期刊文献+

对等网络中不同信任模型的比较分析 被引量:2

Comparative Analysis of Trust Models for P2P Networks
下载PDF
导出
摘要 在诸如文件共享等的Peer-to-Peer环境中,资源共享是用户自愿的行为,在这类系统中由于用户不必为自身的行为担负(法律)责任,因而节点间的信任关系就显得尤为重要。对几种信任模型进行比较,这些模型分别侧重于评估各个节点的服务质量和惩罚不信任的节点等不同侧面,经过比较分析,得出建立P2P信任模型需要考虑的几个方面。 For most peer - to - peer file shared environment, sharing is a volunteer action, and peers are not responsible for themselves' behaviors , so the trust relations between the pees are important. This paper compared several different trust models which respectively emphasized on evaluating the peers' QoS and punishing the distrust peers, so proposed the some problems needed to consider when construct a P2P trust model.
作者 刘静 戴勃
出处 《微处理机》 2008年第6期102-104,共3页 Microprocessors
关键词 对等网络 信任 确定性理论 Peer - to - peer Trust Certainty Factor
  • 相关文献

参考文献7

二级参考文献18

  • 1Wang Y, Vassileva J. Trust and Reputation Model in Peer-to-Peer Networks. In: Proc. of the Third IEEE International Conference on Peer-to-Peer Computing, 2003
  • 2Damiani E, Vimercati D C, Paraboschi S, et al. A Reputation-based Approach for Choosing Reliable Resources in Peer-to-peer Networks. In: Proc. of the 9^th ACM Conference on Computer and Communications Security, 2002
  • 3Kamvar S D, Schlosser M T, Garcia-Molina H. The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proc. of the Twelfth International World Wide Web Conference (WWW2003), 2003
  • 4Selcuk A A, Uzun E, Pariente M R. A Reputation-based Trust Management System for P2P Networks. In: 4^th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2004
  • 5Singh A, Liu Ling. TrustMe: Anonymuous Management of Trust Relationships in Decentralized P2P Systems, In: Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing, 2003
  • 6RAHMAN A A,HAILES S.Supporting trust in virtual communities[A].In Proceedings of Hawaii International Conference on Systems Science[C].Maui,Hawaii,2000.
  • 7ABERER K,DESPOTOVIC Z.Managing trust in a Peer2-Peer information system[A].In Proceedings of the Tenth International Conference on Information and Knowledge Management(ACM CIKM'01)[C].Atlanta,USA,2001.
  • 8WANG Y,VASSILEVA J.Bayesian network-based trust model in Peer-to-Peer Networks[A].In Proceedings of Workshop on "Deception,fraud and trust in agent societies" at the Autonomous Agents and Multi-agent Systems 2003(AAMAS-03)[C].Melbourne,Australia,2003.
  • 9YU B,SINGH M P.Detecting deception in reputation management[A].Proceedings of Second International Joint Conferenee on Autonomous Agents and Multi-agent Systems[C].Melbourne,Australia,2003.
  • 10LIU J,ISSARNY V.Enhanced reputation mechanism for mobile ad hoc networks[A].In Proc of the 2nd International Conf.on Trust Management(iTrust' 2004)[C].Oxford,UK,2004.

共引文献339

同被引文献21

  • 1张仕斌,刘全,曾鸿.基于开放式网络环境的模糊自主信任模型[J].清华大学学报(自然科学版),2006,46(z1):1109-1114. 被引量:7
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3张艳群,张辰.基于模糊理论的信任度评估模型[J].计算机工程与设计,2007,28(3):532-533. 被引量:26
  • 4李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 5Divac-Krnic L,Ackermann R Security-related issues in peerto-peer networks[C] //Proc.of the P2P Systems and Applications.Berlin;Heidelberg:Springer-Verlag,2005:529-545.
  • 6Comelli F,Damiani E.Implementing a reputation-aware gnutella servent[c] //Proc.of the International Workshop on Peer-toPeer Computing.Pisa,2002:321-334.
  • 7Xiong L,Liu L.PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Tram.on Knowledge and Data Engineering,2004,16(7):843-857.
  • 8Guo Leitao,Yang Shoubao,Wang Jing.Trust model based on similarity measure of vectors in P2P networks[C] // Proc.of the 4th International Conf.on Grid and Cooperative Computing.Beijing,China,2005:836-847.
  • 9Repantis T,Kalogeraki V.Decentralized trust management for Ad hoc peer-to-peer networks[C] //Proc.of the 4th International Workshop on Middleware for Pervasive and Ad hoc Computing(MPAC).New York:ACM,2006:6.
  • 10Zhang Xinwen, Chen Songqing, Sandhu R. Enhancing Data Authenticity and integrity in P2P Systems[J]. IEEE Internet Computing, 2005, 9(6):42--49.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部