期刊文献+

对等网络中的信息安全 被引量:1

Information security in P2P
下载PDF
导出
摘要 近年来,对等网络得到迅速发展,其广泛应用促进了信息技术的发展,也带来了一系列的安全问题。介绍了对等网络中若干安全问题,并针对这些问题,分析并给出了相应的安全保障策略,最后对P2P中的信息安全问题的未来做了展望。 Peer- to- Peer network( P2P) has received rapid development in recent years, the broad application of P2P accelerates the development of information technology, and brings a series of secure problems. Many secure problems are listed and the corresponding solving methods are introduced in this paper, finally, the future of the security problem about P2P is prospected.
出处 《信息技术》 2006年第7期93-96,共4页 Information Technology
关键词 对等网络 安全 PKI CA 对等信任模型 Peer- to- Peer network (P2P) security PKI CA P2P trust model
  • 相关文献

参考文献8

二级参考文献17

  • 1CarlisleAdamsSteveLloyd 冯登国 等.公开密钥基础设施--概念、标准和实施[M].北京:人民邮电出版社,2001.5-12.
  • 2DAVIDSON A. Peer-to-Peer File Sharing Privacy and Security [DB/OL].Center for Democracy and technology, 2003.
  • 3YEAGER B.Enterprise strength security on a JXTA P2P network[A]. Peer-to-Peer Computing 2003 (P2P 2003) Proceedings[C],2003.7-8.
  • 4Peter G, Neumann,Phillip A, et al . Experience with EMERALD to Date[A]. In:First USENIX Workshop on Intrusion Detection and Network Monitoring[C]. California: Santa Clara, 1999. 73-80
  • 5Eugene H, Spafford, Deigo Zamboni. AAFID:Intrusion detection using autonomous agents[J]. Computer Networks, 2000,34:547-570
  • 6Stoica I, Morris R, Karger D, et al . Chord: A scalabl peer-to-peer lookup service for Internet applications[R]. MIT-TR-819, 2001
  • 7Zhao B Y, Kubiatowicz J D, Joseph A D. Tapestry: An infrastructure for fault-resilient wide-area location and routing[R]. UCB//CSD-01-1141, 2001
  • 8Sameh El-Ansary, Luc Onana Alima, Per Brand, et al . Efficient broadcast in structured P2P networks[A]. In: Michal Feldman, Shelley Zhuang, eds. Peer-to-Peer Systems II: Second International Workshop[C]. Heidelberg: Springer-Verlag, 2003. 304~314
  • 9Kamvar S D, Schlosser M, Garcia M H, Eigenrep: Reputation management in p2p networks[C]. In Proc. of the 12th Int' 1 WWW Conference, Budapest, 123-134.
  • 10Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system[C]. In Ninth International Conference on Information and Knowledge Management (CIKM), Atlanta, 2001.

共引文献37

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部