期刊文献+

非集中式P2P系统信任值安全管理的研究 被引量:4

Research on Secure Management of Trust Values in Decentralized P2P systems
原文传递
导出
摘要 由于P2P系统的开放性、匿名性和动态性,使得实体之间难以确定相互的可靠性。信任值这一概念的引入基本解决了这一问题,同时也使得信任值在整个P2P系统中扮演了至关重要的角色。论文提出了一种能够安全地管理非集中式P2P系统信任值的协议,从而保证了信任值的安全存储、分发、访问以及修改。 For the openness, anonymity and dynamic characters in P2P systems. It is very hard for the entities in the system to identify mutual dependency, The introducing of the concept of Trust Value has settled this problem, and made Trust Value be one of the most important roles in the P2P systems. This Article has put forward a protocol which can securely manage the Trust Value in Decentralized P2P systems, consequently guaranteed the secure storage, distribute, access and modify of Trust Value.
作者 贾德礼 方勇
出处 《信息安全与通信保密》 2007年第2期83-85,共3页 Information Security and Communications Privacy
关键词 P2P系统 信任值 协议 安全 P2P system Trust Value Protocol security
  • 相关文献

参考文献4

  • 1[1]L Xiong,L Liu.A reputation-based trust model for peer-to-peer ecommerce communities[A].In IEEE International Conference on Electronic Commerce[C],IEEE,Computer Society,2003.
  • 2[2]So Young Lee,O-Hoon Kwon,Jong Kim,et al.A Reputation Management System in Structured Peer-to-Peer Networks[A],In Proceedings of the 14th IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprise(WETICE' 05)[C],IEEE,Computer Society,2005.
  • 3[3]Hui Lei,Gholamali C.Shoja,A Distributed Trust Model for e-Commerce Applications[A],In The 2005 IEEE International Conference on e-Technology,e-Commerce and e-Service,2005.EEE '05.Proceedings[C].IEEE,Computer Society,2005.
  • 4[4]Aameek Singh,Ling Liu.TrustMe:Anonymous Management of Trust Relationships In Decentralized P2P Systems[A],In Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P'03)[C],IEEE,Computer Society,2003.

同被引文献24

  • 1徐嘉,李建华.容灾系统中存储方案选择的研究[J].信息安全与通信保密,2006,28(8):109-111. 被引量:4
  • 2田敬,代亚非.P2P持久存储研究[J].软件学报,2007,18(6):1379-1399. 被引量:52
  • 3Plank J. A tutorial on reed-solomon coding for faulttolerance in RAID-like systems[J]. Software Practice and Experience, 1997, 27(09): 995-1012.
  • 4Rhea S, Eaton P, Geels D, et al. Pond. the OceanStore Prototype[C] San Francisco:ACM, 2003:1-14.
  • 5Bhagwan R, Tati K, Cheng Y, et al. Total recall. System support for automated availability management[C] //Morris R, Savage S. the 1st ACM/Usenix Symp. on Networked Systems Design and Implementation. San Francisco:ACM , 2004:337-350.
  • 6Blake C, Rodrigues R. High availability, scalable storage, dynamic peer networks: Pick two[C]// Jones M. the 9th Workshop on Hot Topics in Operating Systems. Hawaii :ACM, 2003:1-6.
  • 7PESERICO E.P2P Economies[C] //Computer Communication Review.United States:Proceedings of the ACMSpecial Interest Group on Data Communication(SIGCOMM),2006.
  • 8MEDVINSKY Gennady,NEUMAN Clifford.NetCash:A Design for Practical Electronic Currency on the Internet[C] //Proceedings of the1st ACM Conference on Computer and Communications Security(CCS'93).New York:ACM,1993:102-106.
  • 9GARCIA Flavio D,HOEPMAN Jaap-Henk.Applied Cryptography and Network Security[M].Heidelberg:Springer Berlin,2005:271-287.
  • 10MASSIAS H,SERRET Avila H,QUISQUATER J J.Design of a Secure Timestamping Service with Minimaltrust Requirements[C] //Proceedings of the20th Symposium on Information Theory in theBenelux.Belgium:Werkgemeenschap voor Informatie-en Communicatietheorie,1999:76-86.

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部