{"title":"分布式P2P网络信任模型研究","authors":"Zhiguang Qin, Lei Yang, Ting Zhong, Tian Lan","doi":"10.1109/ICCIAUTOM.2011.6183906","DOIUrl":null,"url":null,"abstract":"Many security risks are caused due to the nature of anarchy in P2P networks. It is an effective method to deal with these security problems by introducing the trust mechanism into the P2P networks. In this paper, some typical trust mechanisms were summarized, the latest systems and models are discussed, some problems faced by many researches are proposed and some ideas for future research are given.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on trust model for distributed P2P networks\",\"authors\":\"Zhiguang Qin, Lei Yang, Ting Zhong, Tian Lan\",\"doi\":\"10.1109/ICCIAUTOM.2011.6183906\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many security risks are caused due to the nature of anarchy in P2P networks. It is an effective method to deal with these security problems by introducing the trust mechanism into the P2P networks. In this paper, some typical trust mechanisms were summarized, the latest systems and models are discussed, some problems faced by many researches are proposed and some ideas for future research are given.\",\"PeriodicalId\":177039,\"journal\":{\"name\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIAUTOM.2011.6183906\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIAUTOM.2011.6183906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on trust model for distributed P2P networks
Many security risks are caused due to the nature of anarchy in P2P networks. It is an effective method to deal with these security problems by introducing the trust mechanism into the P2P networks. In this paper, some typical trust mechanisms were summarized, the latest systems and models are discussed, some problems faced by many researches are proposed and some ideas for future research are given.