An Efficient Off-Line Reputation Scheme Using Articulated Certificates

Roslan Ismail, Colin Boyd, Audun Josang, Selwyn Russell

Abstract

A common feature practical reputation schemes is that they are on-line which results in restrictions to both availability and scalability. In order to overcome these two problems we propose an off-line reputation scheme based on public key certificates. We introduce the idea of articulated certificates which use proxy signatures to increase the efficiency of reputation verification. As well as being well-suited to our problem such linked certificates may be of independent interest.

References

  1. G. Bolton, E. Katok, and A. Ockenfels. How E®ective are Online Reputation Mechanisms? Discussion Papers on Strategic Interaction 25-2002, Max-PlanxkInstitut, 2002.
  2. D. W. Chadwick and A. Otenko. The permis X.509 role based privilege management infrastructure. Future Generation Computer Systems, 19(2):277{289, February 2003.
  3. D. Fahrenholtz and W. Lamersdorf. Transactional security for a distributed reputation management system. In Proceedings of the 3rd International Conference on Electronic Commerce and Web Technologies, volume 2455 of LNCS, pages 214{223. Springer-Verlag, 2002.
  4. M. Gupta, P. Judge, and M. Ammar. A reputation system for peer-to-peer networks. In ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2003), pages 144{152. ACM Press, June 1-3 2003.
  5. ITU-T. Recommendation X.509 Information technology - Open systems Interconnection - The Directory : Authentication framework, 1997.
  6. B. Lee, H. Kim, and K. Kim. Strong proxy signature and its applications. In SCIS'2001, pages 603{608, Jan 23-26 2001.
  7. C. Y. Liau, X. Zhou, S. Bressan, and K.-L. Tan. E±cient distributed reputation scheme for peer-to-peer systems. In The 2nd International Human.Society@Internet Conference, volume LNCS 2713, pages 54{63. SpringerVerlag, 2003.
  8. M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM conference on Computer and communications security, pages 48{57. ACM Press, 1996.
  9. R. Oppliger, G. Pernul, and C. Strauss. Using attribute certi¯cates to implement role-based authorization and access controls. In Proceedings of the 4. Fachtagung Sicherheit in Informationssystemen (SIS 2000), ZuÄrich (Switzerland), pages 169{ 184, October 5-6, 2000.
  10. J. S. Park and R. Sandhu. Smart certi¯cates: Extending X.509 for secure attribute service on the web. In Proceedings, 22nd National Information Systems Security Conference, pages 337{348, October 18-21 1999.
  11. J. S. Park and R. Sandhu. Binding identities and attributes using digitally signed certi¯cates. In 16th Annual Computer Security Applications Conference (ACSAC), pages 120{127, December 11-15 2000.
  12. P. Resnick, R. Zechauser, E. Friedman, and K. Kuwabara. Reputation systems. Communication of the ACM, 43(12):45{48, December 2000.
  13. P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputation on eBay: A controlled experiment. In Working paper presented at the ESA conference, June 2002.
  14. S. P. S. Kim and D. Won. Proxy signatures, revisited. In Proc. of ICICS'97, International Conference on Information and Communications Security, volume LNCS 1334, pages 223{232. Springer, 1997.
  15. P. R. Zimmermann. The O±cial PGP User's Guide. MIT Press, Cambridge, MA, USA, 1995. Available at http://www-mitpress.mit.edu/mitp/recentbooks/comp/pgp-user.html.
Download


Paper Citation


in Harvard Style

Ismail R., Boyd C., Josang A. and Russell S. (2004). An Efficient Off-Line Reputation Scheme Using Articulated Certificates . In Proceedings of the 2nd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2004) ISBN 972-8865-07-4, pages 53-62. DOI: 10.5220/0002660200530062


in Bibtex Style

@conference{wosis04,
author={Roslan Ismail and Colin Boyd and Audun Josang and Selwyn Russell},
title={An Efficient Off-Line Reputation Scheme Using Articulated Certificates},
booktitle={Proceedings of the 2nd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2004)},
year={2004},
pages={53-62},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002660200530062},
isbn={972-8865-07-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2004)
TI - An Efficient Off-Line Reputation Scheme Using Articulated Certificates
SN - 972-8865-07-4
AU - Ismail R.
AU - Boyd C.
AU - Josang A.
AU - Russell S.
PY - 2004
SP - 53
EP - 62
DO - 10.5220/0002660200530062