Have a personal or library account? Click to login

Distributed Trust Inference Model Based on Probability and Balance Theory for Peer-To-Peer systems

Open Access
|Dec 2012

References

  1. L. MEKOUAR, Y. IRAQI, and R. BOUTABA, “Peer-to-peer’s most wanted: malicious peers”, Computer Networks, Vol. 50, No. 4, 2006, pp. 545-562.10.1016/j.comnet.2005.07.025
  2. H. Q. Lin, Z. T. Li, and Q. F. Huang, “Multifactor hierarchical fuzzy trust evaluation on peer- to-peer networks”, Peer-to-Peer Network Applications, Vol. 4, 2011, pp. 376–390.10.1007/s12083-010-0096-9
  3. J. Li, “mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients”, Peer-to-Peer Network Applications,Vol. 4, 2011, pp. 325–345.10.1007/s12083-010-0087-x
  4. L. Mui, M. Mohtashemi, and A. Halberstadt, “A Computational Model of Trust and Reputation for E-Businesses”, Proc. 35th Ann. Hawaii Int’l Conf. System Sciences (HICSS ‘02), , 2002, pp. 2431-2439.
  5. A. Das, M. M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 9, No. 2, 2012, pp. 261-274.10.1109/TDSC.2011.57
  6. K. Aberer, Z. Despotovic, “Managing trust in a peer-to-peer information system”, In proceedings of the 10th International Conference on Information and Knowledge Management, ACM Press, Atlanta, GA, United states, 2001, pp. 1-7.10.1145/502585.502638
  7. S. D. Kamvar, M. T. Schlosser, and H. GarciaMolina, “The EigenTrust algorithm for reputation management in P2P networks”, in proceedings of ACM WWW 2003, pp. 640-651.10.1145/775152.775242
  8. W. Dou, H. M. Wang, and Y. Jia, “A recommendation-based peer-2-peer trust model”, Journal of Software, Vol.15, no.4, 2004, pp. 571-583.
  9. L. Xiong, L. Liu, “PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities”, IEEE Transactions on Knowledge and Data Engineering, Vol.16, no.7, 2004, pp. 843-857.10.1109/TKDE.2004.1318566
  10. A. Jøsang, R. Hayward, and S. Pope, “Trust network analysis with subjective logic”, In proceedings of ACSC 2006, pp. 85-94.
  11. A. Jøsang, T. Bhuiyan, “Optimal trust network analysis with subjective logic”, In proceedings of SECURWARE 2008, pp. 179-184.10.1109/SECURWARE.2008.64
  12. G. Wang, J. Wu, “Multi-dimensional evidence-based trust management with multi-trusted paths”, Future Generation Computer Systems, Vol. 27, No. 5, 2011, pp.529-538.10.1016/j.future.2010.04.015
  13. S. X. Jiang, J. Z. Li, “A Reputation-Based Trust Mechanism for P2P E-Commerce Systems”, Journal of Software, Vol.18, No.10, 2007, pp. 2551-2563.10.1360/jos182551
  14. Z. H. Tan, X. W. Wang, W. Cheng, G. R. Chang, and Z. L. Zhu, “A Distributed Trust Model for Peer-to-Peer Networks Based on Multi-Dimension-History Vector”, Chinese Journal of Computers, Vol. 33, No. 9, 2010, pp. 1725-1735.10.3724/SP.J.1016.2010.01725
  15. E. Damiani, S. D. C. Vimercati, and S. Paraboschi, “A reputation-based approach for choosing reliable resources in peer-to-peer networks”, the 9th ACM Conference on Computer and Communications Security, Washington, DC, 2002, pp. 207-216.10.1145/586110.586138
  16. Z. Despotovic, K. Aberer, “Maximum likelihood estimation of peers’ performance in P2P networks”, the 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, 2004, pp. 1-9.
  17. F. Heider, “The Psychology of Interpersonal Relations”, Wiley, 1958.10.1037/10628-000
  18. Z. H. Tan, H. Wang, W. Cheng, and G. R. Chang, “A distributed Trust Model for P2P overlay networks based on correlativity of communication history”, Journal of Northeastern University (Natural Science), Vol. 30, No.9, 2009, pp. 1245-1248.
  19. J. Leskovec, D. Huttenlocher, and J. Kleinberg,”Signed Networks in Social Media”, 28th ACM Conference on Human Factors in Computing Systems , 2010, pp. 1361-1370.10.1145/1753326.1753532
Language: English
Page range: 1063 - 1080
Submitted on: Aug 1, 2012
Accepted on: Oct 30, 2012
Published on: Dec 1, 2012
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2012 Zhenhua Tan, Guangming Yang, Wei Cheng, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.