the IFIP international conference on trust management.","DOI":"10.1007\/978-3-642-02056-8_16"},{"key":"9064_CR30","doi-asserted-by":"crossref","unstructured":"Kher,\u00a0V. & Kim,\u00a0Y. (2005). Securing distributed storage: challenges, techniques, and systems. In Proceedings of ACM international workshop on storage security and survivability (StorageSS).","DOI":"10.1145\/1103780.1103783"},{"key":"9064_CR31","unstructured":"Kollock,\u00a0P. (1999). The production of trust in online markets. Advances in Group Processes, 16."},{"key":"9064_CR32","doi-asserted-by":"crossref","unstructured":"Kumar,\u00a0R., Novak,\u00a0J., & Tomkins,\u00a0A. (2006). Structure and evolution of online social networks. In Proceedings of ACM internation conference on knowledge discovery and data mining.","DOI":"10.1145\/1150402.1150476"},{"key":"9064_CR33","unstructured":"Levien,\u00a0R. (2000) Advogato\u2019s trust metric. http:\/\/www.advogato.org\/trust-metric.html ."},{"key":"9064_CR34","doi-asserted-by":"crossref","unstructured":"Lian,\u00a0Q., et al. (2007). An empirical study of collusion behavior in the maze p2p file-sharing system. In Proceedings of ICDCS.","DOI":"10.1109\/ICDCS.2007.84"},{"key":"9064_CR35","doi-asserted-by":"crossref","unstructured":"Lorenz,\u00a0M. (1905). Methods for measuring the concentration of wealth. American Statistical Association, 9.","DOI":"10.2307\/2276207"},{"key":"9064_CR36","unstructured":"Marti,\u00a0S., & Garcia-Molina,\u00a0H. (2003). Identity crisis: anonymity vs. reputation in P2P systems. In Proceedings of P2P."},{"key":"9064_CR37","unstructured":"Marti,\u00a0S., & Garcia-Molina,\u00a0H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks: The International Journal of Computer and Telecommunications Networking, 50(4)."},{"key":"9064_CR38","doi-asserted-by":"crossref","unstructured":"Marti,\u00a0S., Giuli, T. J., Lai,\u00a0K., & Baker,\u00a0M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM MobiCom.","DOI":"10.1145\/345910.345955"},{"key":"9064_CR39","unstructured":"Mislove,\u00a0A., Gummadi,\u00a0K., & Druschel,\u00a0P. (2006). Exploiting social networks for Internet search. In Proceedings of ACM HotNets."},{"key":"9064_CR40","doi-asserted-by":"crossref","unstructured":"Ooi, B. C., Liau, CY, & Tan, K. L. (2003). Managing trust in peer-to-peer systems using reputation-based techniques. In Proceedings of the advances in web-age information management (AWAIM).","DOI":"10.1007\/978-3-540-45160-0_2"},{"key":"9064_CR41","unstructured":"Page,\u00a0L., Brin,\u00a0S., Motwani,\u00a0R., & Winograd,\u00a0T. (1998). The pagerank citation ranking: bringing order to the web (Tech. rep.). Stanford Digital Library Technologies Project."},{"key":"9064_CR42","doi-asserted-by":"crossref","unstructured":"Ratnasamy,\u00a0S., Francis,\u00a0P., Handley,\u00a0M., Karp,\u00a0R., & Schenker,\u00a0S. (2001). A\u00a0scalable content-addressable network. In Proceedings of ACM SIGCOMM.","DOI":"10.1145\/964723.383072"},{"key":"9064_CR43","unstructured":"Resnick,\u00a0P., & Zeckhauser,\u00a0R. (2001). Trust among strangers in internet transactions: empirical analysis of eBay\u2019s reputation system. Advances in Applied Microeconomics, 11."},{"key":"9064_CR44","doi-asserted-by":"crossref","unstructured":"Resnick,\u00a0P., Kuwabara,\u00a0K., Zeckhauser,\u00a0R., & Friedman,\u00a0E. (2000). Reputation systems. Communications of the ACM, 43(12).","DOI":"10.1145\/355112.355122"},{"key":"9064_CR45","doi-asserted-by":"crossref","unstructured":"Resnick,\u00a0P., Zeckhauser,\u00a0R., Swanson,\u00a0J., & Lockwood,\u00a0K. (2006). The value of reputation on eBay: a\u00a0controlled experiment. Experimental Economics, 9(2).","DOI":"10.1007\/s10683-006-4309-2"},{"key":"9064_CR46","doi-asserted-by":"crossref","unstructured":"Richardson,\u00a0M., & Domingos,\u00a0P. (2002). Mining knowledge-sharing sites for viral marketing. In Proceedings of ACM internation conference on knowledge discovery and data mining.","DOI":"10.1145\/775047.775057"},{"key":"9064_CR47","doi-asserted-by":"crossref","unstructured":"Ruohomaa,\u00a0S., Kutvonen,\u00a0L., & Koutrouli,\u00a0E. (2007). Reputation management survey. In Proceedings of IEEE international conference on availability, reliability and security (ARES).","DOI":"10.1109\/ARES.2007.123"},{"key":"9064_CR48","doi-asserted-by":"crossref","unstructured":"Srinivasan,\u00a0V., Nuggehalli,\u00a0P., Chiasserini,\u00a0C., & Rao,\u00a0R. (2003). Cooperation in wireless ad hoc networks. In Proceedings of IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2003.1208918"},{"key":"9064_CR49","doi-asserted-by":"crossref","unstructured":"Srivatsa,\u00a0M., Xiong,\u00a0L., & Liu,\u00a0L. (2005). Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of world wide web (WWW) conference.","DOI":"10.1145\/1060745.1060808"},{"key":"9064_CR50","doi-asserted-by":"crossref","unstructured":"Stoica,\u00a0I., Morris,\u00a0R., Karger,\u00a0D., Kaashoek, M. F., & Balakrishnan,\u00a0H. (2001). Chord: a\u00a0scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM.","DOI":"10.1145\/964723.383071"},{"key":"9064_CR51","unstructured":"Swamynathan,\u00a0G., Zhao,\u00a0B., & Almeroth,\u00a0K. (2006). Exploring the feasibility of proactive reputations. In Proceedings of international workshop on peer-to-peer systems (IPTPS)."},{"key":"9064_CR52","unstructured":"Swamynathan,\u00a0G., Zhao,\u00a0B., & Almeroth,\u00a0K. (2007). Exploring the feasibility of proactive reputations. Concurrency and Computation: Practice and Experience, Special Issue on Recent Advances in P2P Systems and Security, 20(2)."},{"key":"9064_CR53","doi-asserted-by":"crossref","unstructured":"Swamynathan,\u00a0G., Zhao,\u00a0B., Almeroth,\u00a0K., & Zheng,\u00a0H. (2007). Globally decoupled reputations for large distributed networks. Advances in Multimedia, 2007(1).","DOI":"10.1155\/2007\/92485"},{"key":"9064_CR54","doi-asserted-by":"crossref","unstructured":"Swamynathan,\u00a0G., Zhao,\u00a0B., Almeroth,\u00a0K., & Jammalamadaka, S. R. (2008). Towards reliable reputations for dynamic networked systems. In Proceedings of IEEE international symposium on reliable distributed systems (SRDS).","DOI":"10.1109\/SRDS.2008.31"},{"key":"9064_CR55","unstructured":"Symantec (2000). Vbs.Gnutella worm. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/vbs.gnutella.html ."},{"key":"9064_CR56","unstructured":"Walsh,\u00a0K., & Sirer, E. G. (2006). Experience with an object reputation system for peer-to-peer filesharing. In Proceedings of Usenix networked systems design and implementation (NSDI)."},{"key":"9064_CR57","doi-asserted-by":"crossref","unstructured":"Xiong,\u00a0L., & Liu,\u00a0L. (2004). Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(7).","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"9064_CR58","unstructured":"Yang,\u00a0M., Chen,\u00a0H., Zhao, B. Y., Dai,\u00a0Y., & Zhang,\u00a0Z. (2004). Deployment of a large-scale peer-to-peer social network. In Proceedings of Usenix workshop on real, large distributed systems (WORLDS)."},{"key":"9064_CR59","doi-asserted-by":"crossref","unstructured":"Yu,\u00a0H., Kaminsky,\u00a0M., Gibbons, P. B., & Flaxman,\u00a0A. (2006). Sybilguard: defending against Sybil attacks via social networks. In Proceedings of ACM SIGCOMM.","DOI":"10.1145\/1151659.1159945"},{"key":"9064_CR60","doi-asserted-by":"crossref","unstructured":"Yu,\u00a0H., Gibbons, P. B., Kaminsky,\u00a0M., & Xiao,\u00a0F. (2008). Sybillimit: a\u00a0near-optimal social network defense against Sybil attacks. In IEEE symposium on security and privacy.","DOI":"10.1109\/SP.2008.13"},{"key":"9064_CR61","doi-asserted-by":"crossref","unstructured":"Zacharia,\u00a0G., Moukas,\u00a0A., & Maes,\u00a0P. (2000). Collaborative reputation mechanisms for electronic marketplaces. Decision Support Systems, 29(4).","DOI":"10.1016\/S0167-9236(00)00084-1"},{"key":"9064_CR62","doi-asserted-by":"crossref","unstructured":"Zhang,\u00a0H., Goel,\u00a0A., Govindan,\u00a0R., Mason,\u00a0K., & Roy, B. V. (2004). Making eigenvector-based reputation systems robust to collusion. In Proceedings of the international workshop on algorithms and models for the web-grap (WAW).","DOI":"10.1007\/978-3-540-30216-2_8"},{"key":"9064_CR63","doi-asserted-by":"crossref","unstructured":"Zhao, B. Y., Huang,\u00a0L., Rhea, S. C., Stribling,\u00a0J., Joseph, A. D., & Kubiatowicz, J. D. (2004). Tapestry: a global-scale overlay for rapid service deployment. IEEE Journal on Selected Areas in Communications, 22(1).","DOI":"10.1109\/JSAC.2003.818784"},{"key":"9064_CR64","doi-asserted-by":"crossref","unstructured":"Zhong,\u00a0S., Chen,\u00a0J., & Yang, Y. R. (2003). Sprite: a\u00a0simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"9064_CR65","doi-asserted-by":"crossref","unstructured":"Zhou,\u00a0R., & Hwang,\u00a0K. (2007). Powertrust: a\u00a0robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems (TPDS), 18(4).","DOI":"10.1109\/TPDS.2007.1021"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s10660-010-9064-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T23:37:12Z","timestamp":1711755432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-010-9064-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,31]]},"references-count":65,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["9064"],"URL":"https:\/\/doi.org\/10.1007\/s10660-010-9064-y","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,31]]}}}