Reputation-based Systems: a security analysis

This paper aims to provide a useful introduction to security issues affecting Reputation-based Systems by identifying a number of possible threats and attacks, highlighting the security requirements that should be fulfilled by these systems and providing recommendations for action and best practices to reduce the security risks to users.

December 10, 2007
Editors: Elisabetta Carrara, Giles Hogben, ENISA, Contributors:, Art Baker, Microsoft, Katrin Borcea-Pfitzmann, TU Dresden, Mark J. Boyd, eBay, Jon Callas, PGP Corp, Elisabetta Carrara, ENISA (Editor), Marco Casassa Mont, HP Labs, Sorin Chitu, Romanian Ministry of the Interior, Richard Cox, Spamhaus, Stephen Crane, HP Labs, Christian Dietrich, Institute for Internet Security, Germany, Jay Heiser, Gartner, Giles Hogben, ENISA (Editor), Paolo Massa, IRST, Trento, Italy, Tim Nash, Venture Skills, Farez Rahman, Redkey Digital, James Andrew Reynolds, SECUDE, Christian Rossow, Institute for Internet Security, Germany, Jean-Marc Seigneur, University of Geneva and Venyo, Sandra Steinbrecher, TU Dresden, Denis Trcek, JSI and FAMNIT UP, Slovenia, Rigo Wenning, W3C

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information