메뉴 건너뛰기




Volumn 21, Issue 10, 2010, Pages 1473-1486

Group-based negotiations in P2P systems

Author keywords

JXTA; peer to peer; Trust negotiation

Indexed keywords

AUTHENTICATION TECHNIQUES; CARDINALITIES; COMPLEX TRANSACTION; DISTRIBUTED ENVIRONMENTS; FREE-RIDERS; GROUP-BASED; INTERACTION FREQUENCIES; JOINING PROCESS; JOINING PROTOCOL; JXTA; MALICIOUS PEER; P2P SYSTEM; PEER GROUPS; PEER TO PEER; RESOURCE AVAILABILITY; RESOURCE NEGOTIATION; TIME FRAME; TRUST NEGOTIATION;

EID: 77956177819     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2010.25     Document Type: Article
Times cited : (11)

References (37)
  • 2
    • 3142676730 scopus 로고    scopus 로고
    • Trust-X: A peer-to-peer framework for trust establishment
    • July
    • E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," IEEE Trans. Knowledge Data Eng., vol. 16, no. 7, pp. 827-842, July 2004.
    • (2004) IEEE Trans. Knowledge Data Eng. , vol.16 , Issue.7 , pp. 827-842
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.C.3
  • 7
    • 21644455728 scopus 로고    scopus 로고
    • Samsara: Honor among thieves in peer-to-peer storage
    • L.P. Cox and B.D. Noble, "Samsara: Honor among Thieves in Peer-to-Peer Storage," ACM SIGOPS Operating Systems Rev., vol. 37, pp. 120-132, 2003.
    • (2003) ACM SIGOPS Operating Systems Rev , vol.37 , pp. 120-132
    • Cox, L.P.1    Noble, B.D.2
  • 10
    • 34948884092 scopus 로고    scopus 로고
    • Optimal leader election scheme for peer-to-peer applications
    • S. Han and H. Xia, "Optimal Leader Election Scheme for Peer-to-Peer Applications," Proc. Int'l Conf. Networking (ICN), p. 29, 2007.
    • (2007) Proc. Int'l Conf. Networking (ICN) , pp. 29
    • Han, S.1    Xia, H.2
  • 13
    • 77956179286 scopus 로고    scopus 로고
    • JXTA Documentation, https://jxta-docs.dev.java.net/, 2010.
    • (2010)
  • 16
    • 33751513006 scopus 로고    scopus 로고
    • OAcerts: Oblivious attribute certificates
    • Oct.-Dec.
    • J. Li and N. Li, "OAcerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006.
    • (2006) IEEE Trans. Dependable and Secure Computing , vol.3 , Issue.4 , pp. 340-352
    • Li, J.1    Li, N.2
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 27
    • 77956170529 scopus 로고    scopus 로고
    • Sun Microsystems
    • Sun Microsystems, JXTA Programmer Guide 2.5, https://jxta. dev.java.net/, 2007.
    • (2007) JXTA Programmer Guide 2.5
  • 33
    • 0036493429 scopus 로고    scopus 로고
    • Secure peer-to-peer networking: The JXTA example
    • W. Yeager and J. Williams, "Secure Peer-to-Peer Networking: The JXTA Example," IT Professional, vol. 4, no. 2, pp. 53-57, 2002.
    • (2002) IT Professional , vol.4 , Issue.2 , pp. 53-57
    • Yeager, W.1    Williams, J.2
  • 34
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.