Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
The PITAS from PITAC And the Emperor's Security Cl...
 
Collaborative Development Spurs Open-Source Arrang...
 
Identifying Key Elements of Safety-Critical Softwa...
 
CVSS: Common Vulnerability Scoring System
 
Open-Source License Simplification (and Trust?)
 
Identity, Authentication, and Attestation Together...
 
Collaborative Systems: Social Protocols
 
Secure Computer Infrastructure as a Journey
 
Component-Based Software Engineering Projects
 
TROST: Templates for Raising Open-System Trustwort...

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-03-22

 

Reputation and Community Trust of Download Files

ACM News Service: Cleaning Spam from Swapping Networks.  Although I am fascinated by the prospects of peer-to-peer approaches to distributed information systems, I have been wary of stepping onto this territory until there is some stability and better assurances of safety. The "Credence" program developed at Cornell University is designed to coordinate among peer-network nodes in order to establish trustworthiness of a particular file that is available for download.  That may qualify as a form of TROSTing and I am definitely curious. John Borland's 2005-03-18 CNet News.Com article provides a link to Credence.  The motivation and approach are definitely interesting, along with the fact that vulnerabilities in the LimeWire Gnutella client were discovered in the course of adding in the Credence functions.  I am particularly intrigued by the fact that the process of developing reputation assessments is dynamic and fluid and pretty automatic.  So there are interesting prospects for building up trustworthiness assessments out of this mechanism. There's much more here and an interesting body of research projects that Emin Gün Sirer is engaged in.

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $