ROMEO: ReputatiOn Model Enhancing OpenID Simulator

  • Ginés Dólera Tormo
  • Félix Gómez Mármol
  • Gregorio Martínez Pérez
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8743)


OpenID is a standard decentralized initiative aimed at allowing Internet users to use the same personal account to access different services. Since it does not rely on any central authority, it is hard for such users or other entities to validate the trust level of each other. Some research has been conducted to handle this issue, defining reputation framework to determine the trust level of a service based on past experiences. Deep analysis and validation need to be achieved in order to prove the feasibility of this framework. Our main contribution in this paper consists of a simulation environment able to validate the feasibility of that reputation framework and to analyze its behavior within different scenarios.


Central Authority Trust Level Reputation System Malicious User Reputation Score 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006, pp. 11–16 (2006)Google Scholar
  2. 2.
    Dólera Tormo, G., Gómez Mármol, F., Martínez Pérez, G.: Towards the Integration of Reputation Management in OpenID. Computer Standards & Interfaces 36(3), 438–453 (2014)CrossRefGoogle Scholar
  3. 3.
    Gómez Mármol, F., Martínez Pérez, G.: Security Threats Scenarios in Trust and Reputation Models for Distributed Systems. Elsevier Computers & Security 28(7), 545–556 (2009)CrossRefGoogle Scholar
  4. 4.
    Borg, A., Boldt, M., Carlsson, B.: Simulating malicious users in a software reputation system. In: Park, J.J., Lopez, J., Yeo, S.-S., Shon, T., Taniar, D. (eds.) STA 2011. CCIS, vol. 186, pp. 147–156. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  5. 5.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Dólera Tormo, G., Gómez Mármol, F., Martínez Pérez, G.: Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. In: Future Generation Computer Systems (June 2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Ginés Dólera Tormo
    • 1
  • Félix Gómez Mármol
    • 2
  • Gregorio Martínez Pérez
    • 1
  1. 1.Department of Information and Communications EngineeringUniversity of MurciaMurciaSpain
  2. 2.NEC Europe Ltd.HeidelbergGermany

Personalised recommendations