Trust-based dynamic access control model for P2P network

被引:0
|
作者
Liu, Yichun [1 ]
Liu, Huafu [2 ]
机构
[1] Hangzhou Dianzi Univ, Telecommun Sch, Hangzhou, Peoples R China
[2] Changsha Univ, Dept Comp, Changsha, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the trust mechanism of the peers in P2P network is analyzed, a suitable method is introduced for calculating the trust value of a peers in P2P network by considering the transaction at first hand and the recommendations of other members, a dynamic trust-based access control scheme is developed to address to the security services in P2P environments. This scheme constructs the models,of access control based on trust degree of P2P members, and dynamically manages the access permission, according to the trust values of the subject and object. The basic rules of the trust-based scheme are presented, and the strategies are given for different access services in P2P applications.
引用
收藏
页码:1542 / +
页数:2
相关论文
共 50 条
  • [1] A Trust-Based Access Control Model in P2P Networks Using Ant Colony Optimization
    Li, Junqing
    Li, Xinyou
    Xie, Shengxian
    Chen, Chen
    [J]. PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, 2008, : 180 - 183
  • [2] Dynamic policy based model for trust based access control in P2P applications
    Chatterjee, Madhumita
    Sivakumar, G.
    Menezes, Bernard
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 861 - 865
  • [3] A distributed trust-based refutation model in P2P system
    Liu, Yu-Mei
    Yang, Shou-Bao
    Guo, Lei-Tao
    Chen, Wan-Ming
    Guo, Liang-Nun
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 294 - +
  • [4] A computational trust model for access control in P2P
    Lang Bo
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (05) : 896 - 910
  • [5] A computational trust model for access control in P2P
    Bo Lang
    [J]. Science China Information Sciences, 2010, 53 : 896 - 910
  • [6] A computational trust model for access control in P2P
    LANG Bo State Key Laboratory of Software Development Environment
    [J]. Science China(Information Sciences), 2010, 53 (05) : 896 - 910
  • [7] Trust model based on P2P network
    Ouyang, Guang
    Chen, Xiang
    [J]. Journal of Networks, 2013, 8 (09) : 2013 - 2020
  • [8] Research of Access Authorization Model Based on Trust Negotiation in the P2P Network
    Ye, Junyao
    Wang, Yanhong
    Wang, Yinglian
    [J]. ADVANCES IN INFORMATION TECHNOLOGY AND EDUCATION, PT I, 2011, 201 : 422 - 427
  • [9] Trust-based Testbed for P2P digital library
    Alkhawaldeh, Rami S.
    Alawida, Moatsum
    AlHadid, Issam
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2020, (43): : 705 - 716
  • [10] Trust-based testbed for P2P digital library
    Alkhawaldeh, Rami S.
    Alawida, Moatsum
    AlHadid, Issam
    [J]. Italian Journal of Pure and Applied Mathematics, 2020, 43 : 705 - 716