Reputation and trust management in heterogeneous peer-to-peer networks
暂无分享,去创建一个
Jiangchuan Liu | Xiaowen Chu | Xiaowei Chen | Kaiyong Zhao | Xiaowen Chu | Jiangchuan Liu | Kaiyong Zhao | Xiaowei Chen
[1] M. Nowak,et al. Evolution of indirect reciprocity by image scoring , 1998, Nature.
[2] A. Roth. Game-Theoretic Models of Bargaining , 1987 .
[3] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[4] Nicolas Christin,et al. Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.
[5] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[6] Partha Dasgupta,et al. A role-based trust model for peer-to-peer communities and dynamic coalitions , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..
[7] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[9] Donald F. Towsley,et al. Modeling peer-peer file sharing systems , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Qinyuan Feng,et al. LIP: A Lifetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems , 2007, IPTPS.
[11] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[12] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[13] Wu Yong. History and recommendation-based trust model in P2P environment , 2008 .
[14] Steve Chien,et al. A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.
[15] Zou Peng,et al. A Recommendation-Based Peer-to-Peer Trust Model , 2004 .
[16] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[17] Emin Gün Sirer,et al. Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.
[18] Weidong Liu,et al. A Distributed Trust Mechanism Directly Evaluating Reputation of Nodes: A Distributed Trust Mechanism Directly Evaluating Reputation of Nodes , 2010 .
[19] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[20] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[21] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[22] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[23] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[24] Cheng Huang,et al. Challenges, design and analysis of a large-scale p2p-vod system , 2008, SIGCOMM '08.
[25] Vijay Varadharajan,et al. Trust/sup 2/: developing trust in peer-to-peer environments , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.
[26] Peng Dong. A Distributed Trust Mechanism Directly Evaluating Reputation of Nodes , 2008 .