期刊文献+

一种基于PKI/GCA的对等网络安全与公平解决方案

PKI/GCA Security and Equality in P2P Networks
在线阅读 下载PDF
导出
摘要 对等网络能否推广普及很大程度上取决于系统所提供的安全性以及是否能够推动用户积极提供资源.提出了在PK I/GCA的参与下实现对等网络中的接入控制、用户认证、虚拟货币支付,从而实现安全性和公平性. P2P network that can widely spread depends to a great degree on the security measures that the system provides and its ability to motivate users to actively provide resources. This paper discusses how to handle the access control, authentication and virtual money payment with the participation of PKI/GCA in order to realize the security and equality.
作者 刘玉
机构地区 合肥学院管理系
出处 《合肥学院学报(自然科学版)》 2007年第4期59-62,共4页 Journal of Hefei University :Natural Sciences
关键词 对等网络 PKI/CA 安全性 公平性 P2P network PKI/GCA security equality
作者简介 刘玉(1981-),女,安徽合肥人,合肥学院管理系助教,硕士研究生.
  • 相关文献

参考文献4

  • 1王丹,于戈.P2P系统模型研究[J].计算机工程,2005,31(4):128-130. 被引量:29
  • 2[2]John R Douceur.The Sybil Attack.1 st International Workshop on Peer-to-Peer Systems (IPTPS 02)[C]//Volume 2429 of Lecture Notes in Computer Science.Cambridge MA:Springer-Verlag,2002:251-260.
  • 3[3]Krishnan,Ramayya,Smith Michael D,et al.The Economics of Peer-to-Peer Networks[J].Journal of Information Technology Theory and Applications,2003,5 (3):31-44.
  • 4欧阳荣,雷振明.BitTorrent类型P2P系统模型研究与性能分析[J].北京邮电大学学报,2006,29(z2):113-117. 被引量:3

二级参考文献14

  • 1[1]A Parker.The true picture of peer-to-peer file sharing[EB/OL].2004[2006-08-01].http://www.cachelogic.com.
  • 2[2]Liu L,Dong K Ryu,Lee K W.Keyword fusion to support efficient keyword-based search in peer-to-peer file sharing[C]//IEEE International Symposium on Cluster Computing and Grid.Chicago:[s.n.],2004:269-276.
  • 3[3]Sherwood R,Braud R,Bhanachajee B.Slurpie:a cooperative bulk data transfer protocol[C]//Proceedings of IEEE INFOCOM,Hong Kong:[s.n.],2004.
  • 4[5]Ge Z,Figueiredo D R,Jaiswal S,et al.Modeling peerpeer file sharing systems[C] //Proceedings of IEEE INFOCOM.San Francisco:[s.n.],2003:2188-2198.
  • 5[6]Clevenot F,Nain P.A simple fluid model for the analysis of the squirrel peer-to-peer caching system[C]//Proceedings of IEEE INFOCOM'04.Hong-Kong:[s.n.],2004:95.
  • 6[7]Qiu D,Srikant R.Modeling and performance analysis of bitTorrent-like peer-to-peer networks[J].ACM SIGCOMM Computer Communication Review Archive,2004,34(4):367-378.
  • 7Napster website. http:∥www.napster.com
  • 8Gnutella Website. http:∥www.gnutella.com
  • 9SET@home Freenet website. http:∥www.sethome.com
  • 10Milojicic D S, Kalogeraki V, Lukose R. Peer-to-Peer Computing.Technical Report. HP Laboratories, Palo Alto,HPL-2002-57, 2002

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部