The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
Open and anonymous communication networks like Peer-to-peer (P2P) systems promise to eliminate the scalability concerns and central vulnerability points. But P2P systems are often insecure and provide an opportunity for viruses and distributed denial of service (DDoS) activities to spread due to the fact that there is no method to verify the trustworthiness of users and shared files. To make such...
As a means of resources sharing, peer-to-peer (P2P) networks are currently receiving much attention. However, the open and anonymous nature of P2P networks also paves the way for malicious users to abuse the systems such as disseminating of inauthentic files or even viruses. To counter such menacing vulnerabilities in P2P networks, this paper presents a reputation-based approach that combines personal...
Peer-to-peer systems have gained immense popularity in the recent years, but trustworthiness of the services in P2P systems still remain a major concern. Trust is an important aspect of decision making and particularly influences the specification of security policy. A dependable trust model should be capable of handling the following important issues: dealing with sudden fluctuations in peer behavior,...
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third authorities to mediate the interactions. A peer will need reputation mechanisms by self-experiencing and incorporating the knowledge of other peers to decide whether to trust another peer in P2P systems. On the basis of introduction on the trust properties and common problems...
We developed a model to investigate the phenomenon of whitewashing in peer-to-peer (P2P) systems. A white washer is a node that leaves the network and re-joins using a different identity. Whitewashing is a common problem in P2P systems and is a difficult to manage properly for reputable systems. The paper discusses the definition and properties of trust, formally represents the node by the labeled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.