A market-based approach to managing the risk of peer-to-peer transactions

Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P trim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight...

Full description

Saved in:
Bibliographic Details
Published inComputer networks (Amsterdam, Netherlands : 1999) Vol. 54; no. 5; pp. 675 - 688
Main Authors Androutsellis-Theotokis, Stephanos, Spinellis, Diomidis, Louridas, Panos, Stroggylos, Kostas
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier B.V 08.04.2010
Elsevier
Elsevier Sequoia S.A
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P trim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed P trim prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the P trim market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like P trim assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil.
AbstractList Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P trim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed P trim prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the P trim market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like P trim assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil.
Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by Ptrim, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed Ptrim prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the Ptrim market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like Ptrim assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil. [PUBLICATION ABSTRACT]
Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by PTRIM, a system that builds a transaction default market on top of a main transaction processing system, within which peers offer to underwrite the transaction risk for a slight increase in the transaction cost. The insurance cost, determined through market-based mechanisms, is a way of identifying untrustworthy peers and perilous transactions. The risk of the transactions is contained, and at the same time members of the peer-to-peer network capitalise on their market knowledge by profiting as transaction insurers. We evaluated the approach through trials with the deployed PTRIM prototype, as well as composite experiments involving real online transaction data and real subjects participating in the transaction default market. We examine the efficacy of our approach both from a theoretical and an experimental perspective. Our findings suggest that the PTRIM market layer functions in an efficient manner, and is able to support the transaction processing system through the insurance offers it produces, thus acting as an effective means of reducing the risk of peer-to-peer transactions. In our conclusions we discuss how a system like PTRIM assimilates properties of real world markets, and its potential exposure and possible countermeasures to events such as those witnessed in the recent global financial turmoil. Adapted from the source document.
Author Louridas, Panos
Stroggylos, Kostas
Spinellis, Diomidis
Androutsellis-Theotokis, Stephanos
Author_xml – sequence: 1
  givenname: Stephanos
  surname: Androutsellis-Theotokis
  fullname: Androutsellis-Theotokis, Stephanos
  email: stheotok@aueb.gr
– sequence: 2
  givenname: Diomidis
  surname: Spinellis
  fullname: Spinellis, Diomidis
– sequence: 3
  givenname: Panos
  surname: Louridas
  fullname: Louridas, Panos
– sequence: 4
  givenname: Kostas
  surname: Stroggylos
  fullname: Stroggylos, Kostas
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=22500934$$DView record in Pascal Francis
BookMark eNp9kU1LAzEQhoNUsFX_gYdFEE9b87FfuQil-FEoeNFzyGYnbbZtUpNU8N-bpcWDB08zzDwzzLzvBI2ss4DQDcFTgkn10E-V21mIU4oxT6UpxuUZGpOmpnmNKz5KOWt4TmhTXaBJCD3GuChoM0aLWbaTfgMxb2WALpP7vXdSrbPoUsPKlbGrLK4h8yZsMqezPYDPo8uHmEUvbZAqGmfDFTrXchvg-hQv0cfz0_v8NV--vSzms2WuWFHEHFrOWF03mlcK61ZrBqrjHJpOl1JpyihQzlrWcQVAVVl2uGvKAiqqSV1pwi7R_XFvOvTzACGKnQkKtltpwR2CqAvK03e0TuTtH7J3B2_TcYJwXtVNRQbo7gTJoORWp4-UCWLvTdLlW1BaJk1ZkbjiyCnvQvCgfxGCxeCC6MXRBTG4MFSTC2ns8TgGSZIvA14EZcAq6IwHFUXnzP8LfgA6-JOc
CODEN CNETDP
Cites_doi 10.1007/3-540-44702-4_4
10.1145/1250910.1250940
10.1145/375348.377427
10.1145/203091.203094
10.1145/1330311.1330326
10.1007/3-540-45748-8_13
10.1145/1041680.1041681
10.1145/1080192.1080204
10.1007/978-1-4615-0863-2_21
10.1145/586110.586138
10.1145/776322.776346
10.1007/978-3-540-30216-2_8
10.1145/1016527.1016539
10.2307/2325486
10.1109/MC.2007.76
10.1038/451893a
10.1109/TKDE.2005.26
10.1007/3-540-45748-8_20
10.1145/1342327.1342343
10.1145/988772.988788
10.1016/S1574-0145(06)01006-3
10.1007/11530657
10.1007/978-3-540-30183-7_10
10.1126/science.185.4157.1124
10.1007/3-540-36532-X_4
10.1287/mnsc.1050.0415
10.54155/jbs.19.1.55-72
10.1086/257878
10.1007/3-540-44751-2_15
10.2753/JEC1086-4415100304
10.1145/1060289.1060317
10.1007/BF00993960
10.1145/633042.633043
10.1145/775240.775242
ContentType Journal Article
Copyright 2009 Elsevier B.V.
2015 INIST-CNRS
Copyright Elsevier Sequoia S.A. Apr 8, 2010
Copyright_xml – notice: 2009 Elsevier B.V.
– notice: 2015 INIST-CNRS
– notice: Copyright Elsevier Sequoia S.A. Apr 8, 2010
DBID AAYXX
CITATION
IQODW
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.comnet.2009.10.005
DatabaseName CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Library and Information Science Abstracts (LISA)
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EISSN 1872-7069
EndPage 688
ExternalDocumentID 1978218841
22500934
10_1016_j_comnet_2009_10_005
S1389128609003107
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
77K
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
XFK
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
EFKBS
IQODW
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c344t-eb933778f96c0fbff3ecd99e8df5acf232e293b3d9cee2c55d0d854e62f176f13
IEDL.DBID AIKHN
ISSN 1389-1286
IngestDate Mon Jul 21 11:40:50 EDT 2025
Fri Jul 25 04:29:53 EDT 2025
Mon Jul 21 09:14:22 EDT 2025
Tue Jul 01 03:28:56 EDT 2025
Fri Feb 23 02:21:13 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords Reputation management
Financial markets
Transaction processing
Peer-to-peer networks
Peer to peer
Prototype
Computer network
On-line systems
Financial market
Resource sharing
Local network
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c344t-eb933778f96c0fbff3ecd99e8df5acf232e293b3d9cee2c55d0d854e62f176f13
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
PQID 199678617
PQPubID 47119
PageCount 14
ParticipantIDs proquest_miscellaneous_742900427
proquest_journals_199678617
pascalfrancis_primary_22500934
crossref_primary_10_1016_j_comnet_2009_10_005
elsevier_sciencedirect_doi_10_1016_j_comnet_2009_10_005
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2010-04-08
PublicationDateYYYYMMDD 2010-04-08
PublicationDate_xml – month: 04
  year: 2010
  text: 2010-04-08
  day: 08
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
– name: Amsterdam
PublicationTitle Computer networks (Amsterdam, Netherlands : 1999)
PublicationYear 2010
Publisher Elsevier B.V
Elsevier
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier
– name: Elsevier Sequoia S.A
References P. Druschel, A. Rowstron, Past: a large-scale, persistent peer-to-peer storage utility, in: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, May 2001.
June 2005 (accessed on 2008).
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in p2p networks, in: Proceedings of the 12th International Conference on World Wide Web, ACM Press, New York, 2003, pp. 640–651.
Fan, Tan, Whinston (bib21) 2005; 17
S. Hand, T. Roscoe, Mnemosyne: peer-to-peer steganographic storage, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
A. Kritikopoulos, M. Sideri, K. Stroggylos, Crawlwave: a distributed crawler, in: Proceedings of the Third Hellenic Conference on Artificial Intelligence (SETN ’04), May 2004.
Tversky, Kahneman (bib55) 1974; 185
E. Cohen, S. Shenker, Replication strategies in unstructured peer-to-peer networks, in: SIGCOMM ’02: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, USA, 2002, pp. 177–190.
S. Marti, P. Ganesan, H. Garcia-Molina, DHT routing using social links, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS 2004), 2004.
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington DC, November 2002.
Kalita (bib39) 1994; 5
M. Feldman, C. Papadimitriou, J. Chuang, I. Stoica, Free-riding and whitewashing in peer-to-peer systems, in: Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS2004), May 2004b.
Glasserman, Li (bib26) 2005; 51
S. Kinsella, S. Raghavendra, Case study of price dispersion in online markets, Tech. Rep., Digital Enterprise Research Institute, Ireland
M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of the NOSSDAV’03 Conference. Monterey, CA, June 1–3, 2003.
JXTA, The Project JXTA Web Site
Heidelberger (bib32) 1995; 5
Stigler (bib54) 1957; 65
M. Waldman, R. AD, C. LF, Publius: A robust, tamper-evident, censorship-resistant web publishing system, in: Proceedings of the Ninth USENIX Security Symposium, August 2000.
Gavish, Tucci (bib25) 2008; 51
Huaizhi, Singhal (bib34) 2007; 40
A. Datta, M. Hauswirth, K. Aberer, Beyond ’web of trust’: Enabling p2p e-commerce, in: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC’03), 2003.
(bib37) 1982
Aberer (bib1) 2001; 2172
K. Walsh, E. Gun Sirer, Fighting peer-to-peer spam and decoys with object reputation, in: Proceedings of the SIGCOMM’05 Conference Workshops, Philadelphia, PA, August 2005.
May, Levin, Sugihara (bib46) 2008; 451
Gregg, Scott (bib28) 2006; 10
MojoNation, The MojoNation
A. Singh, L. Liu, Trustme: anonymous management of trust relationships in decentralized p2p systems, in: Proceedings of the IEEE International Conference on Peer-to-Peer Computing, September 2003.
Fama (bib20) 1970; 25
P. Resnick, R. Zeckhauser, Advances in applied microeconomics, vol. 11. Ch. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. The Economics of the Internet and e-Commerce, JAI Press, Amsterdam, 2002.
Xiong, Liu (bib60) 2004; 16
C. Dellarocas, P. Resnick, Online reputation mechanisms: A roadmap for future research summary report, in: Proceedings of the First Interdisciplinary Symposium on Online Reputation Mechanisms, April 26–27, 2003.
D. Wallach, A survey of peer-to-peer security issues, in: International Symposium on Software Security, Tokyo, Japan, November 2002.
J. Douceur, The Sybill attack, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
Aberer, Despotovic (bib2) 2001
Krugman, Wells, Olney (bib43) 2007
Gregg, Scott (bib29) 2008; 51
Shiller (bib51) 2005
K. Walsh, E. Gon Sirer, Experience with an object reputation system for peer-to-peer filesharing, in: Proceedings of the Symposium on Networked System Design and Implementation, San Jose, CA, 2006
Econ080417, The Economist: Clearing the Fog, April 17, 2008.
R. Dingledine, M. Freedman, D. Molnar, Peer-to-peer: harnessing the power of disruptive technology, first ed., O’Reilly, Ch. 1, a network of peers: peer-to-peer models through the history of the internet, March 2001, pp. 3–20.
Damodaran (bib12) 2002
FT080418, Financial Times: Banks Eye CDS Clearing House, April 18, 2008.
Bluhm, Overbeck, Wagner (bib5) 2002
C. Dellarocas, Information Society or Information Economy? A Combined Perspective on the Digital Era, IDEA Book Publishing, Hershey, PA, Ch. Building Trust On-Line: The Design of Robust Reputation Mechanisms for Online Trading Communities, 2004.
2007 (accessed on 2007).
Bonfim (bib6) 2004
S. Buchegger, J.-Y.L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, in: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004.
B. Zhao, J. Kubiatowicz, A. Joseph, Tapestry: an infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, 94720, April 2001.
K. Steinmetz, K. Wehrle (Eds.), Peer-to-Peer Systems and Applications, Springer Lecture Notes in Computer Science 3485, 2005.
2007.
M.R. Baye, J. Morgan, P. Scholten, Information, search, and price dispersion. Working Papers 2006-11, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy, 2006.
S. Saroiu, P. Gummadi, S. Gribble, Exploring the design space of distributed peer-to-peer systems: comparing the web, TRIAD and Chord/CFS, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
(bib38) 2000
I. Clarke, O. Sandberg, B. Wiley, Freenet: a distributed anonymous information storage and/retrieval system, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, June 2000.
Androutsellis-Theotokis, Spinellis (bib3) 2004; 36
M. Castro, P. Druschel, A. Ganesh, R. A, D. Wallach, Secure routing for structured peer-to-peer overlay networks, in: Proceedings of the Fifth Usenix Symposium on Operating Systems, Boston, MA, December 2002.
Lee, Gosain (bib44) 2002; 19
C. Gorg, E. Lamers, D. Fuss, P. Heegaard, Rare event simulation, Computer Systems and Telematics, Norwegian Institute of Technology, Tech. Rep. COST 257, 2001.
M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, in: Proceedings of the EC04 Conference, May 2004a.
Hull (bib48) 2008
H. Zhang, A. Goel, et al., Improving eigenvector-based reputation systems against collusion, Tech. Rep., Stanford University, Workshop on Algorithms and Models for the Web Graph (WAW), October 2004.
J. Hring, Different prices for identical products? Market efficiency and the virtual location in b2c e-commerce, ZEW Discussion Papers 03-68, ZEW-Zentrum for Europische Wirtschaftsforschung/Center for European Economic Research, 2003.
R. Jurka, B. Faltings, Collusion-resistant, incentives-compatible feedback payments, in: Proceedings of the EC07 Conference, San Diego, CA, June 2007.
Androutsellis-Theotokis (10.1016/j.comnet.2009.10.005_bib3) 2004; 36
Fan (10.1016/j.comnet.2009.10.005_bib21) 2005; 17
10.1016/j.comnet.2009.10.005_bib50
10.1016/j.comnet.2009.10.005_bib53
Damodaran (10.1016/j.comnet.2009.10.005_bib12) 2002
10.1016/j.comnet.2009.10.005_bib52
10.1016/j.comnet.2009.10.005_bib11
10.1016/j.comnet.2009.10.005_bib10
10.1016/j.comnet.2009.10.005_bib13
10.1016/j.comnet.2009.10.005_bib57
Stigler (10.1016/j.comnet.2009.10.005_bib54) 1957; 65
10.1016/j.comnet.2009.10.005_bib56
10.1016/j.comnet.2009.10.005_bib15
10.1016/j.comnet.2009.10.005_bib59
10.1016/j.comnet.2009.10.005_bib14
Kalita (10.1016/j.comnet.2009.10.005_bib39) 1994; 5
10.1016/j.comnet.2009.10.005_bib58
10.1016/j.comnet.2009.10.005_bib17
10.1016/j.comnet.2009.10.005_bib16
10.1016/j.comnet.2009.10.005_bib19
10.1016/j.comnet.2009.10.005_bib18
Glasserman (10.1016/j.comnet.2009.10.005_bib26) 2005; 51
Gavish (10.1016/j.comnet.2009.10.005_bib25) 2008; 51
10.1016/j.comnet.2009.10.005_bib40
Gregg (10.1016/j.comnet.2009.10.005_bib28) 2006; 10
10.1016/j.comnet.2009.10.005_bib42
10.1016/j.comnet.2009.10.005_bib41
Aberer (10.1016/j.comnet.2009.10.005_bib1) 2001; 2172
Heidelberger (10.1016/j.comnet.2009.10.005_bib32) 1995; 5
10.1016/j.comnet.2009.10.005_bib45
Bluhm (10.1016/j.comnet.2009.10.005_bib5) 2002
Fama (10.1016/j.comnet.2009.10.005_bib20) 1970; 25
10.1016/j.comnet.2009.10.005_bib47
10.1016/j.comnet.2009.10.005_bib49
10.1016/j.comnet.2009.10.005_bib4
(10.1016/j.comnet.2009.10.005_bib38) 2000
Shiller (10.1016/j.comnet.2009.10.005_bib51) 2005
(10.1016/j.comnet.2009.10.005_bib37) 1982
10.1016/j.comnet.2009.10.005_bib31
10.1016/j.comnet.2009.10.005_bib30
10.1016/j.comnet.2009.10.005_bib33
10.1016/j.comnet.2009.10.005_bib35
10.1016/j.comnet.2009.10.005_bib36
Tversky (10.1016/j.comnet.2009.10.005_bib55) 1974; 185
10.1016/j.comnet.2009.10.005_bib8
10.1016/j.comnet.2009.10.005_bib7
Bonfim (10.1016/j.comnet.2009.10.005_bib6) 2004
10.1016/j.comnet.2009.10.005_bib9
Hull (10.1016/j.comnet.2009.10.005_bib48) 2008
May (10.1016/j.comnet.2009.10.005_bib46) 2008; 451
Lee (10.1016/j.comnet.2009.10.005_bib44) 2002; 19
Huaizhi (10.1016/j.comnet.2009.10.005_bib34) 2007; 40
Xiong (10.1016/j.comnet.2009.10.005_bib60) 2004; 16
10.1016/j.comnet.2009.10.005_bib62
10.1016/j.comnet.2009.10.005_bib61
Gregg (10.1016/j.comnet.2009.10.005_bib29) 2008; 51
10.1016/j.comnet.2009.10.005_bib22
10.1016/j.comnet.2009.10.005_bib24
10.1016/j.comnet.2009.10.005_bib23
Aberer (10.1016/j.comnet.2009.10.005_bib2) 2001
10.1016/j.comnet.2009.10.005_bib27
Krugman (10.1016/j.comnet.2009.10.005_bib43) 2007
References_xml – reference: P. Druschel, A. Rowstron, Past: a large-scale, persistent peer-to-peer storage utility, in: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, May 2001.
– reference: S. Hand, T. Roscoe, Mnemosyne: peer-to-peer steganographic storage, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
– volume: 40
  start-page: 45
  year: 2007
  end-page: 53
  ident: bib34
  article-title: Trust management in distributed systems
  publication-title: IEEE Comput.
– volume: 2172
  start-page: 179
  year: 2001
  end-page: 194
  ident: bib1
  article-title: P-Grid: A self-organizing access structure for P2P information systems
  publication-title: Lecture Notes in Computer Science
– reference: E. Cohen, S. Shenker, Replication strategies in unstructured peer-to-peer networks, in: SIGCOMM ’02: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pittsburgh, PA, USA, 2002, pp. 177–190.
– reference: JXTA, The Project JXTA Web Site,
– year: 2005
  ident: bib51
  article-title: Irrational Exuberance
– volume: 25
  start-page: 383
  year: 1970
  end-page: 417
  ident: bib20
  article-title: Efficient capital markets: a review of theory and empirical work
  publication-title: J. Finance
– volume: 36
  start-page: 335
  year: 2004
  end-page: 371
  ident: bib3
  article-title: A survey of peer-to-peer content distribution technologies
  publication-title: ACM Computing Surveys
– reference: , 2007 (accessed on 2007).
– reference: K. Steinmetz, K. Wehrle (Eds.), Peer-to-Peer Systems and Applications, Springer Lecture Notes in Computer Science 3485, 2005.
– reference: June 2005 (accessed on 2008).
– volume: 65
  start-page: 1
  year: 1957
  end-page: 17
  ident: bib54
  article-title: Perfect competition, historically contemplated
  publication-title: J. Political Econ.
– year: 2000
  ident: bib38
  publication-title: Choices, Values and Frames
– reference: B. Zhao, J. Kubiatowicz, A. Joseph, Tapestry: an infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD-01-1141, Computer Science Division, University of California, Berkeley, 94720, April 2001.
– volume: 451
  start-page: 893
  year: 2008
  end-page: 895–55
  ident: bib46
  article-title: Complex systems: ecology for bankers
  publication-title: Nature
– year: 2004
  ident: bib6
  article-title: Understanding Credit Derivatives and Related Instruments
– reference: A. Kritikopoulos, M. Sideri, K. Stroggylos, Crawlwave: a distributed crawler, in: Proceedings of the Third Hellenic Conference on Artificial Intelligence (SETN ’04), May 2004.
– volume: 51
  start-page: 1643
  year: 2005
  end-page: 1656
  ident: bib26
  article-title: Importance sampling for portfolio credit risk
  publication-title: Manage. Sci.
– reference: , 2007.
– reference: C. Dellarocas, Information Society or Information Economy? A Combined Perspective on the Digital Era, IDEA Book Publishing, Hershey, PA, Ch. Building Trust On-Line: The Design of Robust Reputation Mechanisms for Online Trading Communities, 2004.
– reference: FT080418, Financial Times: Banks Eye CDS Clearing House, April 18, 2008.
– reference: M. Waldman, R. AD, C. LF, Publius: A robust, tamper-evident, censorship-resistant web publishing system, in: Proceedings of the Ninth USENIX Security Symposium, August 2000.
– volume: 5
  year: 1994
  ident: bib39
  article-title: Measuring product market efficiency: a new methodology
  publication-title: Market. Lett.
– volume: 10
  start-page: 95
  year: 2006
  end-page: 120
  ident: bib28
  article-title: The role of reputation systems in reducing on-line auction fraud
  publication-title: Int. J. Electron. Commerce
– reference: M. Castro, P. Druschel, A. Ganesh, R. A, D. Wallach, Secure routing for structured peer-to-peer overlay networks, in: Proceedings of the Fifth Usenix Symposium on Operating Systems, Boston, MA, December 2002.
– reference: A. Singh, L. Liu, Trustme: anonymous management of trust relationships in decentralized p2p systems, in: Proceedings of the IEEE International Conference on Peer-to-Peer Computing, September 2003.
– reference: J. Douceur, The Sybill attack, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
– reference: R. Dingledine, M. Freedman, D. Molnar, Peer-to-peer: harnessing the power of disruptive technology, first ed., O’Reilly, Ch. 1, a network of peers: peer-to-peer models through the history of the internet, March 2001, pp. 3–20.
– volume: 17
  start-page: 244
  year: 2005
  end-page: 254
  ident: bib21
  article-title: Evaluation and design of online cooperative feedback mechanisms for reputation management
  publication-title: IEEE Trans. Knowl. Data Eng.
– reference: C. Dellarocas, P. Resnick, Online reputation mechanisms: A roadmap for future research summary report, in: Proceedings of the First Interdisciplinary Symposium on Online Reputation Mechanisms, April 26–27, 2003.
– reference: S. Saroiu, P. Gummadi, S. Gribble, Exploring the design space of distributed peer-to-peer systems: comparing the web, TRIAD and Chord/CFS, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS ’02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
– reference: K. Walsh, E. Gun Sirer, Fighting peer-to-peer spam and decoys with object reputation, in: Proceedings of the SIGCOMM’05 Conference Workshops, Philadelphia, PA, August 2005.
– reference: E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, in: Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington DC, November 2002.
– year: 2002
  ident: bib5
  article-title: An Introduction to Credit Risk Modelling
– volume: 19
  year: 2002
  ident: bib44
  article-title: A longitudinal price comparison for music cds in electronic and brick-and-mortar markets: pricing strategies in emergent electronic commerce
  publication-title: J. Business Strategies
– reference: M.R. Baye, J. Morgan, P. Scholten, Information, search, and price dispersion. Working Papers 2006-11, Indiana University, Kelley School of Business, Department of Business Economics and Public Policy, 2006.
– year: 2008
  ident: bib48
  article-title: Options Futures and Other Derivatives
– reference: MojoNation, The MojoNation,
– reference: C. Gorg, E. Lamers, D. Fuss, P. Heegaard, Rare event simulation, Computer Systems and Telematics, Norwegian Institute of Technology, Tech. Rep. COST 257, 2001.
– reference: J. Hring, Different prices for identical products? Market efficiency and the virtual location in b2c e-commerce, ZEW Discussion Papers 03-68, ZEW-Zentrum for Europische Wirtschaftsforschung/Center for European Economic Research, 2003.
– reference: Econ080417, The Economist: Clearing the Fog, April 17, 2008.
– reference: R. Jurka, B. Faltings, Collusion-resistant, incentives-compatible feedback payments, in: Proceedings of the EC07 Conference, San Diego, CA, June 2007.
– reference: S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in p2p networks, in: Proceedings of the 12th International Conference on World Wide Web, ACM Press, New York, 2003, pp. 640–651.
– reference: S. Buchegger, J.-Y.L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, in: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004.
– reference: M. Feldman, C. Papadimitriou, J. Chuang, I. Stoica, Free-riding and whitewashing in peer-to-peer systems, in: Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS2004), May 2004b.
– reference: H. Zhang, A. Goel, et al., Improving eigenvector-based reputation systems against collusion, Tech. Rep., Stanford University, Workshop on Algorithms and Models for the Web Graph (WAW), October 2004.
– reference: M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of the NOSSDAV’03 Conference. Monterey, CA, June 1–3, 2003.
– year: 2002
  ident: bib12
  article-title: Investment Valuation
– year: 1982
  ident: bib37
  publication-title: Judgement Under Uncertainty: Heuristics and Biases
– volume: 16
  year: 2004
  ident: bib60
  article-title: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities
  publication-title: IEEE Trans. Knowl. Data Eng.
– reference: M. Feldman, K. Lai, I. Stoica, J. Chuang, Robust incentive techniques for peer-to-peer networks, in: Proceedings of the EC04 Conference, May 2004a.
– volume: 51
  start-page: 89
  year: 2008
  end-page: 97
  ident: bib25
  article-title: Reducing internet auction fraud
  publication-title: Commun. ACM
– start-page: 310
  year: 2001
  end-page: 317
  ident: bib2
  article-title: Managing trust in a peer-2-peer information system
  publication-title: Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01)
– reference: S. Kinsella, S. Raghavendra, Case study of price dispersion in online markets, Tech. Rep., Digital Enterprise Research Institute, Ireland,
– reference: P. Resnick, R. Zeckhauser, Advances in applied microeconomics, vol. 11. Ch. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System. The Economics of the Internet and e-Commerce, JAI Press, Amsterdam, 2002.
– volume: 185
  start-page: 1124
  year: 1974
  end-page: 1131
  ident: bib55
  article-title: Judgment under uncertainty: heuristics and biases
  publication-title: Science
– reference: D. Wallach, A survey of peer-to-peer security issues, in: International Symposium on Software Security, Tokyo, Japan, November 2002.
– reference: I. Clarke, O. Sandberg, B. Wiley, Freenet: a distributed anonymous information storage and/retrieval system, in: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, June 2000.
– reference: S. Marti, P. Ganesan, H. Garcia-Molina, DHT routing using social links, in: Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS 2004), 2004.
– reference: K. Walsh, E. Gon Sirer, Experience with an object reputation system for peer-to-peer filesharing, in: Proceedings of the Symposium on Networked System Design and Implementation, San Jose, CA, 2006
– volume: 5
  start-page: 43
  year: 1995
  end-page: 85
  ident: bib32
  article-title: Fast simulation of rare events in queueing and reliability models
  publication-title: ACM Trans. Model. Comput. Simul.
– year: 2007
  ident: bib43
  article-title: Essentials of Economics
– volume: 51
  start-page: 69
  year: 2008
  end-page: 74
  ident: bib29
  article-title: A typology of complaints about ebay sellers
  publication-title: Commun. ACM
– reference: A. Datta, M. Hauswirth, K. Aberer, Beyond ’web of trust’: Enabling p2p e-commerce, in: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC’03), 2003.
– ident: 10.1016/j.comnet.2009.10.005_bib49
– ident: 10.1016/j.comnet.2009.10.005_bib9
  doi: 10.1007/3-540-44702-4_4
– ident: 10.1016/j.comnet.2009.10.005_bib35
  doi: 10.1145/1250910.1250940
– year: 2002
  ident: 10.1016/j.comnet.2009.10.005_bib12
– ident: 10.1016/j.comnet.2009.10.005_bib41
– ident: 10.1016/j.comnet.2009.10.005_bib16
  doi: 10.1145/375348.377427
– ident: 10.1016/j.comnet.2009.10.005_bib58
– volume: 5
  start-page: 43
  issue: 1
  year: 1995
  ident: 10.1016/j.comnet.2009.10.005_bib32
  article-title: Fast simulation of rare events in queueing and reliability models
  publication-title: ACM Trans. Model. Comput. Simul.
  doi: 10.1145/203091.203094
– volume: 51
  start-page: 69
  issue: 4
  year: 2008
  ident: 10.1016/j.comnet.2009.10.005_bib29
  article-title: A typology of complaints about ebay sellers
  publication-title: Commun. ACM
  doi: 10.1145/1330311.1330326
– ident: 10.1016/j.comnet.2009.10.005_bib31
  doi: 10.1007/3-540-45748-8_13
– volume: 36
  start-page: 335
  issue: 4
  year: 2004
  ident: 10.1016/j.comnet.2009.10.005_bib3
  article-title: A survey of peer-to-peer content distribution technologies
  publication-title: ACM Computing Surveys
  doi: 10.1145/1041680.1041681
– start-page: 310
  year: 2001
  ident: 10.1016/j.comnet.2009.10.005_bib2
  article-title: Managing trust in a peer-2-peer information system
– year: 2008
  ident: 10.1016/j.comnet.2009.10.005_bib48
– ident: 10.1016/j.comnet.2009.10.005_bib59
  doi: 10.1145/1080192.1080204
– year: 2004
  ident: 10.1016/j.comnet.2009.10.005_bib6
– year: 2007
  ident: 10.1016/j.comnet.2009.10.005_bib43
– ident: 10.1016/j.comnet.2009.10.005_bib27
  doi: 10.1007/978-1-4615-0863-2_21
– ident: 10.1016/j.comnet.2009.10.005_bib11
  doi: 10.1145/586110.586138
– ident: 10.1016/j.comnet.2009.10.005_bib30
  doi: 10.1145/776322.776346
– ident: 10.1016/j.comnet.2009.10.005_bib61
  doi: 10.1007/978-3-540-30216-2_8
– ident: 10.1016/j.comnet.2009.10.005_bib23
  doi: 10.1145/1016527.1016539
– ident: 10.1016/j.comnet.2009.10.005_bib17
– ident: 10.1016/j.comnet.2009.10.005_bib13
– volume: 25
  start-page: 383
  issue: 2
  year: 1970
  ident: 10.1016/j.comnet.2009.10.005_bib20
  article-title: Efficient capital markets: a review of theory and empirical work
  publication-title: J. Finance
  doi: 10.2307/2325486
– volume: 40
  start-page: 45
  issue: 2
  year: 2007
  ident: 10.1016/j.comnet.2009.10.005_bib34
  article-title: Trust management in distributed systems
  publication-title: IEEE Comput.
  doi: 10.1109/MC.2007.76
– volume: 451
  start-page: 893
  issue: 21
  year: 2008
  ident: 10.1016/j.comnet.2009.10.005_bib46
  article-title: Complex systems: ecology for bankers
  publication-title: Nature
  doi: 10.1038/451893a
– volume: 17
  start-page: 244
  issue: 2
  year: 2005
  ident: 10.1016/j.comnet.2009.10.005_bib21
  article-title: Evaluation and design of online cooperative feedback mechanisms for reputation management
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2005.26
– ident: 10.1016/j.comnet.2009.10.005_bib24
– ident: 10.1016/j.comnet.2009.10.005_bib50
  doi: 10.1007/3-540-45748-8_20
– ident: 10.1016/j.comnet.2009.10.005_bib18
– ident: 10.1016/j.comnet.2009.10.005_bib47
– volume: 51
  start-page: 89
  issue: 5
  year: 2008
  ident: 10.1016/j.comnet.2009.10.005_bib25
  article-title: Reducing internet auction fraud
  publication-title: Commun. ACM
  doi: 10.1145/1342327.1342343
– year: 2005
  ident: 10.1016/j.comnet.2009.10.005_bib51
– ident: 10.1016/j.comnet.2009.10.005_bib22
  doi: 10.1145/988772.988788
– ident: 10.1016/j.comnet.2009.10.005_bib33
– ident: 10.1016/j.comnet.2009.10.005_bib62
– ident: 10.1016/j.comnet.2009.10.005_bib4
  doi: 10.1016/S1574-0145(06)01006-3
– ident: 10.1016/j.comnet.2009.10.005_bib53
  doi: 10.1007/11530657
– ident: 10.1016/j.comnet.2009.10.005_bib56
– ident: 10.1016/j.comnet.2009.10.005_bib45
  doi: 10.1007/978-3-540-30183-7_10
– volume: 185
  start-page: 1124
  issue: 4157
  year: 1974
  ident: 10.1016/j.comnet.2009.10.005_bib55
  article-title: Judgment under uncertainty: heuristics and biases
  publication-title: Science
  doi: 10.1126/science.185.4157.1124
– ident: 10.1016/j.comnet.2009.10.005_bib52
– ident: 10.1016/j.comnet.2009.10.005_bib14
– ident: 10.1016/j.comnet.2009.10.005_bib57
  doi: 10.1007/3-540-36532-X_4
– ident: 10.1016/j.comnet.2009.10.005_bib7
– ident: 10.1016/j.comnet.2009.10.005_bib19
– volume: 51
  start-page: 1643
  issue: 11
  year: 2005
  ident: 10.1016/j.comnet.2009.10.005_bib26
  article-title: Importance sampling for portfolio credit risk
  publication-title: Manage. Sci.
  doi: 10.1287/mnsc.1050.0415
– ident: 10.1016/j.comnet.2009.10.005_bib42
– volume: 19
  issue: 1
  year: 2002
  ident: 10.1016/j.comnet.2009.10.005_bib44
  article-title: A longitudinal price comparison for music cds in electronic and brick-and-mortar markets: pricing strategies in emergent electronic commerce
  publication-title: J. Business Strategies
  doi: 10.54155/jbs.19.1.55-72
– volume: 16
  issue: 16
  year: 2004
  ident: 10.1016/j.comnet.2009.10.005_bib60
  article-title: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities
  publication-title: IEEE Trans. Knowl. Data Eng.
– volume: 65
  start-page: 1
  issue: 1
  year: 1957
  ident: 10.1016/j.comnet.2009.10.005_bib54
  article-title: Perfect competition, historically contemplated
  publication-title: J. Political Econ.
  doi: 10.1086/257878
– volume: 2172
  start-page: 179
  year: 2001
  ident: 10.1016/j.comnet.2009.10.005_bib1
  article-title: P-Grid: A self-organizing access structure for P2P information systems
  publication-title: Lecture Notes in Computer Science
  doi: 10.1007/3-540-44751-2_15
– year: 2002
  ident: 10.1016/j.comnet.2009.10.005_bib5
– year: 1982
  ident: 10.1016/j.comnet.2009.10.005_bib37
– volume: 10
  start-page: 95
  issue: 3
  year: 2006
  ident: 10.1016/j.comnet.2009.10.005_bib28
  article-title: The role of reputation systems in reducing on-line auction fraud
  publication-title: Int. J. Electron. Commerce
  doi: 10.2753/JEC1086-4415100304
– ident: 10.1016/j.comnet.2009.10.005_bib36
– ident: 10.1016/j.comnet.2009.10.005_bib8
  doi: 10.1145/1060289.1060317
– volume: 5
  issue: 1
  year: 1994
  ident: 10.1016/j.comnet.2009.10.005_bib39
  article-title: Measuring product market efficiency: a new methodology
  publication-title: Market. Lett.
  doi: 10.1007/BF00993960
– year: 2000
  ident: 10.1016/j.comnet.2009.10.005_bib38
– ident: 10.1016/j.comnet.2009.10.005_bib15
– ident: 10.1016/j.comnet.2009.10.005_bib10
  doi: 10.1145/633042.633043
– ident: 10.1016/j.comnet.2009.10.005_bib40
  doi: 10.1145/775240.775242
SSID ssj0004428
Score 1.9072733
Snippet Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by P trim, a system that builds a...
Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by Ptrim, a system that builds a...
Market-based principles can be used to manage the risk of distributed peer-to-peer transactions. This is demonstrated by PTRIM, a system that builds a...
SourceID proquest
pascalfrancis
crossref
elsevier
SourceType Aggregation Database
Index Database
Publisher
StartPage 675
SubjectTerms Applied sciences
Business and industry local networks
Electronic commerce
Exact sciences and technology
Financial markets
Miscellaneous
Networks
Networks and services in france and abroad
Peer to peer computing
Peer-to-peer networks
Peers
Reputation management
Risk management
Studies
Telecommunications
Telecommunications and information theory
Teleprocessing networks. Isdn
Transaction costs
Transaction processing
Transactions
Valuation and optimization of characteristics. Simulation
Title A market-based approach to managing the risk of peer-to-peer transactions
URI https://dx.doi.org/10.1016/j.comnet.2009.10.005
https://www.proquest.com/docview/199678617
https://www.proquest.com/docview/742900427
Volume 54
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB5WvSgiPnFdXXLwGrebpG1yXERZXfTgA72VTZOAgu3idq_-didp6wMRwVMhbdowSeYbmm_mAzgexjLHQJ5Rf8xDhTUp1TaRNNKIHbERRic-OfnqOhnfi8vH-LEDp20ujKdVNr6_9unBWzctg8aag9nT0-A2HLExmUQq1LdMl2CFcZXg0l4ZXUzG15_pkSJIrPrnqe_QZtAFmhe-vrBVXbgy0Lzi3xBqfTado91cLXjxw3cHQDrfhI0mkiSjerBb0LHFNqx9qS-4Axcj8hKymqkHK0PaAuKkKslLI1BEMAIknmBOSkdm2JNWJfVXUn1Kic934f787O50TBvtBJpzISpqteI8TaVTSR457Ry3uVHKSuPiae4wjrII9JobhSjJ8jg2kZGxsAlzwzRxQ74Hy0VZ2H0gTFiHmKUjJ3N0q0xLxZjNJXfcmKnmXaCtvbJZXSIja7ljz1ltX692qXwr2rcLaWvU7NtUZ-jF_-jZ_zYHH59Dp-R_zYgu9NpJyZq9OM88zzqVGKl1gXzcxU3kT0amhS0X8yxFVA6qIwf_HlsPVmtigaCRPITl6nVhjzBeqXQflk7ehv1mVfrr5OZh8g4pd-xs
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58HFREfOK6uubgNW63Sdv0uCzK-tqLCt7CpklAYdvi1qu_3UnaroqI4KmQJm2YdOYbOt_MAJwNIpGhIx9SF-ah3OiEKhMLGijEjkhzrWKXnHw3iceP_PopelqCUZsL42iVje2vbbq31s1Iv5Fmv3x-7t_7EFso4iD19S2TZVjlqL5OO8_fP3kenPsGq242ddPb_DlP8sKH56aqy1Z6klf0Gz5tltM5Ss3W7S5-WG4PR5fbsNX4kWRYb3UHlky-CxtfqgvuwdWQzHxOM3VQpUlbPpxUBZk17YkI-n_E0ctJYUmJK2lVUHcl1Wcj8fk-PF5ePIzGtOmcQDPGeUWNShlLEmHTOAusspaZTKepEdpG08yiF2UQ5hXTKWJkmEWRDrSIuIlDO0hiO2AHsJIXuTkEEnJjEbFUYEWGRjVUIg1DkwlmmdZTxTpAW3nJsi6QIVvm2Ius5et6XaZuFOXbgaQVqvx20BJt-B8re9_OYPE6NEnuxwzvQLc9FNlo4lw6lnUi0E_rAFncRRVycZFpboq3uUwQk33PkaN_7-0U1sYPd7fy9mpy04X1mmLAaSCOYaV6fTMn6LlUque_zA-4CuuN
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+market-based+approach+to+managing+the+risk+of+peer-to-peer+transactions&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Androutsellis-Theotokis%2C+Stephanos&rft.au=Spinellis%2C+Diomidis&rft.au=Louridas%2C+Panos&rft.au=Stroggylos%2C+Kostas&rft.date=2010-04-08&rft.pub=Elsevier+B.V&rft.issn=1389-1286&rft.eissn=1872-7069&rft.volume=54&rft.issue=5&rft.spage=675&rft.epage=688&rft_id=info:doi/10.1016%2Fj.comnet.2009.10.005&rft.externalDocID=S1389128609003107
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon