期刊文献+

基于P2P网络中信誉机制的安全电子交易协议 被引量:3

Secure electronic transaction protocol based on the reputation system in P2P networks
下载PDF
导出
摘要 文章对安全电子交易协议(SET)进行分析,提出带信任度的SET改进方案,通过对原有的交易流程进行改进,使改进后的SET不仅继承了原有的机密性、完整性,而且也可以进一步保障交易的原子性和不可否认性,提高商家对客户售后投诉的响应速度,避免了商家的通过聘用托的合谋攻击问题,有效保证交易双方的公平性. After analyzing the SET protocol,an improved SET schemen with credit were given in the paper. The improved sheme not only inherits the confidentiality,integrality of SET,but also guarantees the atomicity and and non-repudiation of transcation, and enhances the traders' response to buyers' complain and escape from the collusion attack by rectifying the transcaction flow of original SET. As a result,it guarantees the impartiality of both sides.
出处 《广西大学学报(自然科学版)》 CAS CSCD 2008年第4期394-397,共4页 Journal of Guangxi University(Natural Science Edition)
基金 广东省科技攻关项目(2007B010200068) 华南农业大学校长基金(2006X025)
关键词 P2P 安全电子交易协议 交易原子性 不可否认性 合谋攻击 P2P SET protocol atomicity of transcation non-repudiation collusion attack
  • 相关文献

参考文献11

二级参考文献25

  • 1SteveBurnett StephenPaine.密码工程实践指南[M].北京:清华大学出版社,2001.155-156.
  • 2Microsoit. CAPICOM Start Page. Platform SDK[S]. 2001.
  • 3RESNICKAND P, ZECKHAUSERAND R, FRIEDMAN E, et al.. Reputation systems[J].Communications of the ACM, 2000,43(12):45-48.
  • 4MINAXI G, JUDGE P, AMMAR M. A Reputation System for Peer-to-Peer Networks[A]. NOSSDAV03[C]. Monterrey, California, USA, 2003 .
  • 5WANG Y, VASSILEVA J. Trust and Reputation Model in Peer-to-Peer Networks[A]. Third International Conference on Peer-to-Peer Computing (P2P03)[C], 2003.
  • 6ABERER K, DESPOTOVIC Z. Managing trust in a peer-to-peer information systems[A]. Proceedings of the tenth international conference on information and knowledge management[C], 2002.
  • 7PAVLOV E, ROSENSCHEIN JS, TOPOL Z. Supporting Privacy in Decentralized Additive Reputation Systems[A]. ITrust 2004, LNCS 2995[C]. Berlin Heidelberg:Springer-Verlag,2004.108-119.
  • 8SELUCK AA, UZUN E, PARIENTE MR. A Reputation-Based Trust Management System for P2P Networks[A]. Proceedings of 4th IEEE/ACM International Symposium on Cluster Computing and the Grid[C]. Chicago, Illinois, 2004.
  • 9ZHOU X, BRESSAN S, TAN K-L. Efficient Distributed Reputation Scheme for Peer-to-peer systems[A]. HIS 2003, LNCS 2713[C]. Berlin Heidelberg: Springer-Verlag, 2003. 54-63.
  • 10KARGER D, KAASHOEKY I, STOICA R, et al. Chord: A Scalable Peer-to-Peer Lookupservice for Internet Applications[A]. Proceedings of the 2001 ACM SIGCOMM Conference[C], 2001.149-160.

共引文献75

同被引文献27

  • 1潘宝玉,骆跃进.网格技术在空间信息科学中的应用[J].地矿测绘,2004,20(3):37-39. 被引量:1
  • 2朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 3邱民德,吴镇炜,姚辰.移动探查机器人监督式控制器的设计与实现[J].微计算机信息,2005,21(10Z):165-167. 被引量:1
  • 4王东安,秦刚,南凯,阎保平.网格计算中信任管理模型的研究[J].计算机工程,2006,32(7):32-34. 被引量:10
  • 5荣昆,李益发.CPK种子矩阵的优化设计方案[J].计算机工程与应用,2006,42(24):120-121. 被引量:8
  • 6KAWATSURA Y. Secure Electronic Transaction (SET) Supplement for the v1.0 Internet Open Trading Protocol (IOTP)[DB/OL]. (2003 07-01)[2009-07-01].http://www. rfc-editor. org/rfc/rfc 3538. txt.
  • 7TYGAR J D. Atomicity in Electronic Commerce[C]//Proceedings of the 15th Annual ACM Symposium on Principles of Distributed Computing. Philadelphia, Pennsylvania: ACMPress, 1996: 8-26.
  • 8FRANKLIN M K, REITER M K. Fair Exchange with a Semi-trusted Third Party[C]//Proceedings of the 4th ACM Conference on Computer and Communications Security. Zurich, Switzerland: ACM Press. 1997:1-5.
  • 9TYGAR J D. Atomicity Versus Anonymity: Distributed Transactions for Electronic Commerce, Invited Talks[C]// Proceedings of the 24^th Annual International Conference on Very Large Data Bases. New York: Morgan Kaufmann Publishers, 1998: 1-2.
  • 10FOSTER I,KESSELMAN C,TUECKE S.The anatomy of the grid:Enabling scalable virtual organizations[J].International Journal of High Performance Computing Applications,2001,15 (3):200-222.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部