A New Security Trust Model for Peer-to-Peer E-commerce

Slides:



Advertisements
Similar presentations
Measuring Department Wide Staff Satisfaction at Queen’s University Canadian National Higher Education Information Technology Conference -- June 2003 Trish.
Advertisements

1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
Academic Advising Cathy Sanders Director of Assessment and Faculty Governance UNC Charlotte Office of Academic Affairs.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Statement on Auditing Standards (SAS) 112 Communicating Internal Control Related Matters Identified in an Audit.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Peer Consultation Chapter 5. Peer Coaching Reciprocal coaching can enhance relationships of faculty as they work to gain mastery of a model of instruction.
1 A Collaboration Scheme for Making Peer-to-Peer Anonymous Routing Resilient Authors: X. Wang and J. Luo Source: 12th International Conference on Computer.
THE AUDITOR'S RESPONSIBILITIES RELATING TO FRAUD
Introduction. What do they have in common? CASA Peer Review California Association of State Auditors (CASA) California Association of State Auditors.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Presented at CLEAR’s 23rd Annual Conference Toronto, Ontario September, 2003 Accountability and Effectiveness: Maintaining Security at Test Centers Cynthia.
Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.
Proposal for Term Project Operating Systems, Fall 2012 J. H. Wang Nov. 13, 2012.
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
1 Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme Authors: C. Lin and R. C. Roberto Source: IEEE Communications.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
New Business Overall Satisfaction Ratings Rating Scale = Extremely Satisfied 6 = Very Satisfied 5 = Satisfied 4 = Neither Satisf. nor Dissatisfied.
1 Computer-assisted learning for mathematical problem solving Source: Computers and Education, Vol.46, February, 2006, pp Author: Chang, Kuo-En;
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
1 Adaptive Data Hiding in Palette images by Color Ordering and Mapping With Security Protection Authors: Chih-Hsuan Tzeng, Zhi-Fang Yang, and Wen-Hsiang.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
1 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks Authors: Xiaowei Chen, Kaiyong Zhao, and Xiaowen Chu Source: Autonomic and Trusted.
Trusted P2P Transactions with Fuzzy Reputation Aggregation Authors: S. song, K. Hwang, and R. Zhou University of Southern California Yu-Kwong Kwok University.
1 The design and application of a web-based self- and peer- assessment system Authors: Sung, Yao-Ting; Chang, Kuo-En; Chiou, Shen-Kuan; Hou, Huei-Tse Source:
1 DCMP: A Distributed Cycle Minimization Protocol for Peer- to-Peer Networks Authors: Zhenzhou Zhu, Panos Kalnis and Spiridon Bakiras Source: IEEE Transactions.
1 Can We Trust the Bond Raters? MA0N0203 Stan Hu Focus on Ethics.
Proposal Pollution prevention in the P2P file sharing system Presenter: Elaine.
1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer.
Cloud Multi-domain Access Control Model Based on Role and Trust-degree Lixia Xie Chong Wang School of Computer Science and Technology Civil Aviation University.
Fuzzy data mining for interesting generalized association rules Source : Fuzzy Sets and Systems ; Vol.138, No. 2, 2003, pp Author : Tzung-Pei,
Campus Curricula Committee Report 24 March 2016 l CCC Meetings »1 March 2016 »5 April 2016 (upcoming) l Committee Activity »2 Degree change requests (DC.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
ПЕЧЕНЬ 9. Закладка печени в период эмбрионального развития.
BY JOE WHEATLEY. OVERVIEW Introduction Factors that influence consumers trust Internet Fraud Survey results Conclusion References Google Images.
SPEECHES, MEETINGS & NEWS CONFERENCES COMM 260W – FA13.
BUS 210 Week 8 CheckPoint IT Applications Presentation Check this A+ tutorial guideline at CheckPoint-IT-Applications-Presentation.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Introduction Intro Problem Materials Hypothesis Procedure Results
Outline 01 Introduction 04 The Architecture of Khorramshahr 02 Problem Statement 05 Performance Evaluation 03 Preliminaries of The Used Filters 06 Conclustion.
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Presentation Title for the 7aese Conference
Chapter 9 Control, security and audit
Surveillance. Public Health Approach Surveillance What is the Problem ? Problem Risk Factor Identification : What Is the Cause ? Intervention Evaluation.
Edward Forshaw Manager, Insurance International Issues
The Effects of Poster Format on Reading Time
دانشیار دانشکده دندانپزشکی دانشگاه علوم پزشکی شهید صدوقی یزد
Fuzzy Support Vector Machines
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
بسم الله الرحمن الرحیم.
The Effects of Poster Format on Reading Time
Improved Visual Secret Sharing Scheme for QR Code Applications
ELECTRONIC PAYMENT SYSTEM.
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.
Improved joint reversible data hiding in encrypted images
Jeremy M. Berg Editor-in-Chief, Science family of journals
Sourse: IEEE Transactions on Circuits and Systems for Video Technology
Evaluation.
Digital Watermarking for Image Authentication with Localization
Botnet Detection by Monitoring Group Activities in DNS Traffic
Title of The Study Authors & Affiliations
Using Association Rules as Texture features
Presentation transcript:

A New Security Trust Model for Peer-to-Peer E-commerce Authors: Y. Wang, Y. L. Zhao, and F. Hou Source: International Conference on Management of e-Commerce and e-Government, pp. 399-402, 2008 Speaker: Shu-Fen Chiou (邱淑芬)

Introduction E-commerce environment Risks C2C Anonymity Dispersion j E-commerce environment C2C Anonymity Dispersion Risks Selfishness Anonymity of peers Arbitrary of identification Etc..

Trust model Direct trust value Si(j): satisfication procedure First transaction success: 0 First transaction failure: -1 Direct trust value Si(j): satisfication procedure TSij: ratio of each transaction Nij: number of transactions Tij: time factor of transcations ACi: vote accurate factor

Trust model Voting value of k to I Nk(i): the number of transactions Sk(i): satisfaction degree of k to I on each transactions.

Trust model

Experimental results

Comments Consider the e-commerce environment. Trust evaluate.