
References
1. G. Bolton, E. Katok, and A. Ockenfels. How Effective are Online Reputation
Mechanisms? Discussion Papers on Strategic Interaction 25-2002, Max-Planxk-
Institut, 2002.
2.
D. W. Chadwick and A. Otenko. The permis X.509 role based privilege manage-
ment infrastructure. Future Generation Computer Systems, 19(2):277–289, Febru-
ary 2003.
3.
D. Fahrenholtz and W. Lamersdorf. Transactional security for a distributed repu-
tation management system. In Proceedings of the 3rd International Conference on
Electronic Commerce and Web Technologies, volume 2455 of LNCS, pages 214–223.
Springer-Verlag, 2002.
4. M. Gupta, P. Judge, and M. Ammar. A reputation system for peer-to-peer net-
works. In ACM 13th International Workshop on Network and Operating Sys-
tems Support for Digital Audio and Video (NOSSDAV 2003), pages 144–152. ACM
Press, June 1-3 2003.
5.
ITU-T. Recommendation X.509 Information technology - Open systems Intercon-
nection - The Directory : Authentication framework, 1997.
6. B. Lee, H. Kim, and K. Kim. Strong proxy signature and its applications. In
SCIS’2001, pages 603–608, Jan 23-26 2001.
7.
C. Y. Liau, X. Zhou, S. Bressan, and K.-L. Tan. Efficient distributed
reputation scheme for peer-to-peer systems. In The 2nd International Hu-
man.Society@Internet Conference, volume LNCS 2713, pages 54–63. Springer-
Verlag, 2003.
8. M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing
op eration. In Proceedings of the 3rd ACM conference on Computer and communi-
cations security, pages 48–57. ACM Press, 1996.
9.
R. Oppliger, G. Pernul, and C. Strauss. Using attribute certificates to implement
role-based authorization and access controls. In Proceedings of the 4. Fachtagung
Sicherheit in Informationssystemen (SIS 2000), Z¨urich (Switzerland), pages 169–
184, October 5-6, 2000.
10. J. S. Park and R. Sandhu. Smart certificates: Extending X.509 for secure attribute
service on the web. In Proceedings, 22nd National Information Systems Security
Conference, pages 337–348, October 18-21 1999.
11.
J. S. Park and R. Sandhu. Binding identities and attributes using digitally signed
certificates. In 16th Annual Computer Security Applications Conference (ACSAC),
pages 120–127, December 11-15 2000.
12.
P. Resnick, R. Zechauser, E. Friedman, and K. Kuwabara. Reputation systems.
Communication of the ACM, 43(12):45–48, December 2000.
13. P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputa-
tion on eBay: A controlled experiment. In Working paper presented at the ESA
conference, June 2002.
14.
S. P. S. Kim and D. Won. Proxy signatures, revisited. In Proc. of ICICS’97,
International Conference on Information and Communications Security, volume
LNCS 1334, pages 223–232. Springer, 1997.
15.
P. R. Zimmermann. The Official PGP User’s Guide. MIT Press, Cam-
bridge, MA, USA, 1995. Available at http://www-mitpress.mit.edu/mitp/recent-
b ooks/comp/pgp-user.html.
62