P2P trust model in the trust value

被引:0
|
作者
Jiang Haowei [1 ]
Tan Yubo [1 ]
机构
[1] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou, Peoples R China
关键词
P2P; single node; trust; control mechanism;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the nodes in the P2P networks and dynamic nature of the anonymous make the network application environment have big security risk. Allowing the calculation of the value of the trust application process becomes key issue. In our calculation of the current process of trust, generally have Global trust and local trust. Whether the kind of model is based on a single node based on the trust calculation. We give trust expressed as a single node on the relative side of the trust and confidence of the control mechanism. Two parts' Confidence both included in subjective and objective aspects. Thus it can enhance the reliability of the system.
引用
收藏
页码:365 / 367
页数:3
相关论文
共 50 条
  • [41] The Research Based on Trust Value against Vulnerability in P2P Networks
    Liu, Yuhua
    Li, Yuling
    Chen, Wei
    Xu, Kaihua
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 85 - +
  • [42] Hybrid Trust Model for Worm Mitigation in P2P Networks
    Amine Rguibi, Mohamed
    Moussa, Najem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 21 - 36
  • [43] Related cluster based trust model for P2P networks
    Ma, Y. (myron_my@163.com), 1600, Northeast University (34):
  • [44] A Novel Trust Evaluation Model for Mobile P2P Networks
    Wu, Xu
    NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 210 - 219
  • [45] Incentive Strategy Based on Trust Model in P2P Network
    Lu, Yang
    Wang, Xue
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 192 - 195
  • [46] A Time-decay based P2P Trust Model
    Zhang, Yong
    Wang, Kewen
    Li, Keqiu
    Qu, Wenyu
    Xiang, Yang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 235 - +
  • [47] A Computation Trust Model with Confidence in Unstructured P2P Systems
    Ping, Wang
    Jing, Qiu
    Hui, Qiu Yu
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 451 - 454
  • [48] An optimized and improved network trust model based on P2P
    Wei, Li
    Zhao, Chunjian
    1600, Academy Publisher (08): : 2293 - 2301
  • [49] A Trust Model in P2P E-Commerce Systems
    Yu Zhen
    Shen Gui-cheng
    Liu Hai-yan
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [50] A Trust Model Based on Similarity Evaluation in P2P Networks
    Jin, Yingwei
    Zhang, Yong
    Qu, Wenyu
    Liu, Yining
    Li, Keqiu
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 737 - +