Skip to main content

An Improved Global Trust Value Computing Method in P2P System

  • Conference paper
Book cover Autonomic and Trusted Computing (ATC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4158))

Included in the following conference series:

Abstract

Building a trust and reputation mechanism in P2P system is very important. This paper gives an improved global trust value computing method of choosing trusted source peers in P2P system. First, we give a basic description of our trust mechanism; then we bring out the global trust value computing method; third, we define trust computing operator; fourth, we introduce other related trust mechanisms; and finally we do some simulations to compare the performance of our method with other trust mechanism.

Foundation item: Supported by the National Natural Science Foundation of China (90104005, 60373087, 60473023) and Network and Information Security Key Laboratory Program of Ministry of Education of China.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Patel, J., Luke Teacy, W.T., Jennings, N.R., Luck, M.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 193–209. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Jøsang, A., Ismail, R.: The beta reputation system. In: The Proceedings of the 15th Bled Conference on Electronic Commerce, Bled, Slovenia (2002)

    Google Scholar 

  3. Jøsang, A.: An Algebra for Assessing Trust in Certification Chains. In: The proceedings of NDSS 1999, Network and Distributed System Security Symposium. Internet Society, San Diego (1999)

    Google Scholar 

  4. Jingmei, Z., Jingxiang, Z.: Researches on Trust Models of P2P Network Security. Computer Application Research 3, 76–77 (2003)

    Google Scholar 

  5. Junmao, Z., Shoubao, Y., Jianping, F., Mingyu, C.: A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning. Computer Research and Development 42(5), 797–803 (2005)

    Article  Google Scholar 

  6. Huaijiang, S.: A Trust Acquisition Method for Trust Management in Open Multi-agent System. Computer Engineering and Application 29, 135–138 (2004)

    Google Scholar 

  7. Wen, T., Zhong, C.: Research of Subjective Trust Management Model Based on the Fuzzy Set Theory. Journal of Software 14(8), 1401–1408 (2003)

    MATH  Google Scholar 

  8. Kamvar, S.D., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: The Proceedings of the Twelfth International World Wide Web Conference (2003)

    Google Scholar 

  9. Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, F., Zhang, H., Yan, F., Gao, S. (2006). An Improved Global Trust Value Computing Method in P2P System . In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_25

Download citation

  • DOI: https://doi.org/10.1007/11839569_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38619-3

  • Online ISBN: 978-3-540-38622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics