Privacy, security, trust and incentives
- Ppay: micropayments for peer-to-peer systems, Beverly Yang and Hector Garcia-Molina.
In acm ccs 2003
- Privacy preserving indexing of specified ents on the network, Mayank Bawa, Robert bayardo jr., and Rakesh Agrawal.
In vldb 2003
- SLIC: A selfish link-Based Incentive mechanic for Unstructured Peer-to-peer networks, Qi sun and Hector Garcia-Molina.
In icdcs 2004
- Identity Crisis: anonymity vs. reputation in P2P systems, Sergio marti and Hector Garcia-Molina.
In IEEE Conference on peer-to-peer computing, 2003
- Incentives for combating free-riding on P4P networks (Research Note), sepandar kamvar, Mario Schlosser and Hector Garcia-Molina.
In icpdc 2003
- Addressing the non-cooperation problem in competitive P2P systems, sepandar D. kamvar, Beverly Yang and Hector Garcia-Molina.
In P2P and economics, 2003
- The eigentrust Algorithm for reputation management in P2P networks,
Sepandar D. kamvar, Mario T. Schlosser and Hector Garcia-Molina.In WWW, 2003.
- Query-flood DoS attacks in Gnutella, Neil daswani and Hector Garcia-Molina.
In acm ccs, 2002.
- Peer pressure: distributed recovery from attacks in peer-to-peer systems, Pedram keyani, Brian Larson and muthukumar senthil.
In ifip peer-to-peer computing, 2002.
- Protecting the pipe from malicous peers Brian Cooper, Mayank Bawa, Neil daswani, and Hector Garcia-Molina.
In FGCs 2004.
Trust [des P2P]
- Au, R., looi, M. and Ashley, P. Automated cross-organizational Trust Establishment on extranets. In Proceedings of the Workshop on Information Technology for Virtual Computer ISES, IEEE Computer Society,
Queensland, Australia, 2001, 3-11.
- Bertino, E ., ferrari, E. and squicciarini,. c. trust-X: a peer-to-peer framework for trust establishment. knowledge and Data Engineering, IEEE Transactions on, 16 (7 ). 827-842.
- Damiani, E ., vimercati, S. d. c. D ., parabschi, S ., samarati, P. and Violante, F ., A reputation-based approach for choosing reliable resources in peer-to-peer networks. in CCS '02, (Washington DC, USA, 2002 ).
- Khedr, M. and karmouch, A. negotiating context information in context-aware systems. IEEE intelligent systems, 19 (6). 21-29.
- Lin, C ., varadharajan, V ., wang, Y. and pruthi, V ., enhancing grid security with trust management. in services computing, 2004. (SCC 2004 ). proceedings. 2004 IEEE International Conference on, (2004 ),
303-310.
- Mengshu, H ., xianliang, L ., xu, Z. and Chuan, Z. A trust model of P2P system based on confirmation theory. sigops failed. syst. rev ., 39 (1 ). 56-62.
- Au, R., looi, M. and Ashley, P. Automated cross-organisational Trust Establishment on extranets. In Proceedings of the Workshop on Information Technology for Virtual Computer ISES, IEEE Computer Society,
Queensland, Australia, 2001, 3-11.
- Ting Yu; winslett, M .; A uniied scheme for resource protection in automatic trust negotiation. security and private, 2003. proceedings. 2003 Symposium on 11-14 May 2003 page (s): 110-122
- Kagal, L .; finin, T .; joshi, .; trust-based security in pervasive computing environments. IEEE Computer volume 34, Issue 12, Dec. 2001 page (s): 154-157
- Seamons, K. E .; winslett, M .; ting Yu; Chan, T .; child, E .; halcrow, M .; hess, .; holt, J .; jacob, J .; jarvis, R .; smith, B .; sundelin, T .; lina Yu; trust negotiation in dynamic coalitions. DARPA Information
Invalid vability conference and exposition, 2003. Proceedings, Volume 2, 22-24 then l 2003 page (s): 240-245 Vol.2
- Huu Tran; Hitchens, M .; varadharajan, V .; watters, p .; A trust based access control framework for P2P file-sharing systems. system Scientific, 2005. hicss '05. proceedings of the 38th Annual Hawaii International
Conference on 03-06 Jan. 2005 page (s): 302c-302c
- Hua Wang; yanchun Zhang; jinli CaO; varadharajan, V .; achieving secure and flexible M-services through tickets. systems, man and cybernetics, Part A, IEEE Transactions on, Volume 33, Issue 6, Nov. 2003
Page (s): 697-708
- Gummadi, .; yoon, J. p .; modeling group trust for peer-to-peer access control. database and expert systems applications, 2004. proceedings. 15th International Workshop on 30 Aug. -3 Sept. 2004 page (s): 971
-978
- Seamons, K. E .; chan, T .; child, E .; halcrow, M .; hess, .; holt, J .; jacob, J .; jarvis, R .; patty, .; smith, B .; sundelin, T .; lina Yu; trustbuilder: Negotiating trust in dynamic coalitions. DARPA
Information about vability conference and exposition, 2003. Proceedings, Volume 2, 22-24 hours l 2003 page (s): 49-51 Vol.2
- Adam Hess, Jason Holt, Jared Jacob bson, Kent E. Seamons, content-triggered Trust Negotiation, pages: 428-456.
- Khambatti, M .; partha Dasgupta; Ryu, K. D .; A role-based trust model for peer-to-peer communities and dynamic coalitions Information Assurance workshop, 2004. proceedings. second IEEE International. 2004
Page (s): 141-154
- Song Ye; makedon, F .; ford, J .; collaborative Automated Trust Negotiation in peer-to-peer systems. peer-to-Peer compute, 2004. proceedings. proceedings. fourth International Conference on 25-27 Aug.
2004 page (s): 108-115
- Bearly, T .; vijay Kumar; expanding trust beyond reputation in peer-to-peer systems. database and expert systems applications, 2004. proceedings. 15th International Workshop on. 30 Aug. -3 Sept. 2004 page (s): 966
-970
- Aameek Singh; Ling Liu; trustme: anonymous management of trust relationships in decentralized P2P systems. peer-to-Peer compute, 2003. (P2P 2003 ). proceedings. third International Conference on. 1-3
Sept. 2003 page (s): 142-149.
- Wierzbicki, .; strzelecki, R .; swierezewski, D .; znojek, M .; rhubarb: a tool for developing scalable and Secure Peer-to-peer applications. peer-to-Peer compute, 2002. (P2P 2002 ). proceedings. second
International Conference on 5-7 Sept. 2002 page (s): 144-151
- Kangasharju, J .; ross, K. W .; turner, D. A .; secure and resilient peer-to-peer e-mail design and implementation. peer-to-Peer compute, 2003. (P2P 2003 ). proceedings. third International Conference on
1-3 Sept. 2003 page (s): 184-191.
- Skogsrud, H .; benatallah, B .; casati, F .; model-driven Trust Negotiation for Web Services. internet computing, IEEE. volume 7, Issue 6, Nov. -Dec. 2003 page (s): 45-52
Peer to Peer Systems
- Einhorn, m.a. And Rosenblatt, B. Peer-to-Peer Networking and digital rights managmeent: how market tools can solve copyright problems. Policy Analysis (534 ).
- Fenkam, p .; dustdar, S .; kirda, E .; reif, G .; gall, H .; towards an Access Control System for Mobile Peer-to-peer collaborative environments. enabling Technologies: Infrastructure for collaborative relational ISES,
2002. wet ice 2002. Proceedings. Eleventh IEEE international workshops on 10-12 June 2002 page (s): 95-100
- Ravi Sandhu, Xinwen Zhang, access management for Distributed Systems: peer-to-peer access control architecture using trusted computing technology. Proceedings of the tenth ACM Symposium on access control
Models and technologies. June 2005
- Dailey Paulson, L.; P2P hacker tool poses escalating threat, IEEE Computer, Volume 37, Issue 5, May 2004 page (s): 22-23.
- Li Xiong; Ling Liu; peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. knowledge and Data Engineering, IEEE Transactions on. volume 16, Issue 7, July 2004 page (s): 843
-857.
- Talia, D .; trunflo, p .; toward a synergy between P2P and grids. internet computing, IEEE. volume 7, issue 4, July-Aug. 2003 page (s): 96, 94-95
- Bin Yu; Singh, M. p .; sycara, K .; developing trust in large-scale peer-to-peer systems. multi-Agent Security and virtualization vability, 2004 IEEE first Symposium on. 30-31 Aug. 2004 page (s): 1-10.
- Locasto, M. E .; parekh, J. J .; keromytis,. D .; stolfo, S. J .; towards collaborative security and P2P intrusion detection. systems, man and cybernetics (SMC) Information Assurance workshop, 2005. proceedings
From the sixth annual IEEE. 15-17 June 2005 page (s): 333-339
- Zhengqiang Liang; weisong Shi; pet: a personalized trust model with reputation and Risk Evaluation for P2P Resource Sharing System Sciences, 2005. hicss '05. Proceedings of the 38th Annual Hawaii International
Conference on. 03-06 Jan. 2005 page (s): 201b-201b.
- Wang, Y .; vassileva, J .; trust and reputation model in peer-to-peer networks. peer-to-Peer compute, 2003. (P2P 2003 ). proceedings. third International Conference on. 1-3 Sept. 2003 page (s): 150-157