期刊文献+

P2P环境下基于层次域的全局信任模型研究 被引量:1

Analysis of trust model based on hierarchical-domain in P2P network
下载PDF
导出
摘要 对等计信任模型是目前提高P2P系统安全性的一个重要方法。在分析各类信任模型的特点和节点行为特征的基础上,提出了一种基于层次域的全局信任模型,采用邻近原则和信任度划分节点域,并在此基础上加入了奖惩机制,具有较好的信任收敛度和对恶意行为的防范效果。 Trust model is an important mechanism to improve the security of P2P system. A novel P2P global trust model based on hierarchical-domain is proposed. Locality-awareness and trust-threshold are used to distinguish peer domain. Performance analysis demonstrates that it has good performance and can well protect system from different malicious behaviors.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第15期3872-3873,3877,共3页 Computer Engineering and Design
关键词 对等计算 局部信任模型 全局信任模型 层次域 可信度 P2P local trust model hierarchical-domain global trust model certainty degree
  • 相关文献

参考文献6

  • 1Apostolos T, Barry M G.Peer-to-peer networks based on hierarchies oftrust[C].Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing. NW, Washington, DC: IEEE Computer Society,2005:160-161.
  • 2Stoica I, Morris R, Karger D. Chord: A scalable peer-to-peer lookup service for Intemet applications [R]. Technical Report, TR-819, MIT Press, 2001.
  • 3Agrawal A, Casanova H. Clustering hosts in P2P and global computing platforms[C]. Proceedings of 3rd IEEE/ACM International Symposium on Large Scale Distributed Systems. IEEE Press, 2003.
  • 4Comelli F, Damiani E, di Vimercati S D C,et al.Choosing reputable servents in a P2P network[C], 11th Int'l World Wide Web Conf,2002:441-449.
  • 5Kamvar S D, Schlosser M T, Garcia-Molina H. EigenRep: Reputation management in P2P networks[C]. Lawrence S. Proc of the 12th Int'l World Wide Web Conf. Budapest: ACM Press,2003: 123-134.
  • 6窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325

共引文献324

同被引文献13

  • 1赵泽良,陈兴蜀,刘益和,沈昌祥.P2P应用的安全体系结构研究[J].四川大学学报(自然科学版),2006,43(4):811-815. 被引量:3
  • 2田春岐,邹仕洪,田慧蓉,王文东,程时端.一种基于信誉和风险评价的分布式P2P信任模型[J].电子与信息学报,2007,29(7):1628-1632. 被引量:47
  • 3Eytan Adar, Bemardo A Huberman. Free Riding on Gnutella[J]. Technical Report[R]. Xerox PARC, 10 Aug. 2000.
  • 4G Hardin. The Tragedy of the Commrnons[J]. Science, 1968, 162 : 1243 - 1248.
  • 5H Hornayounfar, F Wang, S Areibi. Andvanced P2P Architecture Using Autonomous Agents[J ]. The ISCA 15th International Conference on Computer Applications in industry and Engineering, ACM Press, San Diego, California, 2002,11:115-118.
  • 6Liang J, Kumar R, Xi Y, et al. Pollution in P2P File Sharing Systems. In: Proceedings of IEEE Infocom'2005 [M]. Miami, FL, USA: IEEE Press, 2005(2):1174-1185.
  • 7Fessant F L, Handurukande S, Kermarrec A M, et al. Clustering in Peer- to- Peer File - Sharing Workloads[C]. Proceedings of the 3rd International Workshop on Peer - to - Peer Systems (IPTPS). SanDiego, USA:[s.n. ],2004.
  • 8J Kleinberg. The Small World Phenomenon: An Algorithmic Perspective[C]. In: Proc of the 32nd ACM Symposium on Theory of Computing, 2000.
  • 9Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu. A Role - Based Trust Peer - to - Peer Communities and Dynamic Coalitions[C]. Proceedings of the Second IEEE International Information Assurance Workshop (IWIA' 04),2004.
  • 10Diego Gambetta. Can We Trust: Making and Breaking CooperativeRelations[M]. Gambetta, Basil Blackwell. Oxford, 1990, 2132237.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部