Conference
Applying Secret Sharing Schemes to Service Reputation
Abstract
A successful result of choosing, invoking, integrating and composing services in a collaborative environment depends directly on locating reliable services with respect to their performances, histories, feedbacks from their customers, and generally their reputations. Nevertheless, lacking a secure mechanism to create countable reputation information may lead service providers to exaggerate their performances. We propose to apply Threshold …
Authors
Namin AS; Wei R; Shen W; Ghenniwa H
Volume
2
Pagination
pp. 696-703
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Publication Date
January 1, 2005
DOI
10.1109/cscwd.2005.194269
Name of conference
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005.