A Security Architecture for Reputation Systems

  • Roslan Ismail
  • Colin Boyd
  • Audun Josang
  • Selywn Russell
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)


Reputation systems are emerging as a promising means to assist users to make a right decision about their counterparts before embarking on a business transaction with them in the e-commerce environment. Thus, it is extremely important to ensure that reputation systems are securely implemented and protected from manipulation. Motivated by such needs a security architecture for reputation systems is proposed. Within the architecture several services are identified. In addition, the mechanisms and parameters to support the identified services are also determined.


Reputation System Collection Centre Security Architecture Abstract View Reputation Rating 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Carbo, J., Molina, J.M., Davila, J.: A BDI agent architecture for reasoning about reputation. In: IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 817–822 (2001)Google Scholar
  2. 2.
    Cornelli, F., Damiani, E., de Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a P2P network. In: The eleventh international conference on World Wide Web, pp. 376–386. ACM Press, New York (2002)CrossRefGoogle Scholar
  3. 3.
    Damiani, E., di Vimercati, D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 207–216. ACM Press, New York (2002)CrossRefGoogle Scholar
  4. 4.
    Dellarocas, C.: Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In: Proceedings of the twenty first international conference on Information systems, pp. 520–525. Association for Information Systems (2000)Google Scholar
  5. 5.
    Milosevic, Z., Josang, A., Dimitrakos, T., Patton, M.A.: Discretionary enforcement of electronic contracts. In: 6th IEEE International Enterprice Distributed Object Computing Conference EDOC 2002, September 17-20 (2002)Google Scholar
  6. 6.
  7. 7.
    Rahman, A.A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1769–1777 (2000)Google Scholar
  8. 8.
    Sabater, J., Sierra, C.: Regret: A reputation model for gregarious societies. In: Proceedings of the 4th Workshop on Deception, Fraud and Trust in Agent Societies, in the 5th International Conference on Autonomous Agents (AGENTS 2001), pp. 61–69 (2001)Google Scholar
  9. 9.
    Zacharia, G., Moukas, A., Maes, P.: Collaborative reputation mechanisms in electronic marketplaces. In: Proceedings of the 32nd Hawaii International Conference on System Science. IEEE, Los Alamitos (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Roslan Ismail
    • 1
  • Colin Boyd
    • 1
  • Audun Josang
    • 2
  • Selywn Russell
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia
  2. 2.Distributed Systems Technology CentreQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations