`
- 浏览:
1046753 次
-
P2P Trust Paper Reference
-
PPay: Micropayments for Peer-to-Peer Systems, Beverly Yang and Hector Garcia-Molina.
In ACM CCS 2003
-
Privacy Preserving Indexing of Documents on the Network, Mayank Bawa, Roberto Bayardo Jr., and Rakesh Agrawal.
In VLDB, 2003
-
SLIC: A Selfish Link-based Incentive Mechanism for Unstructured Peer-to-Peer Networks, Qi Sun and Hector Garcia-Molina.
In ICDCS, 2004
-
Identity Crisis: Anonymity vs. Reputation in P2P Systems, Sergio Marti and Hector Garcia-Molina.
In IEEE Conference on Peer-to-Peer Computing, 2003
-
Incentives for Combating Free-riding on P4P Networks (Research Note), Sepandar Kamvar, Mario Schlosser and Hector Garcia-Molina.
In ICPDC, 2003
-
Addressing the Non-Cooperation Problem in Competitive P2P Systems, Sepandar D. Kamvar, Beverly Yang and Hector Garcia-Molina.
In P2P and Economics, 2003
-
The EigenTrust Algorithm for Reputation Management in P2P Networks,
Sepandar D. Kamvar, Mario T. Schlosser and Hector Garcia-Molina. In WWW, 2003.
-
Query-Flood DoS Attacks in Gnutella, Neil Daswani and Hector Garcia-Molina.
In ACM CCS, 2002.
- Peer Pressure: Distributed Recovery from Attacks in Peer-to-Peer Systems, Pedram Keyani, Brian Larson and Muthukumar Senthil.
In IFIP Peer-to-Peer Computing, 2002.
-
Protecting the PIPE from malicious peers Brian Cooper, Mayank Bawa, Neil Daswani, and Hector Garcia-Molina.
In FGCS 2004.
Trust [includes P2P]
- Au, R., Looi, M. and Ashley, P. Automated cross-organizational trust establishment on extranets. in Proceedings of the workshop on Information technology for virtual enterprises, IEEE Computer Society,
Queensland, Australia, 2001, 3-11.
- Bertino, E., Ferrari, E. and Squicciarini, A.C. Trust-X: a peer-to-peer framework for trust establishment. Knowledge and Data Engineering, IEEE Transactions on, 16 (7). 827-842.
- Damiani, E., Vimercati, S.d.C.d., Paraboschi, S., Samarati, P. and Violante, F., A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. in CCS'02, (Washington DC, USA, 2002).
- Khedr, M. and Karmouch, A. Negotiating Context Information in Context-Aware Systems. IEEE Intelligent Systems, 19 (6). 21-29.
- Lin, C., Varadharajan, V., Wang, Y. and Pruthi, V., Enhancing grid security with trust management. in Services Computing, 2004. (SCC 2004). Proceedings. 2004 IEEE International Conference on, (2004),
303-310.
- Mengshu, H., Xianliang, L., Xu, Z. and Chuan, Z. A trust model of p2p system based on confirmation theory. SIGOPS Oper. Syst. Rev., 39 (1). 56-62.
- Au, R., Looi, M. and Ashley, P. Automated cross-organisational trust establishment on extranets. in Proceedings of the workshop on Information technology for virtual enterprises, IEEE Computer Society,
Queensland, Australia, 2001, 3-11.
- Ting Yu; Winslett, M.; A unified scheme for resource protection in automated trust negotiation. Security and Privacy, 2003. Proceedings. 2003 Symposium on 11-14 May 2003 Page(s):110 - 122
- Kagal, L.; Finin, T.; Joshi, A.; Trust-based security in pervasive computing environments. IEEE Computer Volume 34, Issue 12, Dec. 2001 Page(s):154 – 157
- Seamons, K.E.; Winslett, M.; Ting Yu; Chan, T.; Child, E.; Halcrow, M.; Hess, A.; Holt, J.; Jacobson, J.; Jarvis, R.; Smith, B.; Sundelin, T.; Lina Yu; Trust Negotiation in Dynamic Coalitions. DARPA Information
Survivability Conference and Exposition, 2003. Proceedings, Volume 2, 22-24 April 2003 Page(s):240 - 245 vol.2
- Huu Tran; Hitchens, M.; Varadharajan, V.; Watters, P.; A Trust based Access Control Framework for P2P File-Sharing Systems. System Sciences, 2005. HICSS '05. Proceedings of the 38th Annual Hawaii International
Conference on 03-06 Jan. 2005 Page(s):302c - 302c
- Hua Wang; Yanchun Zhang; Jinli Cao; Varadharajan, V.; Achieving secure and flexible M-services through tickets. Systems, Man and Cybernetics, Part A, IEEE Transactions on, Volume 33, Issue 6, Nov. 2003
Page(s):697 – 708
- Gummadi, A.; Yoon, J.P.; Modeling group trust for peer-to-peer access control. Database and Expert Systems Applications, 2004. Proceedings. 15th International Workshop on 30 Aug.-3 Sept. 2004 Page(s):971
– 978
- Seamons, K.E.; Chan, T.; Child, E.; Halcrow, M.; Hess, A.; Holt, J.; Jacobson, J.; Jarvis, R.; Patty, A.; Smith, B.; Sundelin, T.; Lina Yu; TrustBuilder: negotiating trust in dynamic coalitions. DARPA
Information Survivability Conference and Exposition, 2003. Proceedings, Volume 2, 22-24 April 2003 Page(s):49 - 51 vol.2
- Adam Hess, Jason Holt, Jared Jacobson, Kent E. Seamons, Content-triggered trust negotiation, Pages: 428 – 456.
- Khambatti, M.; Partha Dasgupta; Ryu, K.D.; A role-based trust model for peer-to-peer communities and dynamic coalitions Information Assurance Workshop, 2004. Proceedings. Second IEEE International. 2004
Page(s):141 - 154
- Song Ye; Makedon, F.; Ford, J.; Collaborative automated trust negotiation in peer-to-peer systems. Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on 25-27 Aug.
2004 Page(s):108 - 115
- Bearly, T.; Vijay Kumar; Expanding trust beyond reputation in peer-to-peer systems. Database and Expert Systems Applications, 2004. Proceedings. 15th International Workshop on. 30 Aug.-3 Sept. 2004 Page(s):966
– 970
- Aameek Singh; Ling Liu; TrustMe: anonymous management of trust relationships in decentralized P2P systems. Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on. 1-3
Sept. 2003 Page(s):142 – 149.
- Wierzbicki, A.; Strzelecki, R.; Swierezewski, D.; Znojek, M.; Rhubarb: a tool for developing scalable and secure peer-to-peer applications. Peer-to-Peer Computing, 2002. (P2P 2002). Proceedings. Second
International Conference on 5-7 Sept. 2002 Page(s):144 – 151
- Kangasharju, J.; Ross, K.W.; Turner, D.A.; Secure and resilient peer-to-peer e-mail design and implementation. Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on
1-3 Sept. 2003 Page(s):184 – 191.
- Skogsrud, H.; Benatallah, B.; Casati, F.; Model-driven trust negotiation for Web services.Internet Computing, IEEE. Volume 7, Issue 6, Nov.-Dec. 2003 Page(s):45 – 52
Peer to Peer Systems
- Einhorn, M.A. and Rosenblatt, B. Peer-to-Peer Networking and digital rights managmeent: How market tools can solve copyright problems. Policy Analysis (534).
- Fenkam, P.; Dustdar, S.; Kirda, E.; Reif, G.; Gall, H.; Towards an access control system for mobile peer-to-peer collaborative environments. Enabling Technologies: Infrastructure for Collaborative Enterprises,
2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on 10-12 June 2002 Page(s):95 - 100
- Ravi Sandhu, Xinwen Zhang, Access management for distributed systems: Peer-to-peer access control architecture using trusted computing technology. Proceedings of the tenth ACM symposium on Access control
models and technologies. June 2005
- Dailey Paulson, L.; P2P hacker tool poses escalating threat, IEEE Computer, Volume 37, Issue 5, May 2004 Page(s):22 – 23.
- Li Xiong; Ling Liu; PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. Knowledge and Data Engineering, IEEE Transactions on. Volume 16, Issue 7, July 2004 Page(s):843
– 857.
- Talia, D.; Trunflo, P.; Toward a synergy between P2P and grids. Internet Computing, IEEE. Volume 7, Issue 4, July-Aug. 2003 Page(s):96, 94 - 95
- Bin Yu; Singh, M.P.; Sycara, K.; Developing trust in large-scale peer-to-peer systems. Multi-Agent Security and Survivability, 2004 IEEE First Symposium on. 30-31 Aug. 2004 Page(s):1 – 10.
- Locasto, M.E.; Parekh, J.J.; Keromytis, A.D.; Stolfo, S.J.; Towards collaborative security and P2P intrusion detection. Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. Proceedings
from the Sixth Annual IEEE. 15-17 June 2005 Page(s):333 - 339
- Zhengqiang Liang; Weisong Shi; PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing System Sciences, 2005. HICSS '05. Proceedings of the 38th Annual Hawaii International
Conference on. 03-06 Jan. 2005 Page(s):201b - 201b.
- Wang, Y.; Vassileva, J.; Trust and reputation model in peer-to-peer networks. Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on. 1-3 Sept. 2003 Page(s):150 - 157
分享到:
Global site tag (gtag.js) - Google Analytics
相关推荐
a P2P trust and reputation simulator developed by PENNSYLVANIA university using Java. website: http://rtg.cis.upenn.edu/qtm/p2psim.php3
p2p开发p2p开发p2p开发p2p开发p2p开发p2p开发p2p开发p2p开发
很好的P2P传输源码,通过P2P发送、接收文件
p2p
P2P聊天软件P2P聊天软件P2P聊天软件P2P聊天软件
Hearsay 是一个简单的 p2p IM 框架,用于信任和声誉跟踪。 它是用 Java 编写的,并通过 Jabber XML 消息传递协议进行通信。
本课题讨论并研究的主要问题是,分析研究P2P技术及该技术下流媒体数据传输的应用,设计并实现一个基于P2P技术的传输服务系统。通过搭建P2P传输平台,研究流媒体数据的实时高效传输。1.研究P2P传输技术的相关理论,...
p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over ...
主要内容包括P2P概述、P2P网络拓扑结构、P2P网络搜索技术、P2P关键技术及应用、P2P网络中的nat穿透技术、基于P2P的bittorrent(后文简称bt)技术、基于P2P的emule文件共享技术、基于P2P的skype即时通信技术、基于P2P的...
主要内容包括P2P概述、P2P网络拓扑结构、P2P网络搜索技术、P2P关键技术及应用、P2P网络中的nat穿透技术、基于P2P的bittorrent(后文简称bt)技术、基于P2P的emule文件共享技术、基于P2P的skype即时通信技术、基于P2P的...
反p2p软件 反p2p 反p2p软件反p2p软件反p2p软件反p2p软件
本书分为3个部分:基础原理、P2P技术关键问题和系统设计与实现。基础理论部分介绍P2P网络的基本概念、网络结构、主流P2P应用系统架构,使读者掌握P2P相关基础理论。P2P技术关键问题部分论述了网络穿越、安全通信等...
m3u8解析源码加速p2p视频解析,m3u8解析源码加速
P2P终结者 4.04P2P终结者 4.04P2P终结者 4.04P2P终结者 4.04P2P终结者 4.04P2P终结者 4.04
p2p的一些例子
IEEE 2009 有关P2P信任模型的文章
Improving Data Access in P2P Systems;Information Retrieval in P2P Networks Using ...Managing Trust in a Peer-2-Peer Information System;Peer-to-Peer 文件共享系统中信誉机制的研究;对等网络研究综述,etc。
易语言P2P实例源码,P2P实例
A MECHANISM OF MANAGEMENT OF TRUST VALUE OF WEB SERVICE IN P2P ENVIRONMENT,杨静波,,Peer to Peer (P2P) systems become more and more popular and bring both opportunities and threats. In the issues of...