Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Reputation based systems security analisys

Reputation based systems security analisys

Ratings: (0)|Views: 235|Likes:
Published by Stefano Bendandi

More info:

Published by: Stefano Bendandi on Dec 06, 2008
Copyright:Traditional Copyright: All rights reserved


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less



Editors: Elisabetta Carrara and Giles Hogben, ENISA
October 2007
ENISA Position Paper No. 2
Reputation-based Systems:a security analysis
ENISA Position Papers represent expert opinionon topics ENISA considers to be importantemerging risks or key security components. Theyare produced as the result of discussion among agroup of experts who were selected for theirknowledge in the area. The content was collectedvia wiki, mailing list and telephone conferencesand edited by ENISA.This paper aims to provide a useful introductionto security issues affecting Reputation-basedSystems by identifying a number of possiblethreats and attacks, highlighting the securityrequirements that should be fulfilled by thesesystems and providing recommendations foraction and best practices to reduce the securityrisks to users.Examples are given from a number of providersthroughout the paper. These should be taken asexamples only and there is no intention to singleout a specific provider for criticism or praise.The examples provided are not necessarily thosemost representative or important, nor is the aimof this paper to conduct any kind of marketsurvey, as there might be other providers whichare not mentioned here and nonetheless areequally or more representative of the market.
This paper is aimed at providers, designers,research and standardisation communities,government policy-makers and businesses.
ENISA Position Paper No.2
Reputation-based Systems: a security analysis 
Reputation-based Systems

Activity (6)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
jfscrbd liked this
rarariz liked this
Stephen Cobb liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->