P2p trust paper reference

Source: Internet
Author: User
Privacy, security, trust and incentives
  • Ppay: micropayments for peer-to-peer systems, Beverly Yang and Hector Garcia-Molina.
    In acm ccs 2003
  • Privacy preserving indexing of specified ents on the network, Mayank Bawa, Robert bayardo jr., and Rakesh Agrawal.
    In vldb 2003
  • SLIC: A selfish link-Based Incentive mechanic for Unstructured Peer-to-peer networks, Qi sun and Hector Garcia-Molina.
    In icdcs 2004
  • Identity Crisis: anonymity vs. reputation in P2P systems, Sergio marti and Hector Garcia-Molina.
    In IEEE Conference on peer-to-peer computing, 2003
  • Incentives for combating free-riding on P4P networks (Research Note), sepandar kamvar, Mario Schlosser and Hector Garcia-Molina.
    In icpdc 2003
  • Addressing the non-cooperation problem in competitive P2P systems, sepandar D. kamvar, Beverly Yang and Hector Garcia-Molina.
    In P2P and economics, 2003
  • The eigentrust Algorithm for reputation management in P2P networks,
    Sepandar D. kamvar, Mario T. Schlosser and Hector Garcia-Molina.In WWW, 2003.
  • Query-flood DoS attacks in Gnutella, Neil daswani and Hector Garcia-Molina.
    In acm ccs, 2002.
  • Peer pressure: distributed recovery from attacks in peer-to-peer systems, Pedram keyani, Brian Larson and muthukumar senthil.
    In ifip peer-to-peer computing, 2002.
  • Protecting the pipe from malicous peers Brian Cooper, Mayank Bawa, Neil daswani, and Hector Garcia-Molina.
    In FGCs 2004.


Trust [des P2P]

  • Au, R., looi, M. and Ashley, P. Automated cross-organizational Trust Establishment on extranets. In Proceedings of the Workshop on Information Technology for Virtual Computer ISES, IEEE Computer Society,
    Queensland, Australia, 2001, 3-11.
  • Bertino, E ., ferrari, E. and squicciarini,. c. trust-X: a peer-to-peer framework for trust establishment. knowledge and Data Engineering, IEEE Transactions on, 16 (7 ). 827-842.
  • Damiani, E ., vimercati, S. d. c. D ., parabschi, S ., samarati, P. and Violante, F ., A reputation-based approach for choosing reliable resources in peer-to-peer networks. in CCS '02, (Washington DC, USA, 2002 ).
  • Khedr, M. and karmouch, A. negotiating context information in context-aware systems. IEEE intelligent systems, 19 (6). 21-29.
  • Lin, C ., varadharajan, V ., wang, Y. and pruthi, V ., enhancing grid security with trust management. in services computing, 2004. (SCC 2004 ). proceedings. 2004 IEEE International Conference on, (2004 ),
    303-310.
  • Mengshu, H ., xianliang, L ., xu, Z. and Chuan, Z. A trust model of P2P system based on confirmation theory. sigops failed. syst. rev ., 39 (1 ). 56-62.
  • Au, R., looi, M. and Ashley, P. Automated cross-organisational Trust Establishment on extranets. In Proceedings of the Workshop on Information Technology for Virtual Computer ISES, IEEE Computer Society,
    Queensland, Australia, 2001, 3-11.
  • Ting Yu; winslett, M .; A uniied scheme for resource protection in automatic trust negotiation. security and private, 2003. proceedings. 2003 Symposium on 11-14 May 2003 page (s): 110-122
  • Kagal, L .; finin, T .; joshi, .; trust-based security in pervasive computing environments. IEEE Computer volume 34, Issue 12, Dec. 2001 page (s): 154-157
  • Seamons, K. E .; winslett, M .; ting Yu; Chan, T .; child, E .; halcrow, M .; hess, .; holt, J .; jacob, J .; jarvis, R .; smith, B .; sundelin, T .; lina Yu; trust negotiation in dynamic coalitions. DARPA Information
    Invalid vability conference and exposition, 2003. Proceedings, Volume 2, 22-24 then l 2003 page (s): 240-245 Vol.2
  • Huu Tran; Hitchens, M .; varadharajan, V .; watters, p .; A trust based access control framework for P2P file-sharing systems. system Scientific, 2005. hicss '05. proceedings of the 38th Annual Hawaii International
    Conference on 03-06 Jan. 2005 page (s): 302c-302c
  • Hua Wang; yanchun Zhang; jinli CaO; varadharajan, V .; achieving secure and flexible M-services through tickets. systems, man and cybernetics, Part A, IEEE Transactions on, Volume 33, Issue 6, Nov. 2003
    Page (s): 697-708
  • Gummadi, .; yoon, J. p .; modeling group trust for peer-to-peer access control. database and expert systems applications, 2004. proceedings. 15th International Workshop on 30 Aug. -3 Sept. 2004 page (s): 971
    -978
  • Seamons, K. E .; chan, T .; child, E .; halcrow, M .; hess, .; holt, J .; jacob, J .; jarvis, R .; patty, .; smith, B .; sundelin, T .; lina Yu; trustbuilder: Negotiating trust in dynamic coalitions. DARPA
    Information about vability conference and exposition, 2003. Proceedings, Volume 2, 22-24 hours l 2003 page (s): 49-51 Vol.2
  • Adam Hess, Jason Holt, Jared Jacob bson, Kent E. Seamons, content-triggered Trust Negotiation, pages: 428-456.
  • Khambatti, M .; partha Dasgupta; Ryu, K. D .; A role-based trust model for peer-to-peer communities and dynamic coalitions Information Assurance workshop, 2004. proceedings. second IEEE International. 2004
    Page (s): 141-154
  • Song Ye; makedon, F .; ford, J .; collaborative Automated Trust Negotiation in peer-to-peer systems. peer-to-Peer compute, 2004. proceedings. proceedings. fourth International Conference on 25-27 Aug.
    2004 page (s): 108-115
  • Bearly, T .; vijay Kumar; expanding trust beyond reputation in peer-to-peer systems. database and expert systems applications, 2004. proceedings. 15th International Workshop on. 30 Aug. -3 Sept. 2004 page (s): 966
    -970
  • Aameek Singh; Ling Liu; trustme: anonymous management of trust relationships in decentralized P2P systems. peer-to-Peer compute, 2003. (P2P 2003 ). proceedings. third International Conference on. 1-3
    Sept. 2003 page (s): 142-149.
  • Wierzbicki, .; strzelecki, R .; swierezewski, D .; znojek, M .; rhubarb: a tool for developing scalable and Secure Peer-to-peer applications. peer-to-Peer compute, 2002. (P2P 2002 ). proceedings. second
    International Conference on 5-7 Sept. 2002 page (s): 144-151
  • Kangasharju, J .; ross, K. W .; turner, D. A .; secure and resilient peer-to-peer e-mail design and implementation. peer-to-Peer compute, 2003. (P2P 2003 ). proceedings. third International Conference on
    1-3 Sept. 2003 page (s): 184-191.
  • Skogsrud, H .; benatallah, B .; casati, F .; model-driven Trust Negotiation for Web Services. internet computing, IEEE. volume 7, Issue 6, Nov. -Dec. 2003 page (s): 45-52

 

Peer to Peer Systems

  • Einhorn, m.a. And Rosenblatt, B. Peer-to-Peer Networking and digital rights managmeent: how market tools can solve copyright problems. Policy Analysis (534 ).
  • Fenkam, p .; dustdar, S .; kirda, E .; reif, G .; gall, H .; towards an Access Control System for Mobile Peer-to-peer collaborative environments. enabling Technologies: Infrastructure for collaborative relational ISES,
    2002. wet ice 2002. Proceedings. Eleventh IEEE international workshops on 10-12 June 2002 page (s): 95-100
  • Ravi Sandhu, Xinwen Zhang, access management for Distributed Systems: peer-to-peer access control architecture using trusted computing technology. Proceedings of the tenth ACM Symposium on access control
    Models and technologies. June 2005
  • Dailey Paulson, L.; P2P hacker tool poses escalating threat, IEEE Computer, Volume 37, Issue 5, May 2004 page (s): 22-23.
  • Li Xiong; Ling Liu; peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. knowledge and Data Engineering, IEEE Transactions on. volume 16, Issue 7, July 2004 page (s): 843
    -857.
  • Talia, D .; trunflo, p .; toward a synergy between P2P and grids. internet computing, IEEE. volume 7, issue 4, July-Aug. 2003 page (s): 96, 94-95
  • Bin Yu; Singh, M. p .; sycara, K .; developing trust in large-scale peer-to-peer systems. multi-Agent Security and virtualization vability, 2004 IEEE first Symposium on. 30-31 Aug. 2004 page (s): 1-10.
  • Locasto, M. E .; parekh, J. J .; keromytis,. D .; stolfo, S. J .; towards collaborative security and P2P intrusion detection. systems, man and cybernetics (SMC) Information Assurance workshop, 2005. proceedings
    From the sixth annual IEEE. 15-17 June 2005 page (s): 333-339
  • Zhengqiang Liang; weisong Shi; pet: a personalized trust model with reputation and Risk Evaluation for P2P Resource Sharing System Sciences, 2005. hicss '05. Proceedings of the 38th Annual Hawaii International
    Conference on. 03-06 Jan. 2005 page (s): 201b-201b.
  • Wang, Y .; vassileva, J .; trust and reputation model in peer-to-peer networks. peer-to-Peer compute, 2003. (P2P 2003 ). proceedings. third International Conference on. 1-3 Sept. 2003 page (s): 150-157

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.