全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种可信P2P网络安全模型

Keywords: 对等网络,可信,验证

Full-Text   Cite this paper   Add to My Lib

Abstract:

对等网络(Peer-to-Peer,简称P2P)在广泛应用的同时,安全问题也日渐突出.针对P2P应用的潜在安全风险,基于中心化拓扑的P2P网络结构,结合可信度评测、授权、验证和加密等安全机制,提出了一种基于中心化拓扑的可信P2P网络安全模型,能较好地保证P2P网络的安全可控性,为P2P网络的进一步应用奠定基础.

References

[1]  罗杰文.Peer to Peer(P2P)综述[R].北京:中科院计算技术研究所,2005.
[2]  HEINBOCKEL W,KWON M.Phyllo:A peer-to-peer overlay security framework[C]//Secure Network Protocols(NPSec). Bedford,Bedford:IEEE ICNP Workshop,2005:43-48.
[3]  DATTA A,HAUSWIRTH M,ABERER K.Beyond“web of trust”:Enabling P2P E-commerce[C]//E-commerce CEC 2003.International Conference,De Lausanne:IEEE Press,2003:303-312.
[4]  TRUSTED COMPUTING GROUP.TCG trusted network connect TNC architecture for interoperability specification version 1.1 revision 2[S].Beaverton,http://www.trustedcomputinggroup.org/tnc/,2006[2007-06-21].
[5]  BERSON T.Skype security evaluation[R].California,USA:Anagram Laboratories,2005.
[6]  杨波.现代密码学[M].北京:清华大学出版社,2003.
[7]  BARKAI D.Technologies for sharing and collaborating on the net[C]//Proceedings of Peer-to-Peer Computing.Linkoping: IEEE International Conference,2001:13-28.
[8]  WEI Yu,BOYER C,CHELLAPPAN S,et al.Peer-to-peer system-based active worm attacks:modeling and analysis[C]// Communications ICC 2005.Texas:IEEE International Conference,2005:295-300.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133