期刊文献+

一种对等网络信任模型的改进 被引量:1

Improvement of A Trust Model for Peer-to-Peer Networks
下载PDF
导出
摘要 对等网络提供了一种开放的、自由进行文件交换的环境,但随着网络的飞速发展,恶意文件泛滥,搭便车现象严重,使得系统的稳定性和可用性受到了威胁。信任机制的建立将有助于解决这些问题。该文在分析了一种信任模型SELCUK的特点和不足基础上,提出了一种改进的信任模型SELCUK-I,通过对等网络协同工具应用表明,SELCUK-I信任模型具有更好的安全性和可用性。 The peer-to-peer networks provides an open and autonomic environment for file sharing. While with the rapid development of peer-to-peer networks, some bad phenomena such as malicious contents flooding and a large number of free-riders, threaten its stability and availability. A good trust model is helpful to settle such problems. Based on analyzing a trust model SELCUK, this paper proposes an improvement trust model SELCUK-I, It is more security and availability than the SELCUK trust model by peer-to-peer cooperated tools application.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第15期152-154,共3页 Computer Engineering
基金 广西自然科学基金资助项目(桂科自0447091)
关键词 信任 信任模型 对等网 文件共享 Trust Trust model Peer-to-peer networks File sharing
  • 相关文献

参考文献7

  • 1Seluck A A,Uzun E,Pariente M R.A Reputation-based Trust Management System for P2P Networks[C].Proceedings of the 4^th IEEE/ACM International Symposium on Cluster Computing and the Grid,Chicago,Illinois,2004.
  • 2刘玉龙,曹元大,李剑.一种新型推荐信任模型[J].计算机工程与应用,2004,40(29):47-49. 被引量:15
  • 3Adar E,Huberman B A.Free Riding on Gnutella[J].First Monday,2000,5(10).
  • 4Gupta M,Judge P,Ammar M.A Reputation System for Peer-to-Peer Networks[C].Proc.of NOSSDAV'03,2003.
  • 5张铁军,张玉清,战守义,张德华.Peer-to-Peer典型应用安全需求分析[J].计算机工程,2005,31(20):56-58. 被引量:14
  • 6Aberer K,Depotovic Z.Mananing Trust in A Peer-to-Peer Information System[C].Proc.of the 9^th International Conference on Information and Knowledge Management,2001.
  • 7Resnickand P,Zeckhauserand R.Reputation Systems[J].Communications of the ACM,2000,43(12).

二级参考文献13

  • 1Beth T,Borcherding,M Klein B.Valuation of trust in open networks[C].In:Proceedings of the European Symposium on Research in Security (ESOR1CS), Brighton: Springer-Verglag, 1999: 59~63
  • 2Abdul-Rahman A,Hailes S.A distributed trust model[C].In :Proceedings of the 1997 New Security Paradigms Workshop,Cumbria,UK:ACM Press, 1998:48~60
  • 3Jφsang A.A model for trust in security systems[C].In:Proceedings of the 2nd Nordic Workshop on Secure Computer Systems, 1997
  • 4Jφsang A.A subjective metric of authentication[C].In:Proceedings of the ESORICS'98,Louvain-la-Neuve,Springer Verlag,1998:329~344
  • 5Mui L,Mohtashemi M,Halberstadt M.A computational model of trust and reputation[C].In:Proceedings of the 35th Hawaii International Conference on System Sciences,2002
  • 6Wang Y,Vassileva J.Bayesian network-based trust model[C].In: Proceedings of the IEEE/WIC international Conference on Web Intelligence ( WI'03 ), 2003
  • 7Guha R,Kumar R,Raghavan P.Propagation of trust and distrust,WWW2004,New York,USA,2004:17~22
  • 8Yu B,Munindar P. An evidential model of distributed reputation management[C].In: AAMAS02,2002-07:15 ~ 19
  • 9Milojicic D S.Peer-to-Peer Computing.HP Laboratories Palo Alto, 2002-03-08:27-29
  • 10Aslund J.Authentication in Peer-to-Peer Systems.http://www.ep.liu.se/exjobb/isy/2002/3153/exjobb.pdf,2002

共引文献27

同被引文献10

  • 1谢瑗瑗,胡祥光,刘军,谷发平.P2P网络中信任模型研究综述[J].军事通信技术,2009,30(2):38-42. 被引量:4
  • 2田春岐,邹仕洪,田慧蓉,王文东,程时端.一种基于信誉和风险评价的分布式P2P信任模型[J].电子与信息学报,2007,29(7):1628-1632. 被引量:47
  • 3Kamvar S, Schlosser M, Garcia-Molina H. The EigenTrust Algorithm for Reputation Management in P2P Networks[C]//Proc. of the 12th International World Wide Web Conference. Budapest, Hungary: [s. n.], 2003: 640-651.
  • 4Hou Mengshu, Lu Xianliang, Zhou Xu, et al. A Trust Model of P2P System Based on Confirmation Theory[J]. Operating Systems Review, 2005, 39(1): 56-62.
  • 5Li Xiaoyong, Gui Xiaolin. Research on Adaptive Prediction Model of Dynamic Trust Relationship in Open Distributed Systems[J]. Journal of Computational Information Systems, 2008, 4(4): 1427- 1434.
  • 6Song Shanshan, Huang Kai, Zhou Runfang. Trusted P2P Transactions with Fuzzy Reputation Aggregation[J]. Internet Computing, 2005, 9(6): 24-34.
  • 7Liang Zhengqiang, Shi Weisong. Analysis of Recommendations on Trust Inference in Open Environment[J]. Journal of Performance Evaluation, 2008, 65(2): 99-128.
  • 8Zhou Xusang. A P2P Traffic Classification Method Based on SVM[C]//Proc. of International Symposium on Computer Science and Computational Technology. Shanghai, China: [s. n.], 2008.
  • 9Ciszkowski T, Eliasson C, Fiedler M. SecMon: End-to-end Quality and Security Monitoring System[C]//Proc. of the 7th International Conference on Computer Science Research and Applications. Kazimierz Dolny, Poland: [s. n.], 2008.
  • 10Wang Yao, Vassileva J. Bayesian Network-based Trust Model[C]// Proc. of IEEE International Conference on Web Intelligence. Halifax, Canada: IEEE Press, 2003: 372-378.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部