用户名: 密码: 验证码:
P2P环境中基于影响的信息遗传信任模型
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
P2P网络已成为Internet网络中重要的应用之一,因其具有良好的灵活性和可扩展性,被广泛应用于内容共享、分布式计算和协同交互等领域。但是由于P2P网络是由大量的自由用户节点构成,用户可以随意地加入和退出网络,使得服务质量不稳定,导致用户之间缺乏信任,而这种信任的缺失严重地阻碍了P2P网络的健康发展。
     信任是一个用户对另一个用户的行为和能力的综合评价,用户间的信任是交往与合作的基础,是促进用户合作、鼓励共享资源的前提,直接影响P2P网络的环境与性能。通过引入信任机制,建立信任模型是解决P2P网络中信任问题的最佳方法之一。本文在充分借鉴心理学、社会学等学科中关于信任的知识,并深入分析信任的属性及其相互关系的基础上,在P2P文件共享应用背景下进行信任模型的研究,主要内容如下:
     提出了基于影响的信任度计算。借鉴现实社会中人们观点形成的过程,对某个节点的观点(如:信任或不信任)是在自身观点的基础上,在他人观点的影响下形成的,即:信任的评估者对被评估者的信任评估是在自身直接经验的基础上,在他人推荐经验的影响下形成的。引入坚持度的概念,坚持度反应了观点形成过程的特征,通过坚持度实现对影响程度的量化。在本文提出的基于影响的信任度计算中,对他人信任的评估,是在自身交往的基础上(直接信任),在推荐者的影响下(推荐信任)建立起来的,通过坚持度,定义影响函数,最终实现基于影响的信任度计算。
     基于兴趣的推荐者选择机制。借鉴现实社会中的人际关系现象,每个人都有自己的生活、交际圈,圈中人的兴趣、爱好基本相同,与这个圈子中的其他人交往、接触会更多,对某个人进行评价时,圈中人的意见更有价值。引入生物的遗传原理,通过文件DNA的遗传,记录文件的传播过程,获知文件的提供者和传播者,节点下载某个文件说明与此文件的提供者和传播者有类似相同的兴趣,通过不断的交往,自主节点逐步建立起与自己的兴趣组群,组中成员将作为推荐候选者,提高选择推荐者的效率。
     恶意评价的遏止。提出了评价与恶意节点名单联动机制和评价反馈机制,引导节点基于自身利益尽量不进行恶意评价。将评价与恶意节点的设置联系起来,一方面,系统根据服务接受节点对服务提供节点的评价,将评价为恶意的节点放入恶意节点名单,避免再次与恶意节点交往,如果对提供正常服务的节点给予恶意评价,则将不能再接受正常节点的服务,使得恶意评价者逐渐被孤立,在一定程度上抑制恶意反馈行为,另一方面,运用评价反馈机制,接受服务的节点要向提供服务的节点反馈评价,对于恶意评价的节点,提供服务的节点将拒绝再次提供服务或降低服务质量,使得恶意评价者的利益受损,也可抑制恶意评价的发生。
     文件真伪的初步判断。在下载文件前先下载文件DNA,根据文件遗传(传播)路径,获知文件的提供者和中间的传播者,根据中间传播者越多,文件质量相对越可靠的原则,并结合恶意集团成员名单,提供一个文件真伪初步判断的依据;并针对恶意集团可能的攻击给出了自适应算法。
     基于兴趣组群的博弈互利激励。在兴趣组群的基础上,将与自主节点有过直接或间接交往的非恶意节点分为合作集和非合作集,在博弈论的指导下,本着互利与合作、惩罚与宽容的原则,对不同集中的节点,采取不同的策略,对于合作集中的节点,将提供较好的服务,对非合作集中的节点,则提供较差的服务或暂停服务,通过博弈,促使节点间相互合作;并且根据节点的行为表现,动态调整各集合内的节点。
P2P networks have been becoming one of the most important applications in the Internet nowadays. Due to the scalability and flexibility, they are widely used in content sharing, distributed computing, and collaborative work etc. However, P2P networks are constituted by large number free users. They can freely join and leave the networks making the unstable quality of service. It results in a lack of trust among users. The absence of trust blocks the progress of the P2P networks badly.
     Trust is a comprehensive evaluation of the behavior and the ability of a user to another user. Trust among uses is the basis of the exchanges and cooperation, and the premise of cooperating and sharing. It directly impact on the P2P networks. By introducing trust mechanisms, trust model is one of the best way to solve the problem of trust in the P2P network. Learning from the knowledge of psychology, sociology and other disciplines on trust, we go into the trust models in P2P file-sharing application under a deep understanding of the nature of trust, and sorting out the relationship of the trust properties among them. The main achievements are as follow:
     The process of trust calculating based on influence is proposed. Learning from the process formation of the people's view, the point of view to somebody (such as:trust or distrust) is formed based on own attitude with the influence of other people's attitude. In the same way, the evaluation of trust is formed on the basis of the direct trust of trustor with the influence of recommended trust of others. In this dissertation, trust calculating based on influence is realized by introducing the concept of insisting degrees to quantify the influence and defining influence function.
     The selecting recommender mechanism based on interest. Learning from the interpersonal relationship in human society, attitudes of those who share the same interests are most valuable when evaluating a person. Through file's DNA by learning from the principle of genetics, acquiring the list of providers and disseminators, my interest groups are gradually established. The members of interest groups will serve as candidates. The efficiency of selecting recommender is improved by querying the members of interest groups.
     Peers don't malicious evaluate as much as possible because of themselves benefit by proposing the mechanism of linkage between evaluation and malicious peers, and evaluation feedback mechanism. On the one hand, according to the poor evaluation of a peer receiving the service, the system will put the service provider into a malicious list and avoid contacting with malicious peers. A peer would gradually isolate with normal service providers if it malicious evaluates normal service providers. On the other hand, a peer accepting service should feed back evaluation to the service provider. Providers will refuse to provide service or reduce the quality of service to malicious valuators so that the interests of malicious valuators will be damaged. Occurrence of malicious evaluation be inhibited possibly.
     Preliminary judgment of the authenticity of a file. Provider and disseminators are learned by the file's DNA. According to the principle that the quality of a file is relatively more reliable with more disseminators and the list of malicious group, a preliminary judgment of the file authenticity is provided. Adaptive algorithm is given for the possible attacks of malicious Group.
     Reciprocal incentive based on interest groups. Interest groups are divided into a set of cooperation and non-cooperation by an autonomous peer itself. Under the guidance of game theory, different services are provided for corresponding sets with the spirit of reciprocal, punishment and tolerance. By gaming among peers, cooperation is promoted, and members of sets are dynamically adjusted according to its behavior.
引文
[1]中国计算机学会主编,中国计算机科学技术发展报告[M],清华大学出版社,2008
    [2]Andy Oram, "Peer-to-Peer利用颠覆性技术的强大能量(影印版)”[M],清华大学出版社,2003
    [3]K.AMVAR S D, SCHLOSSER M T. EigenRep reputation management in P2P networks[C]. The Twelfth International World Wide Web Conference. [SI]:ACM Press 2003:123-134.
    [4]Stephen Paul Marsh,Formalizing Trust as a Computational Concept.Ph D thesis [D], University of Stirling, Scotland, U.K.,1994
    [5]Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[C].In Proceedings of 17th Sym-posium on Security and Privacy.1996
    [6]Diego Gambetta. Can we trust trust? Trust: Making and breaking cooperative relations.[J] Oxford: Basil Blackwell,1990:217-237
    [7]Kamvar S. EigenRep:Reputation management in P2P networks[C]. Technical Report, SCCM-02-16, Stanford University,2002
    [8]Deutsch, M., "Trust and Society"[J], Journal of Conflict Resolution,2:1958.
    [9]Baier, Aannette. Trust and Antitrust.[M] 1986 Ethics 96(2).
    [10]L.Wrightsman, Assumption about Human Nature:A Social-Psychological Approach [J].1974, Monterey, CA
    [11]Coleman, James S. The Foundations of Social Theory [M].1990 The Belknap Press of the Univ-ersity of Harvard
    [12][英]亚当·斯密《道德情操论》[M]蒋自强等译,北京,商务印书馆,1997
    [13]郑也夫《信任论》[M]北京,中国广播电视出版社,2006,第60页
    [14]《牛津中阶英汉双解词典》[]M商务印书馆 牛津大学出版社2003.10
    [15]郑也夫《信任论》[M]北京,中国广播电视出版社,2006,第93页
    [16]王邵光,刘欣“信任的基础:一种理性的解释”[J] 《社会学研究》2002年第3期
    [17]郑也夫《信任论》[M]北京,中国广播电视出版社,2006,第18页
    [18]G.Simmel. The Philosophy of Money [M]. London:routledge.1978.
    [19][英]A.J.M.米尔恩《人的权利与人的多样性人权哲学》[M]夏勇、张志铭译,北京,中国大百科全书出版社,1995
    [20]张莉网络人际交往中的信任产生机制[J]重庆图情研究Vol.7 No.24 2006.2
    [21]M.Khambatti. Peer-to-Peer Communities:Architecture, Information and Trust Management. Ph. Dthesis [D]. http://khambatti.com/mujtaba/ArticlesAndPapers/Mujtaba DissertationFINAL.pdf
    [22]http://www-128.ibm.com/developerworks/cn/grid/
    [23]http://www.p2pwg.org/
    [24]D. S. Milojicic and V. Kalogeraki. Peer-to-Peer Computing[J]. HP Labs, Palo. Alto, Tech Report:HPL-2002-57,2002
    [25]Dejan S.Milojicic, Vana Kalogeraki, Rajan Lukose, etc. Peer-to-Peer Computing. HP Laboratori-es Palo Alto.2003
    [26]Muninder P Singh. Peering at Peer-to-Peer Computing [J]. IEEE Internet computing,2001.
    [27]Gnutella.http://www.gnutella.com
    [28]Clarke I, Miller S G, Hong T W. Protecting Free Expression Online with Freenet [J]. IEEE Internet Computing.2002,6 (1):40-49
    [29]Muninder P Singh. Peering at Peer-to-Peer Computing [J]. IEEE Internet computing,2001
    [30]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]. In:Proc. Of the 1996 IEEE Symp. On security and Privacy. Washington:IEEE Computer Society Press,1996.164-173
    [31]J.E. Altman. PKI Security for JXTA overlay networks. Technical Report[C], Palo Alto TR-12-03, Sun Microsystems,2003
    [32]Chang E, Thomson P, Dillon T, Hussain F.The fuzzy and dynamic nature of trust[J]. LNCS 3592 Berlin:spinger-Verlag,2005.161-174
    [33]Koutrouli E, Tsalgatidou A. Reputation-Based trust systems for P2P applications:design issues and comparison framework[J]. LNCS4083,2006.152-161
    [34]Beth T, Borcherding M, Klein B. Valuation of Trust in Open Network[C] Proceedings of the Eu-ropean Symposium on Research in Security.1994
    [35]J(?)sang A. The right type of trust for distributed systems[C] Proceedings of the 1996 New Secu-rity Paradigms Workshop.
    [36]J(?)sang A. A model for trust in security systems[C] Proceedings of the 2nd Nordic Workshop on secure computer systems.1997
    [37]Almcnarez F, Matin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices[C]. Proceedings of the 3rd IEEE Workshop on Pervasive Computing and Communication Security Washington:IEEE Computer Society Press.2006.267-272.
    [38]Almenarez F, Marin A, Campo C, Garcia RC. TrustAC:Trust-Based access control for pervasive devices[J]. LNCS 450. Berlin:Springer-Verlag,2005.225-238.
    [39]Almenarez F, Matin A, Campo C, Garcia RC. PTM:A pervasive trust management model for dynamic open environments[C]. Proceedings of the 1st Workshop on Pervasive Security,Privacy and Trust. Boston,2004.
    [40]Theodorakopoulos G. Baras JS. On trust models and trust evaluation metrics for ad-hoc networks [J]. IEEE Journal on Selected Areas in Communications,2006,24(2):318-328.
    [41]Theodorakopoulos G.Distributed trust evaluation in ad-hoc networks [MS Thesis].2004.
    [42]Duma C, Shahmehri N. Dynamic trust metrics for peer-to-peer system [C]. In:Proc. of the 16th Workshop on Database and Expert Systems Applications. Washington:IEEE Computer Society Press,2005.
    [43]Xiong L, Liu L. Peer Trust: Supporting reputation-based trust in peer-to-peer communities [J]. IEEE Transactions on Data and Knowledge Engineering (Special Issue on Peer-to-Peer Based Data Management).2004,16(7):843-857
    [44]Kamvar S D, Schlosser M T, Garcia-Molina H. The Eigen trust Algorithm for Reputation Management in P2P Netw0rks[C] Proceedings of the 12th International World Wide Web Conference. Budapest, Hungary:ACM Press,2003
    [45]The eBay Homepage.http://www.ebay.com/
    [46]屈延文《软件行为学》[M]北京,电子共业出版社2004.10
    [47]Artz D, Gil Y. A survey of trust in computer science and the Semantic Web[J]. Web Semantics, 2007.5
    [48]李勇军,代亚非 对等网络信任机制研究[J].计算机学报,第33卷第3期2010.3
    [49]Li Xiao-Yong, Gui Xiao-Lin. Research on dynamic trust model for large scale distributed envir-onment [J]. Journal of Software,2007.18(6):1510-1521 (in Chinese)
    [50]Carbone M, Nielsen M, Sassone V. A formal model for trust in dynamic networks[C]. Proceedi-ngs of the International Conference on Software Engineering and Formal Methods (SEFM'03). Los Vaqueros:IEEE Computer Society,2003:54-61
    [51]窦文,王怀民 等构造基于推荐的Peer-to-Peer环境下的Trust模型[J]软件学报Vol.15, No.4 2004
    [52]Huaizhi Li, Mukesh Singhal. Trust Management in Distributed Systems [A]. Published by the IEEE Computer Society February 2007
    [53]Shi, G. V. B. J.,& Adams, C. Dealing with recommendations in a statistical trust model[C]. In Proceedings of the workshop on trust in agent societies (held in conjunction with the 4th international joint conference on autonomous agents and multi agent systems (AAMAS)). (2005)
    [54]N. Luhmann Trust and Power[M]. Chichester: John Wiley&Sons 1979
    [55]Monge P R, Noshir C. Theories of Communication Networks [M]. NY:Oxford University Press. 2003
    [56]罗家德社会网分析讲义[M].北京:社会科学文献出版社,2005
    [57]D.H. McKnight, N.L. Chervay. The Meanings of Trust[C]. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center, 1996
    [58]Farag Azzedin, Muthucumaru Maheswaran. Evolving and Managing Trust in Grid Computing Systems[C] IEEE Canadian on Electrical & Computer Engineering(CCECE'02),May 2002,pp 1424-1429
    [59]Chithra Selvary, Sheila Anand. A survey on Security Issues of Reputation Management System for Peer-to-peer Networks [J] COMPUTER SCIENCE REVIEW 6 (2012)145-160 Elsevier Inc. 2012.04
    [60]Sini Ruohomaa, Lea Kutvonen Trust Management Survey[J] P.Herrmann et al. (Eds.):iTrust 2005, LNCS 3477, pp:77-92,2005. Springer-Verlag Berlin Heidelberg 2005
    [61]田春歧 P2P网络信任模型的研究[D].北京:北京邮电大学2007
    [62]董红斌,周剑,卢学裕,钱立进 基于角色模型的Linux文件血统及其安全机制[J].计算机工程与应用 40(023):76-77,2004.
    [63]周建波,董红斌,梁意文 基于血统机制的文件系统安全[J].计算机应用,25(005):1160-1162,2005
    [64]卢学裕,董红斌,周剑文件血统与角色亲和度的网络文件安全机制[J].计算机应用研究,21(009):150-152,2004.[58]
    [65]姜静,梁意文 文件安全性血统的演变方法[J].计算机工程与应用,41(015):48-50,2005.
    [66]余其兴,赵刚《人类遗传学导论》[M] 北京:高等教育出版社 海德堡:施普林格出版社 2000
    [67]Mujtaba Khambati, Partha Dasgupta, Kyung Dong Ryu. A role-based trust model for peer-peer communities and dynamic coalitions[C]. In:Proceedings of the Second IEEE International Info-rmation Assurance Workshop, Charlotte, NC, USA:2004,141-154
    [68]张骞,刘积仁 等.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107
    [69]林怀清,李之棠.P2P信任模型关键技术的研究进展[J].小型微型计算机系统,Vol.28 No.92007
    [70]王学龙,张璟.P2P关键技术研究综述[J].计算机应用研究,Vol.27 No.3 Mar. 2010
    [71]Babak Khosravifar et al., CRM:An efficient trust and reputation model for agent computing [J] Knowl. Based Syst. (2011), doi:10.1016/j.knosys.2011.01.004
    [72]Chun-Ling Cheng et al., METrust:A Mutual Evaluation-based Trust Model for P2P Networks [J] International Journal of Automation and Computing. February 2012,63-71 DOI:10.1007/s11633
    [73]Sripanidkulchai K, Maggs B, Zhang H. Eficient content location using interest based locality in peer-to-peer systems[C]//Proceedings of the 22nd Annual Joint Conference of the IEEE Comput-er and CommunicationsSocieties. San Francisco, CA, USA,2003:2166-2176
    [74]施荣华,辛晶晶 一种基于群组的P2P网络信任管理模型[J].计算机应用研究Vol.27 No.72010.7
    [75]杨莉,邢长友等P2P环境下基于兴趣的分布式信任模型[J].东南大学学报(自然科学版)Vol.41 No.2 2011.3
    [76]Yuhua L, Yuling L, Wei C, et al.The Research Based on Trust Value Against Vulnerability in P2P Networks [C] Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. USA:IEEE,2009:85-89
    [77]Yuh-Min T,Fu-Gui C.A free-rider aware reputation system for peer-to-peer file-sharing networks [J]. Expert Systems with Applications,2011,38(3):2432-2440
    [78]许晓东,邹宝军等 信任模型中搭便车节点的抑制计算机科学[J] Vol.39 No.32012.3
    [79]Audun J. A Survey of Trust and Reputation Systems for Online Service Provision[J]. Decision Support Systems,2007,43(2):618-644.
    [80]Spitz S, Tuchelmann Y. A Trust Model Considering the Aspects of Time[C]//Proceedings of the Second International Conference on Computer and Electrical Engineering(ICCEE). USA: IEEE Computer Soc,2009:550-554
    [81]Yuh-Min T, Fu-Gui C. A free-rider aware reputation system for peer-to-peer file-sharing netwo-rks[J]. Expert Systems with Applications,2011,38(3):2432-2440
    [82]Feldman M, Papadimitriou C, Chuang J, Stoica I. Free-riding and whitewashing in Peer-to-Peer systems[C]. Proceedings of the ACM SIGCOMM 2004 Workshops. Portland, USA,2004: 228-235
    [83]Marti S, Garcia-Molina H. Identity Crisis:Anonymity vs. Reputation in P2P systems[C]. //Proceedings of the 3rd International Conference on Peer-to-Peer Computing. LinkOping, Sweden,2003:134-141
    [84]窦文信任敏感的P2P拓扑构造及其相关技术研究:[学位论文].长沙,国防科学技术大学,2003,14-70
    [85]胡建理,吴泉源,周斌等一种基于反馈可信度的分布式P2P信任模型.软件学报,2009, 20(10):2885-2898
    [86]李景涛,荆一楠,肖晓春等.基于相似度加权推荐的P2P环境下的信任模型.软件学报,2007,18(1):157-167
    [87]Srivatsa M., Xiong L., Liu L. TrustGuard:Countering vulnerabilities in reputationmanagement for decentralized overlay networks. In:Proceedings of the 14th World Wide Web Conference (WWW 2005). Chiba, IEEE Press,2005,422-431
    [88]常俊胜,王怀民,尹刚DyTrust一种P2P系统中基于时间帧的动态信任模型.计算机学报,2006,29(8):1301-1307
    [89]He R, Niu J W, Zhang G W. CBTM:A trust model with uncertainty quantification and reasoning for pervasive computing [C]//Proceedings of the 3rd International Symposium on Parallel and Distributed Processing and Applications-ISPA 2005 Workshops. LNCS 3758. Berlin, Heidelberg:Springer-Verlag,2005:541-552
    [90]郭俊香,宋俊昌 信任模型中虚假推荐过滤算法的改进[J]计算机工程 Vol.36 No.152010.8
    [91]Alberto F, Evangelos K, Sven O. Pinocchio:Incentives for honest participation in distributed trust management [C]//Proceedings of the 2nd International Conference on Trust Management (iTrust 2004). LNCS 2995. Berlin Heidelberg:Springer-Verlag,2004:63-77
    [92]Jigar P, Luke T W T. A Probabilistic Trust Model for Handling Inaccurate Reputation Sourccs[C] Proc. of the 3rd International Conference on Trust Management. Paris, France.2005:193-209.
    [93]Sun Y Li Han z, w Yu, Liu K J R. A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks[C] IEEE INFOCOM,2006.
    [94]Newsome J, Shi E, Song D, A Perrig. The sybil attack in sensor networks:Analysis and defenses [C].//Proceedings of the third International Symposium on Information Processing in Sensor Networks,2004
    [95]HOFFMAN K, ZAGE D, NITA-ROTARU C. A survey of attack and defense techniques for rep-utation systems [J]. ACM Computing Surveys,2007,5(9):1-34
    [96]LIAN QIAO, ZHANG ZHENG. An empirical study of collusion behavior in the maze P2P file-sharing system[C]//7th International Conference on Distributed Computing Systems. Washington DC:IEEE,2007:56-66.
    [97]E. Adar and B.A. Huberman, Free Riding on Gnutella, Technical Report, Palo Alto,CA 94304, Xerox Palo Alto Research Center,2000
    [98]马洛斯《动机与人格》[M]北京,中央编译出版社2011.2
    [99]E.Krishna Gt Nmadi, Steven D Crribble. A measurement study of peer-to-peer file sharing systems[C]//proceedings of the Multimedia Computing and Networking(MMCN)[c]. San Jose: Multimedia Systems Journal,2002.
    [100]G.Philippe, L.B.Kevin, M.Ilya, et.al. Incentives for Sharing in Peer-to-Peer Networks[C] //Proceeding of the ACM Conference Electronic Commerce [J]. Tampa:DBLP,2001
    [101]J.Shneidman, D.C.Parkes. Rationality and Self-Interest in Peer to Peer Networks [J]//Second International Workshop on Peer-to-Peer System, Springer-Verlag Press, LNCS 2735,2003.2 pp47-52
    [102]杨懋P2P文件共享系统Maze中激励与信誉机制的研究[D].北京:北京大学,2006,36-47
    [103]Papaioannou T G, Stamoulis G D. An incentives'mechanism promoting truthful feedback in Peer-to-Peer systems[C]//Proceedings of the 2005 IEEE International Symposium on Cluster Computing and the Grid. Cardiff, UK,2005, (1):275-283
    [104]Lai K, Feldman M, Stoica I. Incentives for cooperation in peer-to-peer networks[C]//Proceedin-gs of the 2nd Workshop on Economics of Peer-to-Peer Systems. Berkeley, USA,2003
    [105]Feldmany M, Laiz K. Quantifying disincentives in peer-to-peer networks:Workshop on economics of p2p systems [M]. Berkeley.Springer,2003:117-122.
    [106]罗柏发,蔡国永信任模型中的激励机制研究进展[J]广州科学院学报Vol.26 No.42010.11 532-537
    [107]G. Philippe, L. B. Kevin, M. Ilya, et.al. Incentives for Sharing in Peer-to-Peer Networks[C]. Proceedings of the ACM Conference on Electronic Commerce [J]. Tampa:DBLP,2001.264-267
    [108]Cohen B. Incentives build robustness in bittorrent [EB/OL].2007-02-01 http://bitconjurer.org/ BitTorrent/bittorrente-con.pdf
    [109]BURAGOHAIN C. A game theoretic framework for incentives in p2p systems[EB/L].[2004-02-01]. http://www.as.ucsb.edu/-'suri/psdir/incentives.pdf
    [110]Jurca R, Faltings B. An incentive-compatible reputation mechanism:proceedings of the Seco-nd International Joint Conference on Autonomous Agents and Multivalent Systems[C]. Newport Beach:ACM press,2004.
    [111]Liu Jinshan. An incentive compatible reputation mechanism for ubiquitous computing enviro-nment [J]. International Journal of Information Security,2007,6(5):297-311.
    [112]Michal Feldman, John Chuang. Overcoming free-riding behavior in peer-to-peer systems [J]. ACM SIGecom Exchanges,2005.5(4):41-50.
    [113]K. Ranganathan, M. Ripeanu,A, Sarin,et.al. To Share or Not to Share:An Analysis of Incentiv-es to Contribute in Collaborative File Sharing Environments [J]. Workshop on economics of p2p systems, June 2003 Berkeley.
    [114]Feldman M., Papadimitriou C., Chuang J., et al. Free-riding and whitewashing in peer-to-peer systems[C]. IEEB Journal on Selected Areas in Communications,2006,24 (5):1010-1019 [86]
    [115]Castro M, Druschel P, Ganesh A. et al. Security for structured peer-to-peer overlay networks[C] In:Proceeding of 5th Symposium on Operating Systems Design and Implementation (OSDI-2002), Boston, MA,2002,102-115
    [116]Friedman E. J., Resnick P. The social cost of cheap pseudonyms[J]. Journal of Economics and Management Strategy,2001,10(2):173-199

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700