The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because the P2P networkpsilas trust mechanism receives frequently cheat and attack from the malicious nodes, this paper identified four vulnerabilities that are detrimental to trust management, and presented a vague set-based anti-attacked trust model. This model used degree of membership to measure trust degree of uncertainty information, employed the time sensitive coefficient and the penalty coefficient...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats. One feasible way to minimize threats is to establish the reputation-based global trust model. Previous work about the global trust model is almost based on the assumption that the peer with higher trust value will provide more honest feedbacks, and make the quality of feedback of a peer approximately...
Construct a peer-to-peer (P2P) e-commerce trust model based on group-recommend. It divides P2P network into several functional peer group, computes direct trust value and the recommended trust value separately, and gets the total trust value. Experimental results demonstrate that this model can deal with the malicious attacks and help the users to find trading partner who can be trusted.
Many current P2P trust models are not suitable for P2P e-commerce because the characteristics of P2P e-commerce are not taken into account. In addition, the simple representation of trust cannot be used to accurately gain assess to other peers in the e-commerce community because of the diversity and subjectivity of trust. In order to evaluate the peers for each other, this paper developed a vector-based...
An important challenge regarding peer's trust valuation in peer-to-peer (P2P) networks is how to cope with such problems as dishonest feedbacks of malicious peers and collusions, which cannot be effectively tackled by the existing solutions. So a recommendation belief (RB)-based distributed trust management model for P2P networks, named RBTrust for short, is proposed to quantify and evaluate the trustworthiness...
Nowadays, most of access control models have been studied extensively in centralized and static environment, and they seldom meet the requirements of some dynamic collaborative environments, such as Grid, P2P and ad-hoc network. In this paper, the trust mechanism of the agents in collaborative environments is analyzed, a suitable method is introduced for calculating the agentpsilas trust in collaborative...
The following topics were dealt with: security, privacy and trust; information and data management; Web and search; Web and services; P2P and grid; knowledge and machine leaning; wired and wireless networks; image and signal processing; distributed applications and performance evaluation; business applications and management; education and new technologies; pervasive computing and robotics.
In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-Peer reputation systems allow users to assess the trustworthiness of unknown entities based on subjective feedback from the other peers. However, this cannot constitute sufficient proof for many transactions like service composition,...
To make the Internet today more connective with better performance, we developed the SoftInternet system, which consists of application layer proxies operated in P2P structure. To keep malicious peers out of the system in the beginning, we propose the model for admission control policy based on trust friend recommendations in social networks. We simulate the model to analyze the parameters and its...
Trust plays an important role in peer-to-peer (P2P) networks for enabling peers to share resources and services. It is necessary to build an effective security trust model to solve the trust problem during interactions between peers. In this paper, we propose an enhanced trust model based on reputation. We apply SupP2Prep [Chhabra et al., 2004] in our trust model, which is a protocol for reputation...
The anonymity and dynamic characters of p2p (peer to peer) system makes p2p become hotbed with selfish and vicious action. In order to solve the problem of node cheating caused by high dynamic property of P2P, this paper designs a security trust model -- BGTR based on the idea of probability model and fuzzy mathematics. The scheme adopts a new query method that the inquiry peer initiates the calculated...
In nonhierarchical public key infrastructure (PKI), any user can be a certificate authority (CA) to issue digital certificates to other users. As there is no single root CA, it is difficult to check the validity of certificates issued by unknown CAs. It is very risky to trust them without in-depth analysis. How users issue certificates in the real world has not been studied. Solomon Aschpsilas conformity...
Peer-to-peer (P2P) network systems have an open and dynamic nature for sharing files and real-time data transmission. While P2P systems have already many existing and envisioned applications, the security issue of P2P systems is still worth deeply researching. Some traditional approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches, however, only addressed...
Successful electronic commerce allows businesses to create more efficient channels for product sales or to create new business opportunities. Trust plays an important role in successful online businesses. In this paper, we consider the important case of interactions in peer communities, and then propose a trust establish model based on social computing which aims at avoiding interaction with undesirable...
Grid computing is to enable coordinated resource sharing in dynamic, distinct virtual organizations, which are consisted of different grid entities from traditional organizations. Grid security must ensure secure and authorized access to grid services in such dynamic, heterogeneous and unpredictable gird environment. The main current security solution is applying trust as an important factor to the...
In a peer-to-peer (P2P) overlay network, a peer process (peer) communicates with other peers and manipulates objects like databases in the peers. It is critical to obtain service information on what peers support what service. In a fully distributed, unstructured P2P network, there is no centralized coordinator. It is critical for a peer to identify which acquaintance is trustworthy since acquaintances...
Successful uptake of digital ecosystems requires trust in the underlying platform and in the users of that platform. Accountability mechanisms provide a basis for creating, monitoring and evolving trust. This work analyses the requirements for accountability in digital ecosystems and proposes an accountability model for deployment of digital ecosystems in peer-to-peer networks.
Induced by computing of more general networks, such as social networks, trust has been shown to have fundamental effects on the dynamics of evolution. Inspired this, we derive the dynamics governing the evolution of such a system, P2P network, starting from fundamental individual level of trust. We show that how computing is modeled based on game theory and how the ideas of evolutionary theory apply...
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending peer-to-peer (P2P) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far, research in this domain has led...
Almost all of reputation systems for P2P applications are purely decentralized, trust management is complicated and convergence speed of trust in node is slow; even in most of them cost of network is overwhelming due to adopt broadcast searching mechanism. We present a partially decentralized time- sensitive reputation management model that has several advantages. Trust evaluator can define the valid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.