All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Resistance of Trust Management Systems against Malicious Collectives

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11320%2F14%3A10192754" target="_blank" >RIV/00216208:11320/14:10192754 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/chapter/10.1007/978-3-319-05939-6_7" target="_blank" >http://link.springer.com/chapter/10.1007/978-3-319-05939-6_7</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-319-05939-6" target="_blank" >10.1007/978-3-319-05939-6</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Resistance of Trust Management Systems against Malicious Collectives

  • Original language description

    Malicious peers in Peer-to-peer networks can develop sophisticated strategies to bypass existing security mechanisms. The effectiveness of contemporary trust management systems is usually tested only against simple malicious strategies. In this paper, wepropose a simulation framework for evaluation of resistance of trust management systems against different malicious strategies. We present results of five TMS that represent main contemporary approaches; the results indicate that most of the traditionaltrust managements are vulnerable to sophisticated malicious strategies.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/GA13-08195S" target="_blank" >GA13-08195S: Highly Scalable Parallel and Distributed Methods of Data Processing in E-science</a><br>

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of 2nd International Conference on Context-Aware Systems and Applications

  • ISBN

    978-3-319-05938-9

  • ISSN

    1867-8211

  • e-ISSN

  • Number of pages

    10

  • Pages from-to

    67-76

  • Publisher name

    Springer Verlag

  • Place of publication

    Heidelberg

  • Event location

    PhuQuoc

  • Event date

    Nov 25, 2013

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article