{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:13:46Z","timestamp":1654100026762},"reference-count":24,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1,1]]},"abstract":"<p>P2P e-commerce applications have lower operational costs and inherently more scalable than conventional client-server online trading. Community Trust Stores (CTS) provide reliable and secure storage services for peers involved in P2P e-trading by storing trust data for the peers. Freely available cloud services can host the Community Trust Store and provide 24\/7 availability to participating trading peers avoiding the need to pay for commercial trusted third party services. However, the community store must provide a certain level of assurance and support suitable security measures in order to support e-trading within the P2P application. It must also support community management of the store including jointly signed trading contract. The Community Trust Stores also stores reputation report and trading outcomes as future reference for others. New membership for P2P e-commerce group must be sponsored by current members.<\/p>","DOI":"10.4018\/jeei.2013010101","type":"journal-article","created":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T18:24:24Z","timestamp":1377195864000},"page":"1-15","source":"Crossref","is-referenced-by-count":0,"title":["Secure Community Trust Stores for Peer-to-Peer e-Commerce Applications Using Cloud Services"],"prefix":"10.4018","volume":"4","author":[{"given":"Ahmad H.","family":"Fauzi","sequence":"first","affiliation":[{"name":"School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh, UK"}]},{"given":"Hamish","family":"Taylor","sequence":"additional","affiliation":[{"name":"School of Mathematical and Computer Sciences, Heriot-Watt University, Edinburgh, UK"}]}],"member":"2432","reference":[{"key":"jeei.2013010101-0","doi-asserted-by":"crossref","unstructured":"Anagnostakis, K. G., & Greenwald, M. B. (2004). Exchange-based incentive mechanisms for peer-to-peer file sharing. In Proceedings of the 24th International Conference on Distributed Computing Systems (pp. 524-533). Hachioji, Tokyo: IEEE Computer Society.","DOI":"10.1109\/ICDCS.2004.1281619"},{"key":"jeei.2013010101-1","doi-asserted-by":"crossref","unstructured":"Bocek, T., Peric, D., Hecht, F. V., Hausheer, D., & Stiller, B. (2009). PeerVote: A decentralized voting mechanism for P2P collaboration systems (pp.56-69). Berlin, Heidelberg, Germany: Springer.","DOI":"10.1007\/978-3-642-02627-0_5"},{"key":"jeei.2013010101-2","unstructured":"Cohen, B. (2003). Incentives build robustness in BitTorrent. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems."},{"key":"jeei.2013010101-3","doi-asserted-by":"crossref","unstructured":"Fang, H., Zhang, J., Sensoy, M., & Thalmann, N. (2011). A reputation mechanism for virtual reality-five-sense oriented feedback provision and subjectivity alignment. In Proceedings of the IEEE 10th International Conference of Trust, Security and Privacy in Computing and Communications (Trust-Com) (pp. 312-319). Washington, DC: IEEE Computer Society.","DOI":"10.1109\/TrustCom.2011.42"},{"key":"jeei.2013010101-4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25327-0_37"},{"key":"jeei.2013010101-5","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120723"},{"key":"jeei.2013010101-6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.872882"},{"key":"jeei.2013010101-7","author":"P.Fisher","year":"2010","journal-title":"Cloud computing: Assessing Azure, Amazon EC2, Google App engine and Hadoop for IT decision making and developer career growth"},{"key":"jeei.2013010101-8","first-page":"75","volume":"Vol. 2232","author":"P.Golle","year":"2001","journal-title":"Incentives for sharing in peer-to-peer networks. Electronic commerce"},{"key":"jeei.2013010101-9","doi-asserted-by":"publisher","DOI":"10.1111\/j.1530-9134.2006.00103.x"},{"key":"jeei.2013010101-10","author":"M.Howard","year":"2001","journal-title":"Writing security code"},{"key":"jeei.2013010101-11","unstructured":"ITU-T. (1991). Recommendation X.800: Security architecture for open systems for CCITT applications. Retrieved December 20, 2012, from http:\/\/www.itu.int\/rec\/T-REC-X.800\/en"},{"key":"jeei.2013010101-12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.33"},{"key":"jeei.2013010101-13","unstructured":"Khosravifar, B., Gomrokchi, M., Bentahar, J., & Thiran, P. (2009). Maintenance-based trust for multi-agent systems. In Proceedings of the 8th AAMAS (vol. 2, pp.1017-1024). Richland, SC: IFAAMAS."},{"key":"jeei.2013010101-14","doi-asserted-by":"crossref","unstructured":"Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., & Geels, D. \u2026 Zhao, B. (2000). Oceanstore: An architecture for global-scale persistent storage. In Proceedings of the SIG-PLAN Not (vol. 35, pp. 190-201). New York, NY: ACM.","DOI":"10.1145\/356989.357007"},{"key":"jeei.2013010101-15","doi-asserted-by":"crossref","unstructured":"Kudtarkar, A. M., & Umamaheswari, S. (2009). Avoiding white washing in P2P networks. In Proceedings of the First International Conference on Communication Systems and Networks (pp. 115-118). IEEE Press.","DOI":"10.1109\/COMSNETS.2009.4808847"},{"key":"jeei.2013010101-16","unstructured":"Landers, M., Zhang, H., & Tan, K. L. (2004). Peerstore: Better performance by relaxing in peer-to-peer backup. In Proceedings of the Fourth International Conference on Peer-to-Peer Computing (pp. 72-79). Washington, DC: IEEE Computer Society."},{"key":"jeei.2013010101-17","unstructured":"Regan, K., Poupart, P., & Cohen, R. (2006). Bayesian reputation modeling in e-marketplaces sensitive to subjecthity, deception and change. In Proceedings of the 21st National Conference on Artificial Intelligence (Vol. 2, pp. 1206-1212). Boston, MA: AAAI Press."},{"key":"jeei.2013010101-18","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"jeei.2013010101-19","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-5952-x"},{"key":"jeei.2013010101-20","doi-asserted-by":"crossref","unstructured":"Vassileva, J. (2003). Motivating participation in peer to peer communities. Engineering Societies in the Agents World III (LNCS 2577, pp. 18-23). Berlin, Heidelberg, Germany: Springer.","DOI":"10.1007\/3-540-39173-8_11"},{"key":"jeei.2013010101-21","doi-asserted-by":"crossref","unstructured":"Zghaibeh, M., & Anagnostakis, K. G. (2007). On the impact of P2P incentive mechanisms on userbehavior. In Proceedings of the NetEcon+IBC (pp.123). San Diego, CA: ACM.","DOI":"10.2139\/ssrn.941168"},{"key":"jeei.2013010101-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.03.001"},{"key":"jeei.2013010101-23","author":"P. R.Zimmermann","year":"1995","journal-title":"The official PGP user's guide"}],"container-title":["International Journal of E-Entrepreneurship and Innovation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=81260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:31:26Z","timestamp":1654097486000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jeei.2013010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,1,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jeei.2013010101","relation":{},"ISSN":["1947-8585","1947-8593"],"issn-type":[{"value":"1947-8585","type":"print"},{"value":"1947-8593","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,1]]}}}