期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Adaptive Trust Management Framework in P2P Grid Computing
1
作者 WANG Yinglong HU Jingzhu 《Wuhan University Journal of Natural Sciences》 CAS 2008年第1期33-36,共4页
In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties en... In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed. 展开更多
关键词 trust management POLICY REPUTATION proof of compliance p2p Grid computing
下载PDF
A Survey of Web Information System and Applications
2
作者 HAN Yanbo LI Juanzi +3 位作者 YANG Nan LIU Qing XU Baowen MENG Xiaofeng 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期769-772,共4页
The fourth international conference on Web information systems and applications (WISA 2007) has received 409 submissions and has accepted 37 papers for publication in this issue. The papers cover broad research area... The fourth international conference on Web information systems and applications (WISA 2007) has received 409 submissions and has accepted 37 papers for publication in this issue. The papers cover broad research areas, including Web mining and data warehouse, Deep Web and Web integration, P2P networks, text processing and information retrieval, as well as Web Services and Web infrastructure. After briefly introducing the WISA conference, the survey outlines the current activities and future trends concerning Web information systems and applications based on the papers accepted for publication. 展开更多
关键词 Web mining data warehouse Deep Web Web integration Web services p2p computing text processing information retrieval Web security
下载PDF
Study on the Distributed Routing Algorithm and Its Security for Peer-to-Peer Computing
3
作者 ZHOUShi-jie 《Journal of Electronic Science and Technology of China》 2005年第2期187-188,共2页
关键词 peer-to-peer computing p2p distributed computing information security distributed routing algorithm bidding-electing algorithm one-way accumulator
下载PDF
Hybrid Collaborative Management Ring on Mobile Multi-agent for Cloud-P2P
4
作者 Xiao-Long Xu Nik Bessis Peter Norrington 《International Journal of Automation and computing》 EI CSCD 2016年第6期541-551,共11页
In order to fully utilize all potential available network resources and make the interoperability of systems possible, we propose to integrate cloud computing and peer-to-peer (P2P) computing environments together. ... In order to fully utilize all potential available network resources and make the interoperability of systems possible, we propose to integrate cloud computing and peer-to-peer (P2P) computing environments together. We utilize the mobile multi-agent technology to construct an effective hierarchical integration model named Cloud-P2P. As the original management mechanisms for traditional cloud computing and P2P computing systems are no longer applicable to Cloud-P2P, we propose a novel hybrid collaborative management ring based on mobile multi-agent in order to ensure the efficiency and success rate of task implementation in the Cloud- P2P environment. This mechanism needs to divide the system into core ring, cloud inner rings and several peer rings. In each ring, every node is in collaboration with its neighbor nodes with multi-agent, or uses mobile agent moving from node to node with string or parallel methods to monitor the statuses and performances of all nodes, in order to avoid problems of performance bottleneck and single point failure. This paper analyses the node conditions of cloud computing and P2P computing environments in-depth, then elaborates on Cloud-P2P and the hybrid collaborative management ring based on mobile multi-agent (HCMRMMA). After that, the construction method of the network ring topology for Cloud-P2P is introduced. Finally, experimental results and performance analysis of HCMRMMA are presented. 展开更多
关键词 Cloud computing peer-to-peer p2p computing mobile multi-agent integration management.
原文传递
P2P network traffic control mechanism based on global evaluation values
5
作者 XU Xiao-long WANG Ru-chuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第3期66-70,共5页
Peer-to-peer(P2P) computing technology has been widely used on the Internet to exchange data. However, it occupies much network bandwidth, and thus greatly influences traditional business on the Internet. Besides, p... Peer-to-peer(P2P) computing technology has been widely used on the Internet to exchange data. However, it occupies much network bandwidth, and thus greatly influences traditional business on the Internet. Besides, problems about free-riders and 'tragedy of the commons' in the P2P environment estrange from it P2P users who constantly contribute to the network with quality resources. This article proposes a new P2P network traffic control mechanism based on global evaluation values. It aims to help individual users to avoid peak traffic time as much as possible, ease network congestion and protect traditional business on the Internet, as well as differentiating priority grades of peers according to their contributions and stimulating them to share their valuable resources actively. This article first analyzes the current state of network traffic, and then elaborates on P2P network traffic control policies and proposes the peer's priority level differentiation mechanism based on global evaluation values. Finally, after the testing results and analysis of the proposed P2P network traffic control mechanism are discussed, conclusions are drawn. 展开更多
关键词 Peer-to-peer computing p2p traffic control global evaluation values
原文传递
Database Research: Achievements and Challenges 被引量:4
6
作者 王珊 杜小勇 +1 位作者 孟小峰 陈红 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第5期823-837,共15页
Database system is the infrastructure of the modern information system. The R&D in the database system and its technologies is one of the important research topics in the field. The database R&D in China took off la... Database system is the infrastructure of the modern information system. The R&D in the database system and its technologies is one of the important research topics in the field. The database R&D in China took off later but it moves along by giant steps. This report presents the achievements Renmin University of China (RUC) has made in the past 25 years and at the same time addresses some of the research projects we, RUC, are currently working on. The National Natural Science Foundation of China supports and initiates most of our research projects and these successfully conducted projects have produced fruitful results. 展开更多
关键词 database management system parallel database systems Chinese database systems self-managing databases p2p computing and databases data warehousing OLAP Web data management XML mobile data management semantic web contextual information retrieval
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部