Reputation Based Methods for Building Secure P2P Networks
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11320%2F08%3A10084068" target="_blank" >RIV/00216208:11320/08:10084068 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Reputation Based Methods for Building Secure P2P Networks
Original language description
The P2P network's open and anonymous nature offers an almost ideal environment for malicious activities. In this paper, we categorize current reputation management schemes which offer defenses against many attacks. Our goal is to survey the present reputation management methods and propose a classification which facilitates a system analysis. We identify the main drawbacks which are common to all published methods and outline the possible solutions.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
—
Continuities
Z - Vyzkumny zamer (s odkazem do CEZ)
Others
Publication year
2008
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of ICADIWT 2008 - First IEEE International Conference on the Applications of Digital Information and Web Technologies
ISBN
978-1-4244-2623-2
ISSN
—
e-ISSN
—
Number of pages
6
Pages from-to
—
Publisher name
IEEE Computer Society
Place of publication
Neuveden
Event location
TU Ostrava, Ostrava
Event date
Aug 4, 2008
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000263224700070