Open Access

Distributed Trust Inference Model Based on Probability and Balance Theory for Peer-To-Peer systems


Cite

L. MEKOUAR, Y. IRAQI, and R. BOUTABA, “Peer-to-peer’s most wanted: malicious peers”, Computer Networks, Vol. 50, No. 4, 2006, pp. 545-562.10.1016/j.comnet.2005.07.025 Search in Google Scholar

H. Q. Lin, Z. T. Li, and Q. F. Huang, “Multifactor hierarchical fuzzy trust evaluation on peer- to-peer networks”, Peer-to-Peer Network Applications, Vol. 4, 2011, pp. 376–390.10.1007/s12083-010-0096-9 Search in Google Scholar

J. Li, “mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients”, Peer-to-Peer Network Applications,Vol. 4, 2011, pp. 325–345.10.1007/s12083-010-0087-x Search in Google Scholar

L. Mui, M. Mohtashemi, and A. Halberstadt, “A Computational Model of Trust and Reputation for E-Businesses”, Proc. 35th Ann. Hawaii Int’l Conf. System Sciences (HICSS ‘02), , 2002, pp. 2431-2439. Search in Google Scholar

A. Das, M. M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 9, No. 2, 2012, pp. 261-274.10.1109/TDSC.2011.57 Search in Google Scholar

K. Aberer, Z. Despotovic, “Managing trust in a peer-to-peer information system”, In proceedings of the 10th International Conference on Information and Knowledge Management, ACM Press, Atlanta, GA, United states, 2001, pp. 1-7.10.1145/502585.502638 Search in Google Scholar

S. D. Kamvar, M. T. Schlosser, and H. GarciaMolina, “The EigenTrust algorithm for reputation management in P2P networks”, in proceedings of ACM WWW 2003, pp. 640-651.10.1145/775152.775242 Search in Google Scholar

W. Dou, H. M. Wang, and Y. Jia, “A recommendation-based peer-2-peer trust model”, Journal of Software, Vol.15, no.4, 2004, pp. 571-583. Search in Google Scholar

L. Xiong, L. Liu, “PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities”, IEEE Transactions on Knowledge and Data Engineering, Vol.16, no.7, 2004, pp. 843-857.10.1109/TKDE.2004.1318566 Search in Google Scholar

A. Jøsang, R. Hayward, and S. Pope, “Trust network analysis with subjective logic”, In proceedings of ACSC 2006, pp. 85-94. Search in Google Scholar

A. Jøsang, T. Bhuiyan, “Optimal trust network analysis with subjective logic”, In proceedings of SECURWARE 2008, pp. 179-184.10.1109/SECURWARE.2008.64 Search in Google Scholar

G. Wang, J. Wu, “Multi-dimensional evidence-based trust management with multi-trusted paths”, Future Generation Computer Systems, Vol. 27, No. 5, 2011, pp.529-538.10.1016/j.future.2010.04.015 Search in Google Scholar

S. X. Jiang, J. Z. Li, “A Reputation-Based Trust Mechanism for P2P E-Commerce Systems”, Journal of Software, Vol.18, No.10, 2007, pp. 2551-2563.10.1360/jos182551 Search in Google Scholar

Z. H. Tan, X. W. Wang, W. Cheng, G. R. Chang, and Z. L. Zhu, “A Distributed Trust Model for Peer-to-Peer Networks Based on Multi-Dimension-History Vector”, Chinese Journal of Computers, Vol. 33, No. 9, 2010, pp. 1725-1735.10.3724/SP.J.1016.2010.01725 Search in Google Scholar

E. Damiani, S. D. C. Vimercati, and S. Paraboschi, “A reputation-based approach for choosing reliable resources in peer-to-peer networks”, the 9th ACM Conference on Computer and Communications Security, Washington, DC, 2002, pp. 207-216.10.1145/586110.586138 Search in Google Scholar

Z. Despotovic, K. Aberer, “Maximum likelihood estimation of peers’ performance in P2P networks”, the 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, 2004, pp. 1-9. Search in Google Scholar

F. Heider, “The Psychology of Interpersonal Relations”, Wiley, 1958.10.1037/10628-000 Search in Google Scholar

Z. H. Tan, H. Wang, W. Cheng, and G. R. Chang, “A distributed Trust Model for P2P overlay networks based on correlativity of communication history”, Journal of Northeastern University (Natural Science), Vol. 30, No.9, 2009, pp. 1245-1248. Search in Google Scholar

J. Leskovec, D. Huttenlocher, and J. Kleinberg,”Signed Networks in Social Media”, 28th ACM Conference on Human Factors in Computing Systems , 2010, pp. 1361-1370.10.1145/1753326.1753532Search in Google Scholar

eISSN:
1178-5608
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Engineering, Introductions and Overviews, other