{"title":"基于信任和可用性的P2P安全模型","authors":"Liu Yihe","doi":"10.1109/ICCSN.2009.27","DOIUrl":null,"url":null,"abstract":"In order to overcome the existing deficiencies that studies pure trust mechanism in the current P2P research, the concept of the availability grade and the reputation grade such as the subject and the object are introduced. A new P2P access control model based on trust and availability is defined, which strategies are compatible and expansion of the existing access control strategy, by used the existing access control strategies and model ideas, and it applies to any of the P2P network environment. It is a security model after analysis and discussion, which is positive on researched on the P2P access control.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A P2P Security Model Based on Trust and Availability\",\"authors\":\"Liu Yihe\",\"doi\":\"10.1109/ICCSN.2009.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to overcome the existing deficiencies that studies pure trust mechanism in the current P2P research, the concept of the availability grade and the reputation grade such as the subject and the object are introduced. A new P2P access control model based on trust and availability is defined, which strategies are compatible and expansion of the existing access control strategy, by used the existing access control strategies and model ideas, and it applies to any of the P2P network environment. It is a security model after analysis and discussion, which is positive on researched on the P2P access control.\",\"PeriodicalId\":177679,\"journal\":{\"name\":\"2009 International Conference on Communication Software and Networks\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-02-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Communication Software and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2009.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Communication Software and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2009.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A P2P Security Model Based on Trust and Availability
In order to overcome the existing deficiencies that studies pure trust mechanism in the current P2P research, the concept of the availability grade and the reputation grade such as the subject and the object are introduced. A new P2P access control model based on trust and availability is defined, which strategies are compatible and expansion of the existing access control strategy, by used the existing access control strategies and model ideas, and it applies to any of the P2P network environment. It is a security model after analysis and discussion, which is positive on researched on the P2P access control.