Jaime Pérez. Reputation 1. The estimation in which one is held; the character attributed to a person, thing, or action;

Slides:



Advertisements
Similar presentations
IP Warming Overview and Implementation Using Eloqua.
Advertisements

SAR Overview Business Case Review Logical SARPhysical SAR Implementation Review 1.
Database Design Process. The Steps 1.What does the database/application need to do? 2.Develop the tables 3.Establish relationships 4.Set up the forms.
OECD/INFE High-level Principles for the evaluation of financial education programmes Adele Atkinson, PhD OECD With the support of the Russian/World Bank/OECD.
Automated Software Testing: Test Execution and Review Amritha Muralidharan (axm16u)
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Outline  Introduction to Application Layer  Peer-to-peer paradigm  Client-server paradigm  Domain Name System (DNS)  Flat-naming vs hierarchical-naming.
Peer services: from Description to Invocation Manuel Oriol International Workshop on Agents and Peer-to-Peer Computing (AP2PC 2002)
UNIVERSITY OF JYVÄSKYLÄ Chedar P2P platform InBCT 3.2 Peer-to-Peer communication Cheese Factory -project Research Assistant.
Database Systems: A Practical Approach to Design, Implementation and Management International Computer Science S. Carolyn Begg, Thomas Connolly Lecture.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Threat infrastructure: proxies, botnets, fast-flux
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Aim: How can we measure area on ImageJ?
1 Attribute Based Communications University of California, Irvine Presented By : Ala Khalifeh (Note: Presented)
Chapter 17 Methodology – Physical Database Design for Relational Databases Transparencies © Pearson Education Limited 1995, 2005.
Restricted © Siemens AG 2013 All rights reserved.siemens.co.uk/education Topic 17: Lean machines Siemens Education.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Information & Communication Technology
1. Fundamentals of Computer Systems Define a computer system Computer Systems in the modern world Professional standards for computer systems Ethical,
Malware Hunter How To Guide for SecurityCenter Continuous View™
P2PSIP Charter Proposal Many people helped write this charter…
THE INTERNET INTERNET REGISTRIES & INTERNET REGISTRARS.
Measuring aid: The DAC gender equality policy marker Session: Tracking and monitoring financing for gender equality Jenny Hedman DAC Network on Gender.
Lecture 9 Methodology – Physical Database Design for Relational Databases.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
OECD/INFE Tools for evaluating financial education programmes Adele Atkinson, PhD Policy Analyst OECD With the support of the Russian/World Bank/OECD Trust.
Chapter 16 Methodology – Physical Database Design for Relational Databases.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
The Future of Transnational Cooperation in Central Europe ( ) Claudia Pamperl JTS INTERRREG IIIC East.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
Building a Non-mandatory Enterprise System Key Factors for Success February 9, 2011 Elaine Ayres, MS, RD – Project Manager.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
1 MSc Project Yin Chen Supervised by Dr Stuart Anderson 2003 Grid Services Monitor Long Term Monitoring of Grid Services Using Peer-to-Peer Techniques.
Construction, Testing, Documentation, and Installation Chapters 15 and 16 Info 361: Systems Analysis and Design.
Methodology – Physical Database Design for Relational Databases.
Scalable Trust Community Framework STCF (01/07/2013)
MANUAL TESTING KS SESSION PRESENTED BY 26/11/015 VISHAL KUMAR.
Comprehensive K-12 Mathematics Improvement Plan Update May 9, 2013.
Evaluation GUESS and Non-Forwarding Peer-to-Peer search ICDCS paper Beverly Yang Patrick Vinograd Hector Garcia-Molina Computer Science Department, Stanford.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Copyright (c) 2004 Prentice-Hall. All rights reserved. 1 Committed to Shaping the Next Generation of IT Experts. Project 6: Creating XHTML Forms Kelly.
ITIL V3 Awareness Program 1 Program Overview:
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
FHWA Update SHRP2 Implementation and Other Agency TSMO R&D Efforts Tracy Scriba, FHWA 12/8/15 1.
Jaime Pérez Lyon, February The EQUAL group –No activity in the last months. The Domain Reputation WG of the IETF –No activity since November 2010.
Network Engineering Interview What to expect???
ПЕЧЕНЬ 9. Закладка печени в период эмбрионального развития.
International Planetary Data Alliance Registry Project Update September 16, 2011.
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
If we don’t subnet and use as our subnet mask then we use all of our IP addresses on one network. This is not an efficient use of our Class.
Alessandro Yoshi Polliotti 1 / 13 TERENA Networking Conference 2005 Biblioteca d'Alessandria: A Peer-to-peer Network for Scholar Knowledge Exchange Terena.
CMGT 411 Week 3 DQ 3 What are the components of the Federated identity management and are they addressed in White House (2011) Reference White House (2011).
Trustworthiness Management in the Social Internet of Things
Module 30 (Unix/Linux Security Issues II)
High Performance Computing
Methodology – Physical Database Design for Relational Databases
SCOPE of the Technical Committee
مفاهیم بهره وري.
Effect combined IMPACT on achieving outcomes Organizational OUTPUTS
Unit 2 : Promoting Good Health
Binary Lesson 7 Supernetting
Binary Lesson 8 Review of Classful Addressing and Subnetting
Giuliano Amerini Unit E6 (Transport)
G061 - Data Dictionary.
Presentation transcript:

Jaime Pérez

Reputation 1. The estimation in which one is held; the character attributed to a person, thing, or action;

Aims: Develop new architectures and services based on reputation systems. Enhance existing services by adding the concept of reputation. Find different, efficient ways of representing and using reputation.

Examples: Spam fighting: use reputation as an indicator to include IP addresses into white/black lists. Efficient use of the network: use reputation in peer-to-peer networks to avoid misuse.

White/black listing People include IPs in the white list. Periodic automated checks to move IPs between lists. The white list is used to purge the black list. The black list is checked by the MTAs by querying a DNS zone. Binary reputation!

Reputation in P2P The behaviour of the peers is monitored. The reputation of a peer is used to decide whether to share something with him or not. Based on federation technology to identify peers and track their reputation.

Open Reputation Management Systems OASIS Technical Committee Focused on reputation technologies. Working on terminology and use cases.

Work items Start sharing white/black lists in an automated way (federation?). Start a pilot of a P2P based on reputation technology. …