A market-based approach to managing the risk of peer-to-peer transactions
Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P trim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight...
Saved in:
Published in | Computer networks (Amsterdam, Netherlands : 1999) Vol. 54; no. 5; pp. 675 - 688 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier B.V
08.04.2010
Elsevier Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P
trim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed P
trim prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the P
trim market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like P
trim assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil. |
---|---|
AbstractList | Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P
trim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed P
trim prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the P
trim market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like P
trim assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil. Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by Ptrim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed Ptrim prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the Ptrim market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like Ptrim assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil. [PUBLICATION ABSTRACT] Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by PTRIM, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed PTRIM prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the PTRIM market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like PTRIM assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil. Adapted from the source document. |
Author | Louridas, Panos Stroggylos, Kostas Spinellis, Diomidis Androutsellis-Theotokis, Stephanos |
Author_xml | – sequence: 1 givenname: Stephanos surname: Androutsellis-Theotokis fullname: Androutsellis-Theotokis, Stephanos email: stheotok@aueb.gr – sequence: 2 givenname: Diomidis surname: Spinellis fullname: Spinellis, Diomidis – sequence: 3 givenname: Panos surname: Louridas fullname: Louridas, Panos – sequence: 4 givenname: Kostas surname: Stroggylos fullname: Stroggylos, Kostas |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=22500934$$DView record in Pascal Francis |
BookMark | eNp9kU1LAzEQhoNUsFX_gYdFEE9b87FfuQil-FEoeNFzyGYnbbZtUpNU8N-bpcWDB08zzDwzzLzvBI2ss4DQDcFTgkn10E-V21mIU4oxT6UpxuUZGpOmpnmNKz5KOWt4TmhTXaBJCD3GuChoM0aLWbaTfgMxb2WALpP7vXdSrbPoUsPKlbGrLK4h8yZsMqezPYDPo8uHmEUvbZAqGmfDFTrXchvg-hQv0cfz0_v8NV--vSzms2WuWFHEHFrOWF03mlcK61ZrBqrjHJpOl1JpyihQzlrWcQVAVVl2uGvKAiqqSV1pwi7R_XFvOvTzACGKnQkKtltpwR2CqAvK03e0TuTtH7J3B2_TcYJwXtVNRQbo7gTJoORWp4-UCWLvTdLlW1BaJk1ZkbjiyCnvQvCgfxGCxeCC6MXRBTG4MFSTC2ns8TgGSZIvA14EZcAq6IwHFUXnzP8LfgA6-JOc |
CODEN | CNETDP |
Cites_doi | 10.1007/3-540-44702-4_4 10.1145/1250910.1250940 10.1145/375348.377427 10.1145/203091.203094 10.1145/1330311.1330326 10.1007/3-540-45748-8_13 10.1145/1041680.1041681 10.1145/1080192.1080204 10.1007/978-1-4615-0863-2_21 10.1145/586110.586138 10.1145/776322.776346 10.1007/978-3-540-30216-2_8 10.1145/1016527.1016539 10.2307/2325486 10.1109/MC.2007.76 10.1038/451893a 10.1109/TKDE.2005.26 10.1007/3-540-45748-8_20 10.1145/1342327.1342343 10.1145/988772.988788 10.1016/S1574-0145(06)01006-3 10.1007/11530657 10.1007/978-3-540-30183-7_10 10.1126/science.185.4157.1124 10.1007/3-540-36532-X_4 10.1287/mnsc.1050.0415 10.54155/jbs.19.1.55-72 10.1086/257878 10.1007/3-540-44751-2_15 10.2753/JEC1086-4415100304 10.1145/1060289.1060317 10.1007/BF00993960 10.1145/633042.633043 10.1145/775240.775242 |
ContentType | Journal Article |
Copyright | 2009 Elsevier B.V. 2015 INIST-CNRS Copyright Elsevier Sequoia S.A. Apr 8, 2010 |
Copyright_xml | – notice: 2009 Elsevier B.V. – notice: 2015 INIST-CNRS – notice: Copyright Elsevier Sequoia S.A. Apr 8, 2010 |
DBID | AAYXX CITATION IQODW 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
DOI | 10.1016/j.comnet.2009.10.005 |
DatabaseName | CrossRef Pascal-Francis Computer and Information Systems Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database Library and Information Science Abstracts (LISA) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Applied Sciences |
EISSN | 1872-7069 |
EndPage | 688 |
ExternalDocumentID | 1978218841 22500934 10_1016_j_comnet_2009_10_005 S1389128609003107 |
Genre | Feature |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 77K 8P~ AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 XFK ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABJNI ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH EFKBS IQODW 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c344t-eb933778f96c0fbff3ecd99e8df5acf232e293b3d9cee2c55d0d854e62f176f13 |
IEDL.DBID | AIKHN |
ISSN | 1389-1286 |
IngestDate | Mon Jul 21 11:40:50 EDT 2025 Fri Jul 25 04:29:53 EDT 2025 Mon Jul 21 09:14:22 EDT 2025 Tue Jul 01 03:28:56 EDT 2025 Fri Feb 23 02:21:13 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Keywords | Reputation management Financial markets Transaction processing Peer-to-peer networks Peer to peer Prototype Computer network On-line systems Financial market Resource sharing Local network |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c344t-eb933778f96c0fbff3ecd99e8df5acf232e293b3d9cee2c55d0d854e62f176f13 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
PQID | 199678617 |
PQPubID | 47119 |
PageCount | 14 |
ParticipantIDs | proquest_miscellaneous_742900427 proquest_journals_199678617 pascalfrancis_primary_22500934 crossref_primary_10_1016_j_comnet_2009_10_005 elsevier_sciencedirect_doi_10_1016_j_comnet_2009_10_005 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2010-04-08 |
PublicationDateYYYYMMDD | 2010-04-08 |
PublicationDate_xml | – month: 04 year: 2010 text: 2010-04-08 day: 08 |
PublicationDecade | 2010 |
PublicationPlace | Kidlington |
PublicationPlace_xml | – name: Kidlington – name: Amsterdam |
PublicationTitle | Computer networks (Amsterdam, Netherlands : 1999) |
PublicationYear | 2010 |
Publisher | Elsevier B.V Elsevier Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier B.V – name: Elsevier – name: Elsevier Sequoia S.A |
References | P. Druschel, A. Rowstron, Past: a large-scale, persistent peer-to-peer storage utility, in: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, May 2001. June 2005 (accessed on 2008). S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in p2p networks, in: Proceedings of the 12th International Conference on World Wide Web, ACM Press, New York, 2003, pp. 640–651. Fan, Tan, Whinston (bib21) 2005; 17 S. Hand, T. Roscoe, Mnemosyne: peer-to-peer steganographic storage, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002. A. Kritikopoulos, M. Sideri, K. Stroggylos, Crawlwave: a distributed crawler, in: Proceedings of the Third Hellenic Conference on Artificial Intelligence (SETN ’04), May 2004. Tversky, Kahneman (bib55) 1974; 185 E. Cohen, S. Shenker, Replication strategies in unstructured peer-to-peer networks, in: SIGCOMM ’02: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, USA, 2002, pp. 177–190. S. Marti, P. Ganesan, H. Garcia-Molina, DHT routing using social links, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS 2004), 2004. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington DC, November 2002. Kalita (bib39) 1994; 5 M. Feldman, C. Papadimitriou, J. Chuang, I. Stoica, Free-riding and whitewashing in peer-to-peer systems, in: Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS2004), May 2004b. Glasserman, Li (bib26) 2005; 51 S. Kinsella, S. Raghavendra, Case study of price dispersion in online markets, Tech. Rep., Digital Enterprise Research Institute, Ireland M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of the NOSSDAV’03 Conference. Monterey, CA, June 1–3, 2003. JXTA, The Project JXTA Web Site Heidelberger (bib32) 1995; 5 Stigler (bib54) 1957; 65 M. Waldman, R. AD, C. LF, Publius: A robust, tamper-evident, censorship-resistant web publishing system, in: Proceedings of the Ninth USENIX Security Symposium, August 2000. Gavish, Tucci (bib25) 2008; 51 Huaizhi, Singhal (bib34) 2007; 40 A. Datta, M. Hauswirth, K. Aberer, Beyond ’web of trust’: Enabling p2p e-commerce, in: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC’03), 2003. (bib37) 1982 Aberer (bib1) 2001; 2172 K. Walsh, E. Gun Sirer, Fighting peer-to-peer spam and decoys with object reputation, in: Proceedings of the SIGCOMM’05 Conference Workshops, Philadelphia, PA, August 2005. May, Levin, Sugihara (bib46) 2008; 451 Gregg, Scott (bib28) 2006; 10 MojoNation, The MojoNation A. Singh, L. Liu, Trustme: anonymous management of trust relationships in decentralized p2p systems, in: Proceedings of the IEEE International Conference on Peer-to-Peer Computing, September 2003. Fama (bib20) 1970; 25 P. Resnick, R. Zeckhauser, Advances in applied microeconomics, vol. 11. Ch. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. The Economics of the Internet and e-Commerce, JAI Press, Amsterdam, 2002. Xiong, Liu (bib60) 2004; 16 C. Dellarocas, P. Resnick, Online reputation mechanisms: A roadmap for future research summary report, in: Proceedings of the First Interdisciplinary Symposium on Online Reputation Mechanisms, April 26–27, 2003. D. Wallach, A survey of peer-to-peer security issues, in: International Symposium on Software Security, Tokyo, Japan, November 2002. J. Douceur, The Sybill attack, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002. Aberer, Despotovic (bib2) 2001 Krugman, Wells, Olney (bib43) 2007 Gregg, Scott (bib29) 2008; 51 Shiller (bib51) 2005 K. Walsh, E. Gon Sirer, Experience with an object reputation system for peer-to-peer filesharing, in: Proceedings of the Symposium on Networked System Design and Implementation, San Jose, CA, 2006 Econ080417, The Economist: Clearing the Fog, April 17, 2008. R. Dingledine, M. Freedman, D. Molnar, Peer-to-peer: harnessing the power of disruptive technology, first ed., O’Reilly, Ch. 1, a network of peers: peer-to-peer models through the history of the internet, March 2001, pp. 3–20. Damodaran (bib12) 2002 FT080418, Financial Times: Banks Eye CDS Clearing House, April 18, 2008. Bluhm, Overbeck, Wagner (bib5) 2002 C. Dellarocas, Information Society or Information Economy? A Combined Perspective on the Digital Era, IDEA Book Publishing, Hershey, PA, Ch. Building Trust On-Line: The Design of Robust Reputation Mechanisms for Online Trading Communities, 2004. 2007 (accessed on 2007). Bonfim (bib6) 2004 S. Buchegger, J.-Y.L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, in: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004. B. Zhao, J. Kubiatowicz, A. Joseph, Tapestry: an infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, 94720, April 2001. K. Steinmetz, K. Wehrle (Eds.), Peer-to-Peer Systems and Applications, Springer Lecture Notes in Computer Science 3485, 2005. 2007. M.R. Baye, J. Morgan, P. Scholten, Information, search, and price dispersion. Working Papers 2006-11, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy, 2006. S. Saroiu, P. Gummadi, S. Gribble, Exploring the design space of distributed peer-to-peer systems: comparing the web, TRIAD and Chord/CFS, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002. (bib38) 2000 I. Clarke, O. Sandberg, B. Wiley, Freenet: a distributed anonymous information storage and/retrieval system, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, June 2000. Androutsellis-Theotokis, Spinellis (bib3) 2004; 36 M. Castro, P. Druschel, A. Ganesh, R. A, D. Wallach, Secure routing for structured peer-to-peer overlay networks, in: Proceedings of the Fifth Usenix Symposium on Operating Systems, Boston, MA, December 2002. Lee, Gosain (bib44) 2002; 19 C. Gorg, E. Lamers, D. Fuss, P. Heegaard, Rare event simulation, Computer Systems and Telematics, Norwegian Institute of Technology, Tech. Rep. COST 257, 2001. M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, in: Proceedings of the EC04 Conference, May 2004a. Hull (bib48) 2008 H. Zhang, A. Goel, et al., Improving eigenvector-based reputation systems against collusion, Tech. Rep., Stanford University, Workshop on Algorithms and Models for the Web Graph (WAW), October 2004. J. Hring, Different prices for identical products? Market efficiency and the virtual location in b2c e-commerce, ZEW Discussion Papers 03-68, ZEW-Zentrum for Europische Wirtschaftsforschung/Center for European Economic Research, 2003. R. Jurka, B. Faltings, Collusion-resistant, incentives-compatible feedback payments, in: Proceedings of the EC07 Conference, San Diego, CA, June 2007. Androutsellis-Theotokis (10.1016/j.comnet.2009.10.005_bib3) 2004; 36 Fan (10.1016/j.comnet.2009.10.005_bib21) 2005; 17 10.1016/j.comnet.2009.10.005_bib50 10.1016/j.comnet.2009.10.005_bib53 Damodaran (10.1016/j.comnet.2009.10.005_bib12) 2002 10.1016/j.comnet.2009.10.005_bib52 10.1016/j.comnet.2009.10.005_bib11 10.1016/j.comnet.2009.10.005_bib10 10.1016/j.comnet.2009.10.005_bib13 10.1016/j.comnet.2009.10.005_bib57 Stigler (10.1016/j.comnet.2009.10.005_bib54) 1957; 65 10.1016/j.comnet.2009.10.005_bib56 10.1016/j.comnet.2009.10.005_bib15 10.1016/j.comnet.2009.10.005_bib59 10.1016/j.comnet.2009.10.005_bib14 Kalita (10.1016/j.comnet.2009.10.005_bib39) 1994; 5 10.1016/j.comnet.2009.10.005_bib58 10.1016/j.comnet.2009.10.005_bib17 10.1016/j.comnet.2009.10.005_bib16 10.1016/j.comnet.2009.10.005_bib19 10.1016/j.comnet.2009.10.005_bib18 Glasserman (10.1016/j.comnet.2009.10.005_bib26) 2005; 51 Gavish (10.1016/j.comnet.2009.10.005_bib25) 2008; 51 10.1016/j.comnet.2009.10.005_bib40 Gregg (10.1016/j.comnet.2009.10.005_bib28) 2006; 10 10.1016/j.comnet.2009.10.005_bib42 10.1016/j.comnet.2009.10.005_bib41 Aberer (10.1016/j.comnet.2009.10.005_bib1) 2001; 2172 Heidelberger (10.1016/j.comnet.2009.10.005_bib32) 1995; 5 10.1016/j.comnet.2009.10.005_bib45 Bluhm (10.1016/j.comnet.2009.10.005_bib5) 2002 Fama (10.1016/j.comnet.2009.10.005_bib20) 1970; 25 10.1016/j.comnet.2009.10.005_bib47 10.1016/j.comnet.2009.10.005_bib49 10.1016/j.comnet.2009.10.005_bib4 (10.1016/j.comnet.2009.10.005_bib38) 2000 Shiller (10.1016/j.comnet.2009.10.005_bib51) 2005 (10.1016/j.comnet.2009.10.005_bib37) 1982 10.1016/j.comnet.2009.10.005_bib31 10.1016/j.comnet.2009.10.005_bib30 10.1016/j.comnet.2009.10.005_bib33 10.1016/j.comnet.2009.10.005_bib35 10.1016/j.comnet.2009.10.005_bib36 Tversky (10.1016/j.comnet.2009.10.005_bib55) 1974; 185 10.1016/j.comnet.2009.10.005_bib8 10.1016/j.comnet.2009.10.005_bib7 Bonfim (10.1016/j.comnet.2009.10.005_bib6) 2004 10.1016/j.comnet.2009.10.005_bib9 Hull (10.1016/j.comnet.2009.10.005_bib48) 2008 May (10.1016/j.comnet.2009.10.005_bib46) 2008; 451 Lee (10.1016/j.comnet.2009.10.005_bib44) 2002; 19 Huaizhi (10.1016/j.comnet.2009.10.005_bib34) 2007; 40 Xiong (10.1016/j.comnet.2009.10.005_bib60) 2004; 16 10.1016/j.comnet.2009.10.005_bib62 10.1016/j.comnet.2009.10.005_bib61 Gregg (10.1016/j.comnet.2009.10.005_bib29) 2008; 51 10.1016/j.comnet.2009.10.005_bib22 10.1016/j.comnet.2009.10.005_bib24 10.1016/j.comnet.2009.10.005_bib23 Aberer (10.1016/j.comnet.2009.10.005_bib2) 2001 10.1016/j.comnet.2009.10.005_bib27 Krugman (10.1016/j.comnet.2009.10.005_bib43) 2007 |
References_xml | – reference: P. Druschel, A. Rowstron, Past: a large-scale, persistent peer-to-peer storage utility, in: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, May 2001. – reference: S. Hand, T. Roscoe, Mnemosyne: peer-to-peer steganographic storage, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002. – volume: 40 start-page: 45 year: 2007 end-page: 53 ident: bib34 article-title: Trust management in distributed systems publication-title: IEEE Comput. – volume: 2172 start-page: 179 year: 2001 end-page: 194 ident: bib1 article-title: P-Grid: A self-organizing access structure for P2P information systems publication-title: Lecture Notes in Computer Science – reference: E. Cohen, S. Shenker, Replication strategies in unstructured peer-to-peer networks, in: SIGCOMM ’02: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, USA, 2002, pp. 177–190. – reference: JXTA, The Project JXTA Web Site, – year: 2005 ident: bib51 article-title: Irrational Exuberance – volume: 25 start-page: 383 year: 1970 end-page: 417 ident: bib20 article-title: Efficient capital markets: a review of theory and empirical work publication-title: J. Finance – volume: 36 start-page: 335 year: 2004 end-page: 371 ident: bib3 article-title: A survey of peer-to-peer content distribution technologies publication-title: ACM Computing Surveys – reference: , 2007 (accessed on 2007). – reference: K. Steinmetz, K. Wehrle (Eds.), Peer-to-Peer Systems and Applications, Springer Lecture Notes in Computer Science 3485, 2005. – reference: June 2005 (accessed on 2008). – volume: 65 start-page: 1 year: 1957 end-page: 17 ident: bib54 article-title: Perfect competition, historically contemplated publication-title: J. Political Econ. – year: 2000 ident: bib38 publication-title: Choices, Values and Frames – reference: B. Zhao, J. Kubiatowicz, A. Joseph, Tapestry: an infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, 94720, April 2001. – volume: 451 start-page: 893 year: 2008 end-page: 895–55 ident: bib46 article-title: Complex systems: ecology for bankers publication-title: Nature – year: 2004 ident: bib6 article-title: Understanding Credit Derivatives and Related Instruments – reference: A. Kritikopoulos, M. Sideri, K. Stroggylos, Crawlwave: a distributed crawler, in: Proceedings of the Third Hellenic Conference on Artificial Intelligence (SETN ’04), May 2004. – volume: 51 start-page: 1643 year: 2005 end-page: 1656 ident: bib26 article-title: Importance sampling for portfolio credit risk publication-title: Manage. Sci. – reference: , 2007. – reference: C. Dellarocas, Information Society or Information Economy? A Combined Perspective on the Digital Era, IDEA Book Publishing, Hershey, PA, Ch. Building Trust On-Line: The Design of Robust Reputation Mechanisms for Online Trading Communities, 2004. – reference: FT080418, Financial Times: Banks Eye CDS Clearing House, April 18, 2008. – reference: M. Waldman, R. AD, C. LF, Publius: A robust, tamper-evident, censorship-resistant web publishing system, in: Proceedings of the Ninth USENIX Security Symposium, August 2000. – volume: 5 year: 1994 ident: bib39 article-title: Measuring product market efficiency: a new methodology publication-title: Market. Lett. – volume: 10 start-page: 95 year: 2006 end-page: 120 ident: bib28 article-title: The role of reputation systems in reducing on-line auction fraud publication-title: Int. J. Electron. Commerce – reference: M. Castro, P. Druschel, A. Ganesh, R. A, D. Wallach, Secure routing for structured peer-to-peer overlay networks, in: Proceedings of the Fifth Usenix Symposium on Operating Systems, Boston, MA, December 2002. – reference: A. Singh, L. Liu, Trustme: anonymous management of trust relationships in decentralized p2p systems, in: Proceedings of the IEEE International Conference on Peer-to-Peer Computing, September 2003. – reference: J. Douceur, The Sybill attack, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002. – reference: R. Dingledine, M. Freedman, D. Molnar, Peer-to-peer: harnessing the power of disruptive technology, first ed., O’Reilly, Ch. 1, a network of peers: peer-to-peer models through the history of the internet, March 2001, pp. 3–20. – volume: 17 start-page: 244 year: 2005 end-page: 254 ident: bib21 article-title: Evaluation and design of online cooperative feedback mechanisms for reputation management publication-title: IEEE Trans. Knowl. Data Eng. – reference: C. Dellarocas, P. Resnick, Online reputation mechanisms: A roadmap for future research summary report, in: Proceedings of the First Interdisciplinary Symposium on Online Reputation Mechanisms, April 26–27, 2003. – reference: S. Saroiu, P. Gummadi, S. Gribble, Exploring the design space of distributed peer-to-peer systems: comparing the web, TRIAD and Chord/CFS, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002. – reference: K. Walsh, E. Gun Sirer, Fighting peer-to-peer spam and decoys with object reputation, in: Proceedings of the SIGCOMM’05 Conference Workshops, Philadelphia, PA, August 2005. – reference: E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington DC, November 2002. – year: 2002 ident: bib5 article-title: An Introduction to Credit Risk Modelling – volume: 19 year: 2002 ident: bib44 article-title: A longitudinal price comparison for music cds in electronic and brick-and-mortar markets: pricing strategies in emergent electronic commerce publication-title: J. Business Strategies – reference: M.R. Baye, J. Morgan, P. Scholten, Information, search, and price dispersion. Working Papers 2006-11, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy, 2006. – year: 2008 ident: bib48 article-title: Options Futures and Other Derivatives – reference: MojoNation, The MojoNation, – reference: C. Gorg, E. Lamers, D. Fuss, P. Heegaard, Rare event simulation, Computer Systems and Telematics, Norwegian Institute of Technology, Tech. Rep. COST 257, 2001. – reference: J. Hring, Different prices for identical products? Market efficiency and the virtual location in b2c e-commerce, ZEW Discussion Papers 03-68, ZEW-Zentrum for Europische Wirtschaftsforschung/Center for European Economic Research, 2003. – reference: Econ080417, The Economist: Clearing the Fog, April 17, 2008. – reference: R. Jurka, B. Faltings, Collusion-resistant, incentives-compatible feedback payments, in: Proceedings of the EC07 Conference, San Diego, CA, June 2007. – reference: S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in p2p networks, in: Proceedings of the 12th International Conference on World Wide Web, ACM Press, New York, 2003, pp. 640–651. – reference: S. Buchegger, J.-Y.L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, in: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004. – reference: M. Feldman, C. Papadimitriou, J. Chuang, I. Stoica, Free-riding and whitewashing in peer-to-peer systems, in: Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS2004), May 2004b. – reference: H. Zhang, A. Goel, et al., Improving eigenvector-based reputation systems against collusion, Tech. Rep., Stanford University, Workshop on Algorithms and Models for the Web Graph (WAW), October 2004. – reference: M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of the NOSSDAV’03 Conference. Monterey, CA, June 1–3, 2003. – year: 2002 ident: bib12 article-title: Investment Valuation – year: 1982 ident: bib37 publication-title: Judgement Under Uncertainty: Heuristics and Biases – volume: 16 year: 2004 ident: bib60 article-title: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities publication-title: IEEE Trans. Knowl. Data Eng. – reference: M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, in: Proceedings of the EC04 Conference, May 2004a. – volume: 51 start-page: 89 year: 2008 end-page: 97 ident: bib25 article-title: Reducing internet auction fraud publication-title: Commun. ACM – start-page: 310 year: 2001 end-page: 317 ident: bib2 article-title: Managing trust in a peer-2-peer information system publication-title: Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01) – reference: S. Kinsella, S. Raghavendra, Case study of price dispersion in online markets, Tech. Rep., Digital Enterprise Research Institute, Ireland, – reference: P. Resnick, R. Zeckhauser, Advances in applied microeconomics, vol. 11. Ch. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. The Economics of the Internet and e-Commerce, JAI Press, Amsterdam, 2002. – volume: 185 start-page: 1124 year: 1974 end-page: 1131 ident: bib55 article-title: Judgment under uncertainty: heuristics and biases publication-title: Science – reference: D. Wallach, A survey of peer-to-peer security issues, in: International Symposium on Software Security, Tokyo, Japan, November 2002. – reference: I. Clarke, O. Sandberg, B. Wiley, Freenet: a distributed anonymous information storage and/retrieval system, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, June 2000. – reference: S. Marti, P. Ganesan, H. Garcia-Molina, DHT routing using social links, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS 2004), 2004. – reference: K. Walsh, E. Gon Sirer, Experience with an object reputation system for peer-to-peer filesharing, in: Proceedings of the Symposium on Networked System Design and Implementation, San Jose, CA, 2006 – volume: 5 start-page: 43 year: 1995 end-page: 85 ident: bib32 article-title: Fast simulation of rare events in queueing and reliability models publication-title: ACM Trans. Model. Comput. Simul. – year: 2007 ident: bib43 article-title: Essentials of Economics – volume: 51 start-page: 69 year: 2008 end-page: 74 ident: bib29 article-title: A typology of complaints about ebay sellers publication-title: Commun. ACM – reference: A. Datta, M. Hauswirth, K. Aberer, Beyond ’web of trust’: Enabling p2p e-commerce, in: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC’03), 2003. – ident: 10.1016/j.comnet.2009.10.005_bib49 – ident: 10.1016/j.comnet.2009.10.005_bib9 doi: 10.1007/3-540-44702-4_4 – ident: 10.1016/j.comnet.2009.10.005_bib35 doi: 10.1145/1250910.1250940 – year: 2002 ident: 10.1016/j.comnet.2009.10.005_bib12 – ident: 10.1016/j.comnet.2009.10.005_bib41 – ident: 10.1016/j.comnet.2009.10.005_bib16 doi: 10.1145/375348.377427 – ident: 10.1016/j.comnet.2009.10.005_bib58 – volume: 5 start-page: 43 issue: 1 year: 1995 ident: 10.1016/j.comnet.2009.10.005_bib32 article-title: Fast simulation of rare events in queueing and reliability models publication-title: ACM Trans. Model. Comput. Simul. doi: 10.1145/203091.203094 – volume: 51 start-page: 69 issue: 4 year: 2008 ident: 10.1016/j.comnet.2009.10.005_bib29 article-title: A typology of complaints about ebay sellers publication-title: Commun. ACM doi: 10.1145/1330311.1330326 – ident: 10.1016/j.comnet.2009.10.005_bib31 doi: 10.1007/3-540-45748-8_13 – volume: 36 start-page: 335 issue: 4 year: 2004 ident: 10.1016/j.comnet.2009.10.005_bib3 article-title: A survey of peer-to-peer content distribution technologies publication-title: ACM Computing Surveys doi: 10.1145/1041680.1041681 – start-page: 310 year: 2001 ident: 10.1016/j.comnet.2009.10.005_bib2 article-title: Managing trust in a peer-2-peer information system – year: 2008 ident: 10.1016/j.comnet.2009.10.005_bib48 – ident: 10.1016/j.comnet.2009.10.005_bib59 doi: 10.1145/1080192.1080204 – year: 2004 ident: 10.1016/j.comnet.2009.10.005_bib6 – year: 2007 ident: 10.1016/j.comnet.2009.10.005_bib43 – ident: 10.1016/j.comnet.2009.10.005_bib27 doi: 10.1007/978-1-4615-0863-2_21 – ident: 10.1016/j.comnet.2009.10.005_bib11 doi: 10.1145/586110.586138 – ident: 10.1016/j.comnet.2009.10.005_bib30 doi: 10.1145/776322.776346 – ident: 10.1016/j.comnet.2009.10.005_bib61 doi: 10.1007/978-3-540-30216-2_8 – ident: 10.1016/j.comnet.2009.10.005_bib23 doi: 10.1145/1016527.1016539 – ident: 10.1016/j.comnet.2009.10.005_bib17 – ident: 10.1016/j.comnet.2009.10.005_bib13 – volume: 25 start-page: 383 issue: 2 year: 1970 ident: 10.1016/j.comnet.2009.10.005_bib20 article-title: Efficient capital markets: a review of theory and empirical work publication-title: J. Finance doi: 10.2307/2325486 – volume: 40 start-page: 45 issue: 2 year: 2007 ident: 10.1016/j.comnet.2009.10.005_bib34 article-title: Trust management in distributed systems publication-title: IEEE Comput. doi: 10.1109/MC.2007.76 – volume: 451 start-page: 893 issue: 21 year: 2008 ident: 10.1016/j.comnet.2009.10.005_bib46 article-title: Complex systems: ecology for bankers publication-title: Nature doi: 10.1038/451893a – volume: 17 start-page: 244 issue: 2 year: 2005 ident: 10.1016/j.comnet.2009.10.005_bib21 article-title: Evaluation and design of online cooperative feedback mechanisms for reputation management publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2005.26 – ident: 10.1016/j.comnet.2009.10.005_bib24 – ident: 10.1016/j.comnet.2009.10.005_bib50 doi: 10.1007/3-540-45748-8_20 – ident: 10.1016/j.comnet.2009.10.005_bib18 – ident: 10.1016/j.comnet.2009.10.005_bib47 – volume: 51 start-page: 89 issue: 5 year: 2008 ident: 10.1016/j.comnet.2009.10.005_bib25 article-title: Reducing internet auction fraud publication-title: Commun. ACM doi: 10.1145/1342327.1342343 – year: 2005 ident: 10.1016/j.comnet.2009.10.005_bib51 – ident: 10.1016/j.comnet.2009.10.005_bib22 doi: 10.1145/988772.988788 – ident: 10.1016/j.comnet.2009.10.005_bib33 – ident: 10.1016/j.comnet.2009.10.005_bib62 – ident: 10.1016/j.comnet.2009.10.005_bib4 doi: 10.1016/S1574-0145(06)01006-3 – ident: 10.1016/j.comnet.2009.10.005_bib53 doi: 10.1007/11530657 – ident: 10.1016/j.comnet.2009.10.005_bib56 – ident: 10.1016/j.comnet.2009.10.005_bib45 doi: 10.1007/978-3-540-30183-7_10 – volume: 185 start-page: 1124 issue: 4157 year: 1974 ident: 10.1016/j.comnet.2009.10.005_bib55 article-title: Judgment under uncertainty: heuristics and biases publication-title: Science doi: 10.1126/science.185.4157.1124 – ident: 10.1016/j.comnet.2009.10.005_bib52 – ident: 10.1016/j.comnet.2009.10.005_bib14 – ident: 10.1016/j.comnet.2009.10.005_bib57 doi: 10.1007/3-540-36532-X_4 – ident: 10.1016/j.comnet.2009.10.005_bib7 – ident: 10.1016/j.comnet.2009.10.005_bib19 – volume: 51 start-page: 1643 issue: 11 year: 2005 ident: 10.1016/j.comnet.2009.10.005_bib26 article-title: Importance sampling for portfolio credit risk publication-title: Manage. Sci. doi: 10.1287/mnsc.1050.0415 – ident: 10.1016/j.comnet.2009.10.005_bib42 – volume: 19 issue: 1 year: 2002 ident: 10.1016/j.comnet.2009.10.005_bib44 article-title: A longitudinal price comparison for music cds in electronic and brick-and-mortar markets: pricing strategies in emergent electronic commerce publication-title: J. Business Strategies doi: 10.54155/jbs.19.1.55-72 – volume: 16 issue: 16 year: 2004 ident: 10.1016/j.comnet.2009.10.005_bib60 article-title: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities publication-title: IEEE Trans. Knowl. Data Eng. – volume: 65 start-page: 1 issue: 1 year: 1957 ident: 10.1016/j.comnet.2009.10.005_bib54 article-title: Perfect competition, historically contemplated publication-title: J. Political Econ. doi: 10.1086/257878 – volume: 2172 start-page: 179 year: 2001 ident: 10.1016/j.comnet.2009.10.005_bib1 article-title: P-Grid: A self-organizing access structure for P2P information systems publication-title: Lecture Notes in Computer Science doi: 10.1007/3-540-44751-2_15 – year: 2002 ident: 10.1016/j.comnet.2009.10.005_bib5 – year: 1982 ident: 10.1016/j.comnet.2009.10.005_bib37 – volume: 10 start-page: 95 issue: 3 year: 2006 ident: 10.1016/j.comnet.2009.10.005_bib28 article-title: The role of reputation systems in reducing on-line auction fraud publication-title: Int. J. Electron. Commerce doi: 10.2753/JEC1086-4415100304 – ident: 10.1016/j.comnet.2009.10.005_bib36 – ident: 10.1016/j.comnet.2009.10.005_bib8 doi: 10.1145/1060289.1060317 – volume: 5 issue: 1 year: 1994 ident: 10.1016/j.comnet.2009.10.005_bib39 article-title: Measuring product market efficiency: a new methodology publication-title: Market. Lett. doi: 10.1007/BF00993960 – year: 2000 ident: 10.1016/j.comnet.2009.10.005_bib38 – ident: 10.1016/j.comnet.2009.10.005_bib15 – ident: 10.1016/j.comnet.2009.10.005_bib10 doi: 10.1145/633042.633043 – ident: 10.1016/j.comnet.2009.10.005_bib40 doi: 10.1145/775240.775242 |
SSID | ssj0004428 |
Score | 1.9072733 |
Snippet | Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P
trim, a system that builds a... Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by Ptrim, a system that builds a... Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by PTRIM, a system that builds a... |
SourceID | proquest pascalfrancis crossref elsevier |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 675 |
SubjectTerms | Applied sciences Business and industry local networks Electronic commerce Exact sciences and technology Financial markets Miscellaneous Networks Networks and services in france and abroad Peer to peer computing Peer-to-peer networks Peers Reputation management Risk management Studies Telecommunications Telecommunications and information theory Teleprocessing networks. Isdn Transaction costs Transaction processing Transactions Valuation and optimization of characteristics. Simulation |
Title | A market-based approach to managing the risk of peer-to-peer transactions |
URI | https://dx.doi.org/10.1016/j.comnet.2009.10.005 https://www.proquest.com/docview/199678617 https://www.proquest.com/docview/742900427 |
Volume | 54 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB5WvSgiPnFdXXLwGrebpG1yXERZXfTgA72VTZOAgu3idq_-didp6wMRwVMhbdowSeYbmm_mAzgexjLHQJ5Rf8xDhTUp1TaRNNKIHbERRic-OfnqOhnfi8vH-LEDp20ujKdVNr6_9unBWzctg8aag9nT0-A2HLExmUQq1LdMl2CFcZXg0l4ZXUzG15_pkSJIrPrnqe_QZtAFmhe-vrBVXbgy0Lzi3xBqfTado91cLXjxw3cHQDrfhI0mkiSjerBb0LHFNqx9qS-4Axcj8hKymqkHK0PaAuKkKslLI1BEMAIknmBOSkdm2JNWJfVXUn1Kic934f787O50TBvtBJpzISpqteI8TaVTSR457Ry3uVHKSuPiae4wjrII9JobhSjJ8jg2kZGxsAlzwzRxQ74Hy0VZ2H0gTFiHmKUjJ3N0q0xLxZjNJXfcmKnmXaCtvbJZXSIja7ljz1ltX692qXwr2rcLaWvU7NtUZ-jF_-jZ_zYHH59Dp-R_zYgu9NpJyZq9OM88zzqVGKl1gXzcxU3kT0amhS0X8yxFVA6qIwf_HlsPVmtigaCRPITl6nVhjzBeqXQflk7ehv1mVfrr5OZh8g4pd-xs |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58HFREfOK6uubgNW63Sdv0uCzK-tqLCt7CpklAYdvi1qu_3UnaroqI4KmQJm2YdOYbOt_MAJwNIpGhIx9SF-ah3OiEKhMLGijEjkhzrWKXnHw3iceP_PopelqCUZsL42iVje2vbbq31s1Iv5Fmv3x-7t_7EFso4iD19S2TZVjlqL5OO8_fP3kenPsGq242ddPb_DlP8sKH56aqy1Z6klf0Gz5tltM5Ss3W7S5-WG4PR5fbsNX4kWRYb3UHlky-CxtfqgvuwdWQzHxOM3VQpUlbPpxUBZk17YkI-n_E0ctJYUmJK2lVUHcl1Wcj8fk-PF5ePIzGtOmcQDPGeUWNShlLEmHTOAusspaZTKepEdpG08yiF2UQ5hXTKWJkmEWRDrSIuIlDO0hiO2AHsJIXuTkEEnJjEbFUYEWGRjVUIg1DkwlmmdZTxTpAW3nJsi6QIVvm2Ius5et6XaZuFOXbgaQVqvx20BJt-B8re9_OYPE6NEnuxwzvQLc9FNlo4lw6lnUi0E_rAFncRRVycZFpboq3uUwQk33PkaN_7-0U1sYPd7fy9mpy04X1mmLAaSCOYaV6fTMn6LlUque_zA-4CuuN |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+market-based+approach+to+managing+the+risk+of+peer-to-peer+transactions&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Androutsellis-Theotokis%2C+Stephanos&rft.au=Spinellis%2C+Diomidis&rft.au=Louridas%2C+Panos&rft.au=Stroggylos%2C+Kostas&rft.date=2010-04-08&rft.pub=Elsevier+B.V&rft.issn=1389-1286&rft.eissn=1872-7069&rft.volume=54&rft.issue=5&rft.spage=675&rft.epage=688&rft_id=info:doi/10.1016%2Fj.comnet.2009.10.005&rft.externalDocID=S1389128609003107 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon |