Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
Monitoring the global state in peer-to-peer networks through decentralized mechanisms allows targeted optimization and improvement of the peer-to-peer network. However, malicious nodes could aim to distort the process of gathering the global state through monitoring. In this paper we propose DOMiNo, a security solution for tree-based peer-to-peer monitoring mechanisms. It passively listens to incoming...
Future Internet of Things (IoT) systems will connect the physical world into cyberspace everywhere and everything via billions of smart objects and are expected to have a high economic impact. To date there is little work on trust computation in IoT environments for security enhancement, especially for dealing with misbehaving owners of IoT devices that provide services to other IoT devices in the...
In this paper we give some background to how the long-lasting discussion on separation of identifiers and locators in networking has influenced the Information-centric Networking (ICN) research. We start with a historical retrospect of the id/locator discussion. We then address the problems that have been fueling the discussion followed by a chronological walkthrough of a number of id/locator split...
Security is one of the most critical constraints for the expansion of P2P networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build trust relationship among peers. While most of the existing trust models focus on decreasing the abuse, intentions and sharing capabilities...
The cloud revolution has helped enterprises to improve their business and performance by providing them computing power, storage capabilities and a variety of services for very less or no infrastructure and reasonable cost. It also provisioned the scientific and academic communities to run complex applications involving large data sets, high performance or distributed resources. The Workflow Management...
In Peer-to-Peer (P2P) e-commerce systems, peers' features such as heterogeneity, anonymity and autonomy lead to some security problems, such as forging, slandering and collective cheating, which affect the quality of service a lot. A trust model in P2P e-commerce systems based on the recommendation is proposed, each peer in the system has a unique credibility of recommendation, two trust parameters...
The following topics are dealt with: pervasive computing; communications workshops; information quality; quality of service; ubiquitous communications; ubiquitous services; pervasive communities; service clouds; sensor networks; middleware; system support; social networking; security; context modeling; context reasoning; mobile peer-to-peer computing; pervasive collaboration; pervasive learning; pervasive...
The problem that the traditional trust model for P2P network can not reflect accurately peers' behaviors introduces an improved trust model based on reputation. Trust will be divided into service reputation and credibility of recommendation, and storage, computing and update algorithm of trust and the randomly extraction algorithm based on credibility of recommendation are raised in the model. The...
This paper proposes a stochastic activity network model for P2P file-sharing to evaluate the quality of service provided. Key characteristics taken into account include the number of peers, fraction of malicious peers, peer churn, endusers' behavior, and security evaluation scheme applied. The results show that security evaluation schemes influence the quality of service significantly, while the fraction...
A trust model for P2P network is proposed in this thesis, namely CRM, a cluster and recommendation based multi-granularity trust model. Compared to the current trust model, some problems can be solved better, for instance, these disadvantages contain great costs due to iterative calculations, and security such as disguise, slandering caused by anonymous and open characteristics of P2P networks. The...
In view of the lack of security and management mechanism in peer to peer (P2P) network, this paper designs an operational and scalable intelligent node overlay network which is P2P-oriented with digital right management functionality and good authentication and accounting capabilities supporting large-scale deployment. It not only can convenience the network communication and make the share and interact...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
The paper offers tree-structured connectivity between the peer entities over an infrastructure network as an abstraction to embody the application-oriented processing functions on peer-to-peer information flows. Tree reconfigurations are triggered when failures or security violations occur in the connectivity path between the peer nodes (e.g., increase in path delays, DOS attack on a node). Reconfigurations...
Due to lack of effective trust management mechanism, there are a lot of deceptive behaviors in P2P networks, which seriously decrease the quality of network services. In order to improve the quality of services (or transactions), this paper proposes a novel trust and reputation model based on similarity evaluation in P2P environments. According to the different context of services, the model gives...
The increasing number of applications offering their services over peer-to-peer (P2P) platforms is changing the properties of the traffic within computer networks. Their massive use raises a few imperative challenges for network administrators and Internet service providers, regarding the quality of service and security of their networks. It such scenario, it is important to develop mechanisms to...
In order to decrease unfair evaluations to service peers in peer-to-peer network, a trust model based on the declaration of preference is proposed in this paper, which considers the similarity between two peers' preferences. The trust model gives the declaration of preference, and proposes algorithms to carry out the computations. Experiments show that our model is better than the trust model without...
Mobile computing environments may be very critical for traditional QoS management techniques often relying on centralized resource coordinating services, due to the unavoidable high unstability of network and service layers. On the other hand, a peer-to-peer approach for continuous service provisioning to mobile users may maintain locally an updated list of service providers, and allow clients to...
This work presents an Internet traffic classification methodology based on statistical discriminators and cluster analysis. An accuracy identification of Internet applications is an important research area, because it is directly related to solve many network problems such as: quality of service (QoS), traffic control, security, network management and operation. The main difference to previous approaches...
To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues of security, quality of service (QoS), scalability, and heterogeneity. However, current streaming solutions do not address all these challenges simultaneously. To address this limitation, this paper proposes a secure and high-performance...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.