Read-Write Rule Property Research of the Combined Function about the Confidentiality and Reputation Grade
Read-Write Rule Property Research of the Combined Function about the Confidentiality and Reputation Grade
出处
《通讯和计算机(中英文版)》
2012年第9期1021-1024,共4页
Journal of Communication and Computer
参考文献4
-
1刘益和.基于兴趣分类、信任和安全等级的P2P访问控制[J].北京工业大学学报,2010,36(5):674-678. 被引量:2
-
2姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报,2007,18(10):2551-2563. 被引量:104
-
3LIU Yi-he.Read-write rule property research of the combined function about the confidentiality and integrality[J].通讯和计算机(中英文版),2008,5(5):40-42. 被引量:1
-
4李焕洲,刘益和,李华.基于信任和安全等级的P2P信息流模型[J].计算机应用,2008,28(12):3168-3170. 被引量:5
二级参考文献19
-
1刘益和,沈昌祥.一个信息安全函数及应用模型[J].计算机辅助设计与图形学学报,2005,17(12):2734-2738. 被引量:7
-
2袁巍,李津生,洪佩琳.一种P2P网络分布式信任模型及仿真[J].系统仿真学报,2006,18(4):938-942. 被引量:45
-
3TRAN H, HITCHENS M, VARADHARAJ V, et al. A trust based access control framework for P2P file-Sharing systems [ C]// 2005 HICSS: Proceedings of the 38th Hawaii International Conference on System Sciences. Washington: IEEE Computer Society, 2005: 302c.
-
4GUPTA R, SOMANI A K. Reputation management framework and its use as currency in large-scale Peer-to-Peer networks [ C ]// P2P'04: Proceedings of the 4th International Conference on Peer-to- Peer Computing. Washington: IEEE' Computer Society, 2004:124 - 132.
-
5DEWAAN P, DASGUPTA P. Securing P2P networks using peer reputations: Is there asilver bullet [ C]// CCNC 2005: Second IEEE Consumer Communications and Networking Conference. Washington: IEEE, 2005:30 - 36.
-
6NEIL D, GARCIA-MOLINA H, BEVERLY Y. Open problems in data sharing peer-to- peer systems [ C]// ICDT: 9th Intrenational Confon Database Theory. Siena, Italy: [ s. n], 2003:1 - 15.
-
7GAMBETTA D. Trust: Making and breaking cooperative relations [M]. Oxford: Basil Blackwell, 1990.
-
8RAHMAN A, HAILES S. Supporting trust in virtual communities [ C]// Proceedings of the 33rd Hawaii Intrenational Conference on System Sciences. Hawaii: IEEE Computer Society Press, 2000:4 -7.
-
9J-SANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision [ J]. Decision Support Systems, 2007, 43(2): 618-644.
-
10唐艳超,权义宁,胡予璞.P2P网络中基于级别的访问控制:信息和通讯安全[c]//CCICS2005.北京:科学出版社,2005,4:301-306.
共引文献105
-
1吴吉义,沈千里,陈德人,章剑林.融合QoS的对等电子服务信誉激励研究进展[J].华中科技大学学报(自然科学版),2012,40(S1):365-371.
-
2田俊峰,孙冬冬,杜瑞忠,朱宏涛.基于节点能力和品质的P2P网络信任模型[J].通信学报,2009,30(S1):119-125. 被引量:1
-
3李焕洲,刘益和,李华.基于信任和安全等级的P2P信息流模型[J].计算机应用,2008,28(12):3168-3170. 被引量:5
-
4赵贵昉,李真,张学杰.P2P网络资源共享中基于信誉的访问控制[J].云南大学学报(自然科学版),2007,29(S2):238-240. 被引量:6
-
5王亮,郭亚军.电子商务系统的信任建模与评估[J].计算机工程,2009,35(10):129-131. 被引量:9
-
6王亮,郭亚军.P2P系统中基于声誉的信任评估机制[J].计算机工程与应用,2009,45(15):136-138. 被引量:3
-
7孟宪福,张磊,王旭.P2P电子商务信任模型研究[J].计算机应用研究,2009,26(8):3067-3069. 被引量:9
-
8Yihe Liu.A Lattice Model on P2P Based on Trust and Role[J].通讯和计算机(中英文版),2010,7(1):46-50.
-
9官尚元,伍卫国,董小社,梅一多.开放分布式环境中信任管理综述[J].计算机科学,2010,37(3):22-28. 被引量:6
-
10李勇军,代亚非.对等网络信任机制研究[J].计算机学报,2010,33(3):390-405. 被引量:85
-
1袁拥军.平面向量基本定理的应有举例[J].数学通讯(教师阅读),2008,22(7):29-29. 被引量:1
-
2王勇.盘活向量条件 破解三类题型[J].数学教学,2008(10):22-24. 被引量:2
-
3LIU Yi-he.Read-write rule property research of the combined function about the confidentiality and integrality[J].通讯和计算机(中英文版),2008,5(5):40-42. 被引量:1
-
4傅金泉.法向量在2005年高考数学中的应用[J].中学数学月刊,2006(3):23-25. 被引量:2
-
5宫爱红.数控线切割G指令转换3B指令系统的研究与开发[J].湖北汽车工业学院学报,2007,21(1):56-58. 被引量:3
-
6陈高华.利用课本题进行教学设计的若干尝试[J].数学通报,2015,54(7):50-51.
-
7李凤华,孔宪荣.平面图形的直观图中线段的变化规律探讨[J].中学数学杂志(高中版),2008(5):24-25.
-
8王中华.三角函数最易出错八大点[J].数学教学通讯(数学金刊)(高考),2008(4):10-11.
-
9Xin An ZHANG,Zhao Jun LIANG,Lan Sun CHEN.The Global Dynamics of a Class of Vector Fields in R3[J].Acta Mathematica Sinica,English Series,2011,27(12):2469-2480. 被引量:1
-
10Yu Hai WU Xue Di WANG Li Xin TIAN.Bifurcations of Limit Cycles in a Z_4-Equivariant Quintic Planar Vector Field[J].Acta Mathematica Sinica,English Series,2010,26(4):779-798. 被引量:3