Home
Scholarly Works
Applying Secret Sharing Schemes to Service...
Conference

Applying Secret Sharing Schemes to Service Reputation

Abstract

A successful result of choosing, invoking, integrating and composing services in a collaborative environment depends directly on locating reliable services with respect to their performances, histories, feedbacks from their customers, and generally their reputations. Nevertheless, lacking a secure mechanism to create countable reputation information may lead service providers to exaggerate their performances. We propose to apply Threshold Schemes under the context of service reputation towards providing an unconditionally secure “reputation” credits and systems for services and their providers. We argue that applying such a secure mechanism for reputation of services is not forgeable. As a result, any service requester will be able to rely on valuable reputation information and choose the most reliable services with confidence.

Authors

Namin AS; Wei R; Shen W; Ghenniwa H

Volume

2

Pagination

pp. 696-703

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Publication Date

January 1, 2005

DOI

10.1109/cscwd.2005.194269

Name of conference

Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005.
View published work (Non-McMaster Users)

Contact the Experts team