메뉴 건너뛰기




Volumn 44, Issue 1, 2007, Pages 1-10

Time self-decay trust management algorithm for P2P computing security

Author keywords

Evaluation algorithm; Network security; P2P computing; Trust evaluation; Trust management

Indexed keywords

ALGORITHMS; FUNCTIONS; GRID COMPUTING; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 34147196222     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: 10.1360/crad20070101     Document Type: Article
Times cited : (18)

References (34)
  • 3
    • 18744373325 scopus 로고    scopus 로고
    • Service oriented VEGA grid system software design and evaluation
    • Chinese source
    • Zha li, Li Wei, Yu Haiyan, et al. Service oriented VEGA grid system software design and evaluation[J]. Chinese Journal of Computers, 2005, 28(4): 495-504 (in Chinese)
    • (2005) Chinese Journal of Computers , vol.28 , Issue.4 , pp. 495-504
    • Zha, L.1    Li, W.2    Yu, H.3
  • 4
    • 13644274213 scopus 로고    scopus 로고
    • A survey of peer-to-peer content distribution technologies
    • A Stephanos, S Diomidis. A survey of peer-to-peer content distribution technologies[J]. ACM Computing Surveys, 2004, 36(4): 335-371
    • (2004) ACM Computing Surveys , vol.36 , Issue.4 , pp. 335-371
    • Stephanos, A.1    Diomidis, S.2
  • 5
    • 0031143168 scopus 로고    scopus 로고
    • Merging and extending the PGP and PEM-TEL trust model
    • D W Chadwick, et al. Merging and extending the PGP and PEM-TEL trust model[J]. IEEE Network, 1997, 11(3): 16-24
    • (1997) IEEE Network , vol.11 , Issue.3 , pp. 16-24
    • Chadwick, D.W.1
  • 9
    • 84949942881 scopus 로고    scopus 로고
    • The right type of trust for distributed systems
    • New York: ACM Press
    • A Josang. The right type of trust for distributed systems[C]. In: Proc of the 1996 New Security Paradigms Workshop. New York: ACM Press, 1996.119-132
    • (1996) Proc of the 1996 New Security Paradigms Workshop , pp. 119-132
    • Josang, A.1
  • 11
  • 12
    • 84958759310 scopus 로고    scopus 로고
    • A subjective metric of authentication
    • Berlin: Springer-Verlag
    • A Josang. A subjective metric of authentication[C]. In: Proc of the ESORICS'98. Berlin: Springer-Verlag, 1998.329-344
    • (1998) Proc of the ESORICS'98 , pp. 329-344
    • Josang, A.1
  • 14
    • 84944078503 scopus 로고    scopus 로고
    • A reputation based trust model for peer-to-peer e-commerce communities
    • Hangzhou
    • G Derbas, A Kayssi, H Artail, et al. A reputation based trust model for peer-to-peer e-commerce communities[C]. The IEEE Int'l Conf on E-Commerce, Hangzhou, 2003
    • (2003) The IEEE Int'l Conf on E-Commerce
    • Derbas, G.1    Kayssi, A.2    Artail, H.3
  • 15
    • 10444245810 scopus 로고    scopus 로고
    • TRUMMAR-A trust model for mobile agent systems based on reputation
    • Los Alamitos, CA: IEEE Computer Society Press
    • Ghada Derbas, Ayman Kayssi, Hassan Artail, et al. TRUMMAR-A trust model for mobile agent systems based on reputation[C]. In: Proc of the IEEE/ACS Int'l Conf on Pervasive Services (ICPS'04), Los Alamitos, CA: IEEE Computer Society Press, 2004.113-120
    • (2004) Proc of the IEEE/ACS Int'l Conf on Pervasive Services (ICPS'04) , pp. 113-120
    • Derbas, G.1    Kayssi, A.2    Artail, H.3
  • 16
    • 84893184750 scopus 로고    scopus 로고
    • Bayesian network-based trust model
    • Los Alamitos, CA: IEEE Computer Society Press
    • Yao Wang, Julita Vassileva. Bayesian network-based trust model[C]. In: Proc of the IEEE/WIC Int'l Conf on Web Intelligence. Los Alamitos, CA: IEEE Computer Society Press, 2003.29-38
    • (2003) Proc of the IEEE/WIC Int'l Conf on Web Intelligence , pp. 29-38
    • Wang, Y.1    Vassileva, J.2
  • 18
  • 21
    • 13444253030 scopus 로고    scopus 로고
    • Study on the behavior-based trust model in grid security system
    • Washington, DC
    • Gui Xiaolin, Xie Bing, Li Yinan, et al. Study on the behavior-based trust model in grid security system[C]. The 2004 IEEE Int'l Conf on Services Computing, Washington, DC, 2004
    • (2004) The 2004 IEEE Int'l Conf on Services Computing
    • Gui, X.1    Xie, B.2    Li, Y.3
  • 22
    • 0036880296 scopus 로고    scopus 로고
    • Research and development of trust management in Web security
    • Chinese source
    • Xu Feng, Lu Jian. Research and development of trust management in Web security[J]. Journal of Software, 2002, 13(11): 2057-2064 (in Chinese)
    • (2002) Journal of Software , vol.13 , Issue.11 , pp. 2057-2064
    • Xu, F.1    Lu, J.2
  • 23
    • 3042525923 scopus 로고    scopus 로고
    • A recommendation-based peer-to-peer trust model
    • Chinese source
    • Dou Wen, et al. A recommendation-based peer-to-peer trust model[J]. Journal of Software, 2004, 15(4): 571-583 (in Chinese)
    • (2004) Journal of Software , vol.15 , Issue.4 , pp. 571-583
    • Dou, W.1
  • 24
    • 4444369890 scopus 로고    scopus 로고
    • The interpretation of generalized evidence theory
    • Chinese source
    • Liu Dayou, Li Yuefeng. The interpretation of generalized evidence theory[J]. Chinese Journal of Computers, 1997, 2(20): 159-164 (in Chinese)
    • (1997) Chinese Journal of Computers , vol.2 , Issue.20 , pp. 159-164
    • Liu, D.1    Li, Y.2
  • 25
    • 4544313437 scopus 로고    scopus 로고
    • Extended method of evidence theory for pervasive computing
    • Chinese source
    • Zhang Degan, Xu Guangyou, Shi Yuanchun, et al. Extended method of evidence theory for pervasive computing[J]. Chinese Journal of Computers, 2004, 7(27): 918-927 (in Chinese)
    • (2004) Chinese Journal of Computers , vol.7 , Issue.27 , pp. 918-927
    • Zhang, D.1    Xu, G.2    Shi, Y.3
  • 26
    • 20144377734 scopus 로고    scopus 로고
    • A grid and P2P trust model based on recommendation evidence reasoning
    • Chinese source
    • Zhu Junmao, Yang Shoubao, Fan Jianping, et al. A grid and P2P trust model based on recommendation evidence reasoning[J]. Journal of Computer Research and Development, 2005, 42(5): 797-803 (in Chinese)
    • (2005) Journal of Computer Research and Development , vol.42 , Issue.5 , pp. 797-803
    • Zhu, J.1    Yang, S.2    Fan, J.3
  • 27
    • 0242439292 scopus 로고    scopus 로고
    • Research of subjective trust management model based on the fuzzy set theory
    • Chinese source
    • Tang Wen, Chen Zhong. Research of subjective trust management model based on the fuzzy set theory[J]. Journal of Software, 2003, 14(8): 1401-1408 (in Chinese)
    • (2003) Journal of Software , vol.14 , Issue.8 , pp. 1401-1408
    • Tang, W.1    Chen, Z.2
  • 28
    • 19744371210 scopus 로고    scopus 로고
    • An optimistic fair electronic payment scheme
    • Chinese source
    • Deng Suoyun, Zhan Banghua, Hu Zhengming, et al. An optimistic fair electronic payment scheme[J]. Chinese Journal of Computers, 2002, 10(25): 1094-1098 (in Chinese)
    • (2002) Chinese Journal of Computers , vol.10 , Issue.25 , pp. 1094-1098
    • Deng, S.1    Zhan, B.2    Hu, Z.3
  • 29
    • 27744464611 scopus 로고    scopus 로고
    • Research on a fuzzy logic-based subjective trust management model
    • Chinese source
    • Tang Wen, Hu JianBin, Chen Zhong. Research on a fuzzy logic-based subjective trust management model[J]. Journal of Computer Research and Development, 2005, 42(10): 1654-1659 (in Chinese)
    • (2005) Journal of Computer Research and Development , vol.42 , Issue.10 , pp. 1654-1659
    • Tang, W.1    Hu, J.2    Chen, Z.3
  • 30
    • 0003900673 scopus 로고    scopus 로고
    • Internet public key infrastructure Part 1 X509 certificate and CRL profile
    • R Housley, W Ford. Internet public key infrastructure part 1 X509 certificate and CRL profile[OL]. Internet Draft. http://www.ietf.org, 1996
    • (1996)
    • Housley, R.1    Ford, W.2
  • 32
    • 54749125032 scopus 로고    scopus 로고
    • Trusted platform module main specification
    • Trusted Computing Group
    • Trusted Computing Group. Trusted platform module main specification[OL]. http://www.trustedcomputinggroup.org, 2006
    • (2006)
  • 33
    • 3142581502 scopus 로고    scopus 로고
    • The set and function approach to modeling authorization in distributed systems
    • St. Petersburg, Russia
    • Tatyana Ryutov, Clifford Neuman. The set and function approach to modeling authorization in distributed systems[C]. MMM-ACNS, St. Petersburg, Russia, 2001
    • (2001) MMM-ACNS
    • Ryutov, T.1    Neuman, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.