The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain peers can be manipulated intentionally by adversaries. In this paper, we report the discovery of a novel attack, named RepHi (Reputation Hijack), against rating-based reputation systems,...
Context is important situational details, yet poorly utilized in interactive computing. The fact is that it can have impact on the trust decision to make. Motivated by that, we discuss and formalize functions of dynamic trust computation model based on context-aware in P2P environments. We firstly present the definition of context-aware and trust, and then give the trust computation including directed...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based global trust model. Previous work about the global trust model is almost based on the assumption that the peer with higher trust value will provide more honest feedbacks,...
Educational resources is very rich, but the utilization rate is very low. There is a lot of redundancy and waste., To the whole education it would be a big step forward if We can integrate educational resources with the Internet to achieve the sharing of resources. peer-to-peer technology to share resources solves the problem. But some of the shortcomings of its own bring a number of other issues...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
With some critical defects existing in a P2P anonymous network such as stability and security issues, we propose a novel approach called REM-P2PAE to evaluating the reputation based on P2P anonymous environment in the light of our research and analysis. These defects having long been neglected including the short on-line time of reputation model peers, the variations in dynamic situations of peers,...
The anonymity and dynamic characters of p2p (peer to peer) system makes p2p become hotbed with selfish and vicious action. In order to solve the problem of node cheating caused by high dynamic property of P2P, this paper designs a security trust model -- BGTR based on the idea of probability model and fuzzy mathematics. The scheme adopts a new query method that the inquiry peer initiates the calculated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.