Existing Reputation Systems

ReputationSystem IPv8, IncentiveSystems

Big wiki with lot of reputation stuff

Attach .PDF of reputation paper

Perhaps a few line abstract of each paper.

  • Building Web Reputation Systems by Randy Farmer (Video). Although this talk (and same tittled book) is about the Web and not P2P there are some interesting points on what to do and what no to do when building reputation systems. Discusses reputation on objects that indirectly affect the reputation of persons, how negative reputation is meaningless when you can easily whitewash your identify, how people can exploit bad reputation against good players and how reputation can change the nature of work network and people start doing things to gain reputation instead of behaving normally. Book Blog

Papers

A survey of attack and defense techniques for reputation systemsEng Keong Lua et al.
The Eigentrust algorithm for reputation management in P2P networksSepandar D. Kamvar et al.
Fighting peer-to-peer SPAM and decoys with object reputation (credence)Kevin Walsh et al.
Fighting Pollution Dissemination in Peer-to-Peer Networks (Scrubber)Cristiano Costa et al.
KARMA, A Secure Economic Framework for Peer-to-Peer Resource SharingVivek Vishnumurthy et al.
One hop reputations for peer to peer file sharing workloadsMichael Piatek et al.
A Reputation System for Peer-to-Peer NetworksMinaxi Gupta et al.
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing SystemsCristiano Costa et al.
Robust incentives via multi-level Tit-for-TatQiao Lian et al.
Scrivener, Providing Incentives in Cooperative Content Distribution SystemsAnimesh Nandi et al.
CSorcery, Could We Make P2P Content Sharing Systems Robust to Deceivers?Ennan Zhai et al.
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems Mao Yang et al.

Characterization of existing reputation systems

Image taken from A survey of attack and defense techniques for reputation systems

Characterization of existing reputation systems

Click image for full size

The weaknesses of existing systems to known attack strategies and the defense mechanisms that these system employ

Image taken from A survey of attack and defense techniques for reputation systems

The weaknesses of existing systems to known attack strategies and the defense mechanisms that these system employ

Click image for full size