期刊文献+

基于信任介绍的P2P安全研究 被引量:3

Research of P2P Security Based on Recommend Trust
在线阅读 下载PDF
导出
摘要 本文在分析研究传统信任模型的基础上,结合近两年最热门的网络架构方式,建立了一种新的基于P2P网络的信任介绍机制.这个机制利用了节点过去在网络中的历史经验,建立了节点之间的信任关系,更加有效的去解决网络中信任关系,而其算法比较简洁,比一些具有复杂算法的信任模型更适合在现实网络中的应用.该机制能够增强网络可用性,具有结构简单、可靠性强的优点. This paper proposed a novel recommend trust mechanism based upon Peer-to-Peer network,one of the most popular and rapidly developed networking structures. This mechanism makes fully use of the past experience of node itself and builds reputation relation between interactional nodes,so it is effectively to solve the problem of lack trust in P2P network. Further more,this algorithm is compactly and more useful when apply it in real network,and this mechanism can enhance P2P's usability and make it more sampler and trustable.
作者 田英
出处 《电脑知识与技术(过刊)》 2007年第18期1553-,1556,共2页 Computer Knowledge and Technology
关键词 P2P 信任介绍 信任模型 P2P Recommend Trust Trust Model
  • 相关文献

参考文献2

二级参考文献23

  • 1何盈捷,王珊,杜小勇.纯Peer to Peer环境下有效的Top-k查询[J].软件学报,2005,16(4):540-552. 被引量:23
  • 2罗杰文.Peerto Peer(P2P)综述[EB/OL].[2005-11-3].http://www.intsci.ac.cn/users/luojw/papers/review.htm.
  • 3Faloutsos M,Faloutsos P,Faloutsos C.On power-law relationships of the Internet topology[J].ACM SIGCOMM Computer Communication Review,1999,29 (4):251-262.
  • 4Chadwick D W,et al. Merging and extending the PGP and PEM -TEL trust model. IEEE Network,Vol. 11 Issue 1997,3.16 -24
  • 5Blaze M ,Feigenbaum J ,Lacy J. Decentralized trust management. In: Dale, J. ,Dinolt, G. ,eds. Proceedings of the 17th Symposium on Secunity and Privacy. Oakland, CA:IEEE Computer Society Press, 1996,164 -173
  • 6Abdul - Rahman A ,Hailes S.A distributed trust model. In:Proceedings of the 1997 New Security Paradigms Workshop. Cumbria. UK: ACM Press,1998, 48-60
  • 7Beth T , Borcherding M , Klein B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security ( ESORICS ). Brighton : Springer - Verlag, 1994,3 - 1 8
  • 8Josang A.The right type of trust for distributed systems. In : Meadows, C. ,ed. Proceedings of the 1996 New Security Paradigms Workshop[M]. Lake Arrowhead, CA: ACM Press, 1996
  • 9Josang A. A model for trust in security systems. In :Proceedings the 2nd Nordic Workshop on Secure Computer Systems. 1997
  • 10Josang A,Knapskog S J.A metric for trusted systems.Global IT Security.Wien:Austrian Computer Society.1998,541-549.

共引文献3

同被引文献10

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部