Reference Hub2
DRESS: A Distributed RMS Evaluation Simulation Software

DRESS: A Distributed RMS Evaluation Simulation Software

Vincenzo Agate, Alessandra De Paola, Giuseppe Lo Re, Marco Morana
Copyright: © 2020 |Volume: 16 |Issue: 3 |Pages: 18
ISSN: 1548-3657|EISSN: 1548-3665|EISBN13: 9781799805137|DOI: 10.4018/IJIIT.2020070101
Cite Article Cite Article

MLA

Agate, Vincenzo, et al. "DRESS: A Distributed RMS Evaluation Simulation Software." IJIIT vol.16, no.3 2020: pp.1-18. http://doi.org/10.4018/IJIIT.2020070101

APA

Agate, V., De Paola, A., Lo Re, G., & Morana, M. (2020). DRESS: A Distributed RMS Evaluation Simulation Software. International Journal of Intelligent Information Technologies (IJIIT), 16(3), 1-18. http://doi.org/10.4018/IJIIT.2020070101

Chicago

Agate, Vincenzo, et al. "DRESS: A Distributed RMS Evaluation Simulation Software," International Journal of Intelligent Information Technologies (IJIIT) 16, no.3: 1-18. http://doi.org/10.4018/IJIIT.2020070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Distributed environments consist of a huge number of entities that cooperate to achieve complex goals. When interactions occur between unknown parties, intelligent techniques for estimating agent reputations are required. Reputation management systems (RMS's) allow agents to perform such estimation in a cooperative way. In particular, distributed RMS's exploit feedbacks provided after each interaction and allow prediction of future behaviors of agents. Such systems, in contrast to centralized RMSs, are sensitive to fake information injected by malicious users; thus, predicting the performance of a distributed RMS is a very challenging task. Although many existing works have addressed some challenges concerning the design and assessment of specific RMS's, there are no simulation environments that adopt a general approach that can be applied to different application scenarios. To overcome this lack, we present DRESS, an agent-based simulation framework that aims to support researchers in the evaluation of distributed RMSs under different security attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.