期刊文献+

P2P网络中基于信任的风险计算方法 被引量:1

Risk Assessment Approach Based on Trust in P2P Network
下载PDF
导出
摘要 由于P2P网络的开放性和动态性,对等点信息交换不可避免地会给系统带来安全问题。提出了运用信任评价与传统的风险计算相结合的方法来评估对等点信息交换中的风险。风险度的计算来源于信任风险和后果风险。信任风险是对节点长期累积行为表现的评价,反映了信任和风险之间的关系;后果风险是对节点短期行为所导致后果的评价。仿真实验表明,运用基于信任的风险计算方法可以有效地评估对等点间信息交换的风险。 As a result of P2P network being open and dynamic,it is inevitable that peers' information exchange brings security issues to systems.A trust based approach was introduced in risk assessment,and a risk assessment method was put forword by combining trust estimation with the traditional risk calculation to evaluate the risk of information exchange between peers.Risk value is derived from estimation of trust risk and result risk.Trust risk is estimated accor-ding to the long-term behavior of a node,and reflects the relationship between trust and risk.Result risk is estimated according to the short-term behavior of a node.Simulation results show that the risk assessment approach based on trust can effectively work in P2P network.
出处 《计算机科学》 CSCD 北大核心 2010年第10期102-104,122,共4页 Computer Science
基金 国家自然科学基金项目(60873225 60773191 70771043) 国家高技术研究发展计划(863计划)项目(2007AA01Z403) 软件工程国家重点实验室开放基金项目(SKLSE20080718) 华中科技大学自主创新基金项目(01-09-210014)资助
关键词 对等网 信任 风险度 风险评估 Peer-to-peer network Trust Risk Risk assessment
  • 相关文献

参考文献5

  • 1Wang Y, Vassileva J. Trust and reputation model in peer-to-peer networks[C] // Proceedings of the Third International Conference on Peer-to-Peer Computing(P2P'03). IEEE,2003:150-157.
  • 2Wang Y, Lin E Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-commerce Environments [C]//Proceedings of IEEE International Conference on e-Business Engineering(ICEBE'06). IEEE, 20061102-109.
  • 3Asnar Y, Zannone N. Perceived risk assessment [ C ] //Proceedings of the 4th ACM workshop on Quality of protection(QoP'08). ACM, 2008: 59-63.
  • 4Josang A,Presti S. Analysing the relationship between risk and trust[C]//Proceedings of Second International Conference on Trust Management (iTrust 2004 ). Oxford, UK, March 2004 : 120-134.
  • 5Singh A, Lilja D. Improving risk assessment methodology:a statistical design of experiments approach[C]//Proceedings of the 2nd International Conference on Security of Information and Networks(SIN'09). ACM, 2009 : 21-29.

同被引文献16

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部