期刊文献+

基于BitTorrent的P2P安全模型的设计 被引量:2

BitTorrent,P2P Security Model-based Design
下载PDF
导出
摘要 本文以基于BitTorrent的P2P安全模型设计为研究对象,从基于BitTorrent的P2P安全模型设计原则、设计结构框架这两个方面入手,对其做出了详细说明,在此基础之上侧重从基础安全服务层以及综合安全服务层这两点针对基于BitTorrent系统安全模型的设计作业进行了分析与研究,据此论证了BitTorrent在P2P网络安全建设与安全管理中深远的应用意义与价值。 In this paper,based on BitTorrent,P2P security model design for the study,based on BitTorrent,P2P security model design principles,design of structural framework of these two aspects,its to make a detailed explanation on this basis,focusing on from the foundationsecurity services layer,and comprehensive security service layer for the job based on the design of the BitTorrent system security model analysis and research,and accordingly demonstrated a BitTorrent P2P network Security building and security management in the farreaching application of the meaning and value.
作者 王雅静
出处 《软件》 2012年第6期128-130,共3页 Software
关键词 BITTORRENT P2P 网络 安全模型 设计 原则 框架 BitTorrent P2P network security model design principles framework
  • 相关文献

参考文献8

二级参考文献98

  • 1曾炜,阎保平.工作流模型研究综述[J].计算机应用研究,2005,22(5):11-13. 被引量:33
  • 2常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307. 被引量:101
  • 3杨峰,李凤霞,余宏亮,战守义,郑纬民.一种基于分布式哈希表的混合对等发现算法[J].软件学报,2007,18(3):714-721. 被引量:15
  • 4李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 5张春瑞,徐恪,王开云,姜建国.基于信任向量的P2P网络信任管理模型[J].清华大学学报(自然科学版),2007,47(7):1224-1228. 被引量:12
  • 6Aberer K and Despotovic Z. Managing trust in a peer-2-peer information system[C]. International Conference on Information and Knowledge Management, New York: ACM,2001: 310-317.
  • 7Ciszkowski T, Eliasson C, and Fiedler M. SecMon: End-to- End Quality and Security Monitoring SystemiC]. 7th International Conference on Computer Science-Research and Applications (IBIZA 2008), Poland, Kazimierz Dolny 31.01-2.02 2008, Published in Annales UMCS, Informatica, AI 8 (2008): 186-201.
  • 8Abdul-Rahman A and Hailes S. Supporting trust in virtual communities[C]. Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii, 2000. Washington: HICSS, Vol. 6, 6007.
  • 9Cornelli F, Damiani E, and Vimercati S, et al.. Choosing reputable servents in a P2P network[C]. International World Wide Web Conference, New York: ACM, 2002: 376-386.
  • 10Repantis T and Kalogeraki V. Decentralized trust management for ad-hoc peer-to-peer networks[C]. Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC), New York: ACM, 2006: 6.

共引文献109

同被引文献36

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部