TRUST MANAGEMENT IN P2P SYSTEMS
نویسندگان
چکیده
منابع مشابه
P2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملTrust Management in P2P Networks using Mamdani Fuzzy Inference Systems
Peer to peer (P2P) systems are autonomous and decentralized systems with a form of distributed computing. Hence each peer in the network is heterogeneous and is not fully reliable. In this paper it has been tried to estimate the trustworthiness of each peer in the network using Mamdani Fuzzy Inference Systems. For estimating the trust only some of the parameters are considered, namely Capabilit...
متن کاملTrust Management in P2P Systems Using Standard TuLiP
In this paper we introduce Standard TuLiP a new logic based Trust Management system. In Standard TuLiP, security decisions are based on security credentials, which can be issued by different entities and stored at different locations. Standard TuLiP directly supports the distributed credential storage by providing a sound and complete Lookup and Inference AlgoRithm (LIAR). In this paper we focu...
متن کاملTrust Calculation and Management in P2P and Grid Systems
The significance of efficient security mechanisms in P2P and Grid systems is unquestionable, since security is considered to be a quality of service factor for such systems. Traditional security mechanisms in P2P and Grid systems include encryption, sand-boxing and other access control and authentication mechanisms. Unfortunately these techniques incur additional overhead. By using trust and re...
متن کاملTrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmful content like viruses, trojans or, even just wasting valuable resources of the network. In order to minimize such threats, the use of community-based reputations as trust measurements is fast becoming a de-facto stan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2015
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2015.0405034