Reputation-based trust mechanism for P2P e-commerce systems

被引:42
|
作者
Jiang, Shou-Xu [1 ]
Li, Jian-Zhong [1 ]
机构
[1] School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China
来源
Ruan Jian Xue Bao/Journal of Software | 2007年 / 18卷 / 10期
关键词
Electronic commerce;
D O I
10.1360/jos182551
中图分类号
学科分类号
摘要
引用
收藏
页码:2551 / 2563
相关论文
共 50 条
  • [31] A P2P-based trust model for e-commerce
    Su, Cheng
    Zhang, Hong
    Bi, Fang-ming
    ICEBE 2006: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2006, : 118 - +
  • [32] A Reputation-Based Resilient and Recoverable P2P Botnet
    Yin, Jie
    Cui, Xiang
    Li, Ke
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 275 - 282
  • [33] Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
    Wang, Guojun
    Musau, Felix
    Guo, Song
    Abdullahi, Muhammad Bashir
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (03) : 824 - 833
  • [34] Dynamic secure trust management model for P2P e-commerce environments
    Li, Zhi-Yuan
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2011, 32 (03): : 50 - 59
  • [35] Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
    Musau, Felix
    Wang, Guojun
    Guo, Song
    Abdullahi, Muhammad Bashir
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 547 - 554
  • [36] E-Commerce Based Agents over P2P Network
    Zhang, Zhibing
    INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2008, : 77 - 81
  • [37] Reputation-Based Resource Allocation in P2P Systems: A Game Theoretic Perspective
    Goswami, Antriksh
    Gupta, Ruchir
    Parashari, Gopal S.
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (06) : 1273 - 1276
  • [38] P2P-based E-Commerce Trust Model and Strategies
    Xin, Chen
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 481 - 483
  • [39] A Reputation-Based Approach for Countering Vulnerabilities in P2P Networks
    Chen, Jianguo
    Lu, Huijuan
    Bruda, Stefan D.
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 263 - 266
  • [40] Reputation-based Methods for Building Secure P2P Networks
    Novotny, Miroslav
    Zavoral, Filip
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 410 - 415