期刊文献+

基于公共信息安全的P2P技术研究 被引量:1

Research of P2P Technology Based on Public Information Security
下载PDF
导出
摘要 本文介绍了P2P网络的结构和特点,分析了P2P自身的技术缺陷及由此带来的信息安全问题。针对这些安全问题,详细阐述如何构建P2P网络的安全防御体系。其中重点提出了一种新的基于P2P网络的信任介绍机制。 In this article, the structure and characteristic of P2P is introduced. The problems of information security which brings by P2P' s own technical defect are analyzed. In response to these security problems, how to build the security defense system on P2P network is given. A recommend trust mechanism based on P2P network is explained strictly.
作者 刘毅
机构地区 湛江师范学院
出处 《电脑与电信》 2011年第5期39-40,49,共3页 Computer & Telecommunication
关键词 P2P 信息安全 防御体系 信任机制 P2P information security defense system trust mechanism
  • 相关文献

参考文献5

二级参考文献23

  • 1何盈捷,王珊,杜小勇.纯Peer to Peer环境下有效的Top-k查询[J].软件学报,2005,16(4):540-552. 被引量:23
  • 2罗杰文.Peerto Peer(P2P)综述[EB/OL].[2005-11-3].http://www.intsci.ac.cn/users/luojw/papers/review.htm.
  • 3Faloutsos M,Faloutsos P,Faloutsos C.On power-law relationships of the Internet topology[J].ACM SIGCOMM Computer Communication Review,1999,29 (4):251-262.
  • 4Chadwick D W,et al. Merging and extending the PGP and PEM -TEL trust model. IEEE Network,Vol. 11 Issue 1997,3.16 -24
  • 5Blaze M ,Feigenbaum J ,Lacy J. Decentralized trust management. In: Dale, J. ,Dinolt, G. ,eds. Proceedings of the 17th Symposium on Secunity and Privacy. Oakland, CA:IEEE Computer Society Press, 1996,164 -173
  • 6Abdul - Rahman A ,Hailes S.A distributed trust model. In:Proceedings of the 1997 New Security Paradigms Workshop. Cumbria. UK: ACM Press,1998, 48-60
  • 7Beth T , Borcherding M , Klein B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security ( ESORICS ). Brighton : Springer - Verlag, 1994,3 - 1 8
  • 8Josang A.The right type of trust for distributed systems. In : Meadows, C. ,ed. Proceedings of the 1996 New Security Paradigms Workshop[M]. Lake Arrowhead, CA: ACM Press, 1996
  • 9Josang A. A model for trust in security systems. In :Proceedings the 2nd Nordic Workshop on Secure Computer Systems. 1997
  • 10Josang A,Knapskog S J.A metric for trusted systems.Global IT Security.Wien:Austrian Computer Society.1998,541-549.

共引文献40

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部