期刊文献+

一种基于对等网的资源主动发布方法 被引量:2

Method of Actively Resource Publishing Based on P2P
下载PDF
导出
摘要 资源发布可以分为被动发布和主动发布 ,如何有效安全地向大量用户分发数据、软件资源是资源主动发布难题之一 ,应用对等网技术是其一种有效途径 .本文提出一种利用网络结点之间隐含存在的信任关系构成资源主动发布对等网的新方法 ,该方法具有可扩展性、容错性。 Resource publishing may be classified as passively publishing and actively publishing. One of difficulties in actively publishing is that how to disseminate resources such as data, software to a mass of users efficiently and securely. Applying peer to peer technology is one of effective approaches. This paper proposes a novel method which utilizes trust relations existed implicitly among network nodes to construct a peer to peer network for resource publishing. The proposed solution is scalable, secure and fault tolerant .
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第4期526-530,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目 ( 69773 0 40 )资助 国家 863项目 ( 863 -10 4-0 2 -0 1)资助
关键词 对等网 资源主动发布 信任网络 自适应 flooding p2p actively resource publishing trust web adaptive flooding
  • 相关文献

参考文献1

二级参考文献2

  • 1刘欣然.基于Web的计算资源发布研究:(学位论文)[M].哈尔滨:哈尔滨工业大学计算机系,1998..
  • 2刘欣然,学位论文,1998年

同被引文献23

  • 1黄道颖,黄建华,庄雷,李祖鹏.基于主动网络的分布式P2P网络模型[J].软件学报,2004,15(7):1081-1089. 被引量:29
  • 2赵恒,权义宁,胡予濮.对等网环境下一种安全有效的信誉体制[J].计算机应用,2005,25(3):551-553. 被引量:20
  • 3Rebecca Bace, Peter Mell. Intrusion Detection Systems [EB/OL]. (2001-6)[2008-6].http://linuxsecurity.org/resource_files/intrusion_detection/.
  • 4Teresa Lunt. The Common Intrusion Detection Framework (CIDF) [EB/OL]. (1999-9) [2008-6]. http://gost.isi.edu/cidf/.
  • 5Smirnova Vira. Multi-Agent System for Distributed Data Fusion in Peer-to-peer Environment [EB/OL]. (2001-11)[2008-6]. http://research.jyu.fi/p2pgroup/documents/MastersThesisSmimovaV ira.pdf.
  • 6M E Locasto, J Parekh, A D Keromytis, S J Stolfo. Towards Collaborative Security and P2P Intrusion Detection [C]//2005 IEEE Workshop on IAS, USA: United States Military Academy, West Point, NY, June 2005: 30-31.
  • 7L Gong. Project JXTA: A Technology Overview Whitepaper [EB/OL]. (2002-9) [2008-6]. http://www.jxta.org/project/www/docs/jxtaview_01nov02.pdf.
  • 8P Szorand F. Linux Slapper Worm [EB/OL]. (2003-7) [2008-6]. http://securityresponse.symantec.com/avcenter/venc/data/linux.slap per.worm.html.
  • 9Janakiraman R Waldvogel, M Qi Zhang. Indra: A peer-to-peer approach to networkintrusion detection and prevention [C]// 12th IEEE IW, June 2003. USA: IEEE, 2003: 226-231.
  • 10Catalin L Dumitrescu. INTCTD: A Peer-to-Peer Approach for Intrusion Detection [C]// Sixth IEEE International Symposium on Cluster Computing and the Grid, 2006. USA: IEEE, 2006: 89-92.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部