{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:30Z","timestamp":1761401970455,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232819","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Reputation-Based Security System For Edge Computing"],"prefix":"10.1145","author":[{"given":"Francis N.","family":"Nwebonyi","sequence":"first","affiliation":[{"name":"University of Porto &amp; CRACS\/INESC-TEC, Porto, Portugal"}]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[{"name":"University of Porto &amp; CRACS\/INESC-TEC, Porto, Portugal"}]},{"given":"Manuel E.","family":"Correia","sequence":"additional","affiliation":[{"name":"University of Porto &amp; CRACS\/INESC-TEC, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.07.009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.07.001"},{"key":"e_1_3_2_1_3_1","first-page":"528","article-title":"Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems","volume":"57","author":"Aringhieri Roberto","year":"2006","unstructured":"Roberto Aringhieri , Ernesto Damiani , Di Vimercati , Sabine De Capitani , Stefano Paraboschi , and Pierangelo Samarati . 2006 . Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems . Journal of the Association for Information Science and Technology 57 , 4 (2006), 528 -- 537 . Roberto Aringhieri, Ernesto Damiani, Di Vimercati, Sabine De Capitani, Stefano Paraboschi, and Pierangelo Samarati. 2006. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. Journal of the Association for Information Science and Technology 57, 4 (2006), 528--537.","journal-title":"Journal of the Association for Information Science and Technology"},{"volume-title":"Smart Cloud Networks & Systems (SCNS)","author":"Bozic Nikola","key":"e_1_3_2_1_4_1","unstructured":"Nikola Bozic , Guy Pujolle , and Stefano Secci . 2016. A tutorial on blockchain and applications to secure network control-planes . In Smart Cloud Networks & Systems (SCNS) . IEEE , 1--8. Nikola Bozic, Guy Pujolle, and Stefano Secci. 2016. A tutorial on blockchain and applications to secure network control-planes. In Smart Cloud Networks & Systems (SCNS). IEEE, 1--8."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2015.7328527"},{"key":"e_1_3_2_1_6_1","volume-title":"Private communication through a network of trusted connections: The dark freenet. Network","author":"Clarke Ian","year":"2010","unstructured":"Ian Clarke , Oskar Sandberg , Matthew Toseland , and Vilhelm Verendel . 2010. Private communication through a network of trusted connections: The dark freenet. Network ( 2010 ). Ian Clarke, Oskar Sandberg, Matthew Toseland, and Vilhelm Verendel. 2010. Private communication through a network of trusted connections: The dark freenet. Network (2010)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.94"},{"key":"e_1_3_2_1_10_1","unstructured":"Tuva Selstad Dybedokken. 2017. Trust Management in Fog Computing. Master's thesis. NTNU. http:\/\/hdl.handle.net\/11250\/2454375  Tuva Selstad Dybedokken. 2017. Trust Management in Fog Computing. Master's thesis. NTNU. http:\/\/hdl.handle.net\/11250\/2454375"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2010.20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 15th bled electronic commerce conference","volume":"5","author":"Josang Audun","year":"2002","unstructured":"Audun Josang and Roslan Ismail . 2002 . The beta reputation system . In Proceedings of the 15th bled electronic commerce conference , Vol. 5 . 2502--2511. Audun Josang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th bled electronic commerce conference, Vol. 5. 2502--2511."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2011.86"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284506"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.3"},{"volume-title":"Peer-to-Peer: Harnessing the power of disruptive technologies. \" O'Reilly Media","author":"Oram Andy","key":"e_1_3_2_1_23_1","unstructured":"Andy Oram . 2001. Peer-to-Peer: Harnessing the power of disruptive technologies. \" O'Reilly Media , Inc .\". Andy Oram. 2001. Peer-to-Peer: Harnessing the power of disruptive technologies. \" O'Reilly Media, Inc.\"."},{"volume-title":"Privacy and Security for Cloud Computing","author":"Pearson Siani","key":"e_1_3_2_1_24_1","unstructured":"Siani Pearson . 2013. Privacy , security and trust in cloud computing . In Privacy and Security for Cloud Computing . Springer , 3--42. Siani Pearson. 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing. Springer, 3--42."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.010"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864001300122476"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152360.3152361"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Securing BitTorrent using a new reputation-based trust management system","volume":"6","author":"Sarjaz Behrooz Shafiee","year":"2013","unstructured":"Behrooz Shafiee Sarjaz and Maghsoud Abbaspour . 2013 . Securing BitTorrent using a new reputation-based trust management system . Peer-to-Peer Networking and Applications 6 , 1 (March 2013), 86--100. Behrooz Shafiee Sarjaz and Maghsoud Abbaspour. 2013. Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications 6, 1 (March 2013), 86--100.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"e_1_3_2_1_30_1","volume-title":"Trust and Clouds. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 1717--1728","author":"Schooler Eve M","year":"2017","unstructured":"Eve M Schooler , David Zage , Jeff Sedayao , Hassnaa Moustafa , Andrew Brown , and Moreno Ambrosin . 2017 . An Architectural Vision for a Data-Centric IoT: Rethinking Things , Trust and Clouds. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 1717--1728 . Eve M Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, and Moreno Ambrosin. 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 1717--1728."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500119RP"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3069383.3069388"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.14"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/942805.943808"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04409-0_30"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987464"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077489.2077491"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"e_1_3_2_1_39_1","volume-title":"Neighbor similarity trust against sybil attack in P2P e-commerce","author":"Wang Guojun","year":"2015","unstructured":"Guojun Wang , Felix Musau , Song Guo , and Muhammad Bashir Abdullahi . 2015. Neighbor similarity trust against sybil attack in P2P e-commerce . IEEE transactions on parallel and distributed systems 26, 3 ( 2015 ), 824--833. Guojun Wang, Felix Musau, Song Guo, and Muhammad Bashir Abdullahi. 2015. Neighbor similarity trust against sybil attack in P2P e-commerce. IEEE transactions on parallel and distributed systems 26, 3 (2015), 824--833."},{"volume-title":"Readings in Fuzzy Sets for Intelligent Systems","author":"Yager Ronald R","key":"e_1_3_2_1_40_1","unstructured":"Ronald R Yager . 1993. On ordered weighted averaging aggregation operators in multicriteria decisionmaking . In Readings in Fuzzy Sets for Intelligent Systems . Elsevier , 80--87. Ronald R Yager. 1993. On ordered weighted averaging aggregation operators in multicriteria decisionmaking. In Readings in Fuzzy Sets for Intelligent Systems. Elsevier, 80--87."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":38,"alternative-id":["10.1145\/3230833.3232819","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232819","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}