期刊文献+

信任管理在P2P网络资源发现中的应用研究

Application Research of Trust-Rate-Control in P2P Cyber-Resource Searching
下载PDF
导出
摘要 分析了前人在资源发现中所采用方法的优缺点,提出了一种基于声望的结合不同上下文节点信任度的评估更新方案,用于指导节点选择信任度高的节点交易,从而提高了网络的安全性,且在路径选取中充分考虑消息的转发与反馈机制中的总消耗时,以保证选出的路径最佳,同时利用基于信任的节点链接更新新方法,进行拓扑更新,以避免高可信节点的拥塞.通过仿真实验的分析验证了该方法的有效性. After analyzing advantages and disadvantages of previous resource-searching methods,the paper suggests an assessment updating scheme on the basis of reputation combining with context notes' trust-rate,which is utilized to direct the transaction between notes with relative higher trust-rate.Therefore it can improve the cyber-security.It can also take full account of the total cost at message forward and feedback during route choosing so as to ensure optimized one.Meanwhile the new method based on notes linking updating can refresh topology in order to keep trustworthy notes from congestion.Analysis on emulational experiments proves that the new method is effective.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第9期175-178,共4页 Microelectronics & Computer
关键词 信任管理 P2P 资源发现 trust-rate-control P2P resource-searching
  • 相关文献

参考文献7

  • 1Lv Q, Cao P, Cohen E, et al. Search and replication in un- structured peer- to- peer networks[ C]//Proceedings of 16th ACM International Conference on Supercomputing (ICS'02). New York, USA, 2002.
  • 2单国栋,戴英侠,王航.P2P网络系统中的安全问题[J].通信技术,2002,35(5X):81-84. 被引量:17
  • 3Agostini A, Moro G. Identification of communities of peers by trust and reputation [ C]//In the Eleventh International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA' 2004 ). Springer LNAI, Vama Bulgaria, 2004(3192) :85- 95.
  • 4周金洋,杨寿保,郭磊涛,王莉苹.Grid和P2P混合环境中一种基于信任的资源搜索机制[J].计算机科学,2005,32(11):27-30. 被引量:2
  • 5Beth T, Borcherding M, Klein B. Valuation of trust in open network [ C ]//Proc. European Symposium On Research in Security(GSORICS). Brighton: Springer - Vetlag, 1994.
  • 6Buskens V, Weesie J. Cooperation via social networks[J ]. Analyse & Kritik, 2000(22) : 44 - 74.
  • 7Miranda H, Rodrigues L. Friends and foes: preventing selfishness in open mobile Ad Hoc networks[ C]//Proc. of the First Intl. Workshop on Mobile Distributed computing (MDC'03). USA: IEEE Computer Society Press,2003.

二级参考文献7

  • 1Foster I, Kesselman C, Tuecke S. The Anatomy of the Grid: Enabling Scalable Virtual Organization. International Journal of Supercomputer Applications, 2001.
  • 2Milojicic D S, Kalogeraki V, Lukose R. Peer-to-Peer Computing.HP Laboratories Palo Alto HPL-2002-57 March 8th.
  • 3Iamnitehi A, Foster I. On Fully Decentralized Resource Discovery in Grid Environments. In:Proc. of the Second Intl. Workshop on Grid Computing, 2001.
  • 4Harehol-Balter M, Leighton T, Lewin D. Resource Discovery in Distributed Networks. In: 18th AnnualACM-SIGACT/SIGOPS Symposium on Principles of Distributed Computing, Atlanta,May 1999. 229-238.
  • 5Gambetta D. Can We Trust? In: Trust: Making and Breaking Cooperative Relations. Gambetta D, ed. Basil Blaekwell. Oxford,1990. 213-237.
  • 6Abdul-Rahman A, Hailes S. A distributed trust model. In: Proc.of the 1997 New security Paradigms Workshop, Cambrian, ACM Press, 1998.
  • 7Beth T, Boreherding M, Klein B. Valuation of Trust in Open Networks. In: Proc. 3rd European Symposium on Research in Computer ,Security-ESORICS'94.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部