期刊文献+

探析基于点对点网络安全的信任模型

Point of Trust Model Based on Network Security
下载PDF
导出
摘要 点对点网络是近些年来成为主流的一种网络结构,随着点对点网络技术的不断发展,为网络发展带来优势的同时,也带来了许多挑战。点对点网络的动态性、自组织性以及匿名性的特征却不能为网络中所有对等节点带来可靠的服务。为了解决这些问题。文章深入探讨了点对点网络的信任模型,给出了信任模型的分类以及关键技术详解,并探讨了点对点网络的发展前景。 The ad hoc network is a network structure in recent years to become mainstream, with the continuous development of peer to peer network technology, network development brings advantages, it also brings many chal enges. Dynamic ad hoc network, but can not bring reliable service and self-organization is characterized by anonymity of al peer nodes in the network. In order to solve these problems. This paper discusses in depth peer network trust model, gives the key techniques detailed classification and trust models and discusses the prospects point to point network.
作者 赵幸
出处 《信息安全与技术》 2015年第1期30-31,共2页
关键词 点对点 网络安全 信任模型 对等节点 point to point network security trust model peer node
  • 相关文献

参考文献6

二级参考文献74

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 4Oram A.. Peer-to-Peer: Harnessing the Power of Disruptive Technology. Sebastopol: O'Reilly Press, 2001
  • 5Aberer K. , Despotovic Z.. Managing trust in a Peer-to-Peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management (ACM CIKM), New York, USA, 2001, 310-317
  • 6Kamwar S. D. , Schlosser M. T. , Hector Garcia-Molina. The eigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, 2003, 640-651
  • 7Damiani E. , De Capitani di Vimereati S. , Parabosehi S. , Samarati P.. Managing and sharing servents' reputations in P2P systems. IEEE Transactions on Data and Knowledge Engineering, 2003, 15(4): 840-854
  • 8Xiong L. , Liu L.. PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management, 2004, 16(7): 843-857
  • 9Srivatsa M. , Xiong L. , Liu L.. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Proceedings of the 14th World Wide Web Conference(WWW 2005), Chiba, Japan, 2005, 422-431
  • 10Manchala D. W.. E-commerce trust metrics and models. Internet Computing, 2000, 4(2): 36-44

共引文献138

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部