On the Dempster-Shafer framework and new combination rules
Information Sciences: an International Journal
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Some strategies for explanations in evidential reasoning
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Future Generation Computer Systems
Hi-index | 0.00 |
Building trust relationship between peers in a large-scale distributed P2P file-sharing system is a fundamental and challenging research topic. Recommendation based trust mechanism is widely employed to establish the trust relationship. However, most existing approaches can not efficiently deal with inconsistent or conflicting recommendation information, and uncertainty of information. Dempster-Shafer (D-S) evidence theory is preponderant in tackling uncertainty of information, but classical combination rule always results in unreasonable results especially when evidences severely conflict each other. In this paper, we improve the combination rule for D-S evidence theory and develop a novel trust model based on it. For the problem of security, some measures are also proposed to defense against several malicious attacks. Experimental results show that the proposed model can significantly improve the successful transaction rate of P2P networks and effectively detect malicious behaviors in P2P networks.