A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce Systems

Zaobin Gan, Yijie Li, Guoqiang Xiao, Dengwen Wei
{"title":"A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce Systems","authors":"Zaobin Gan, Yijie Li, Guoqiang Xiao, Dengwen Wei","doi":"10.1109/ISA.2008.31","DOIUrl":null,"url":null,"abstract":"Mobile Agent based e-commerce systems are increasingly drawing more and more attention in recent years. However, there exist some transaction risks while enabling agents make purchase decisions and exploit information to other unknown agents in the virtual markets. Trust and reputation are widely introduced to mitigate this risk by deriving the trustworthiness of certain agent from his transaction history. Despite existing of some proposed reputation-based trust models addressing the above issue, most of them can not readily be used since there are many unforseen changes in the electronic markets. To this end, this paper proposes a novel reputation computing model that integrates a direct reputation and a recommended reputation. Specially, we present a three-factor method to evaluate the direct repu tation from personal self-experience, and adopt the vector similarity to evaluate the recommendation credibility that can effectively detect the dishonest recommendations. In addition, we amend the short term reputation and penalty factor metric to make our mechanism effective in detecting malicious agents with strategic behavior. Our experiments show that the model is highly dependable and effective.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Information Security and Assurance (isa 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISA.2008.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

Mobile Agent based e-commerce systems are increasingly drawing more and more attention in recent years. However, there exist some transaction risks while enabling agents make purchase decisions and exploit information to other unknown agents in the virtual markets. Trust and reputation are widely introduced to mitigate this risk by deriving the trustworthiness of certain agent from his transaction history. Despite existing of some proposed reputation-based trust models addressing the above issue, most of them can not readily be used since there are many unforseen changes in the electronic markets. To this end, this paper proposes a novel reputation computing model that integrates a direct reputation and a recommended reputation. Specially, we present a three-factor method to evaluate the direct repu tation from personal self-experience, and adopt the vector similarity to evaluate the recommendation credibility that can effectively detect the dishonest recommendations. In addition, we amend the short term reputation and penalty factor metric to make our mechanism effective in detecting malicious agents with strategic behavior. Our experiments show that the model is highly dependable and effective.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于移动代理的电子商务系统信誉计算模型
近年来,基于移动代理的电子商务系统越来越受到人们的关注。然而,在虚拟市场中,代理商在进行购买决策和向其他未知代理商开发信息的同时,也存在一定的交易风险。信任和声誉被广泛地引入,通过从某个代理人的交易历史中得出他的可信度来减轻这种风险。尽管存在一些基于声誉的信任模型来解决上述问题,但由于电子市场中存在许多不可预见的变化,因此大多数模型都不能轻易使用。为此,本文提出了一种整合直接声誉和推荐声誉的新型声誉计算模型。特别地,我们提出了一种基于个人自我经验的直接信誉评价方法,并采用向量相似度评价推荐可信度,可以有效地检测出不诚实的推荐。此外,我们修改了短期声誉和惩罚因子度量,使我们的机制能够有效地检测具有战略行为的恶意代理。实验结果表明,该模型具有较高的可靠性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A New Electronic Communication Technology - VT Position Code Communication Technology and Its Implementation CRYPTEX Model for Software Source Code The Economics of Privacy-Privacy: People, Policy and Technology Why MSN Lost to QQ in China Market? Different Privacy Protection Design Maximizing Return on Security Safeguard Investment with Constraint Satisfaction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1