The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Rhubarb: A Tool for Developing Scalable and Secure Peer-to-Peer Applications
P2P '02 Proceedings of the Second International Conference on Peer-to-Peer Computing
A secure mental poker protocol over the internet
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
An Integrated Solution for Secure Group Communication in Wide-Area Networks
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
The effect of latency on user performance in Warcraft III
NetGames '03 Proceedings of the 2nd workshop on Network and system support for games
Is hierarchical public-key certification the next target for hackers?
Communications of the ACM - Interactive immersion in 3D graphics
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games
Proceedings of 3rd ACM SIGCOMM workshop on Network and system support for games
P2P Scrabble. Can P2P Games Commence?
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Byzantine Agreement Protocol using Hierarchical Groups
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Fair and Scalable Peer-to-Peer Games of Turns
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Amaze: A Multiplayer Computer Game
IEEE Software
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
The Case for Fairness of Trust Management
Electronic Notes in Theoretical Computer Science (ENTCS)
Practical trust management without reputation in peer-to-peer games
Multiagent and Grid Systems - Grid Computing, high performance and distributed applications
Fairness Emergence through Simple Reputation
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
The development of complex applications that use the Peer-to-Peer computing model is restrained by security and trust management concerns, despite evident performance benefits An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms The article presents new techniques for trust enforcement that use cryptographic methods and are adapted to the dynamic membership and resources of P2P systems The proposed approach to trust management differs significantly from previous work in the area that mainly used reputation The paper describes a comprehensive trust management infrastructure fore P2P MMO games that enables to recognize and exclude cheating players while keeping the performance overhead as low as possible While the architecture requires trusted centralized components (superpeers), their role in trust management is limited to a minimum and the performance gains of using the P2P computing model are preserved.