Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
An Access Control Model in Lager-Scale P2P File Sharing Systems
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
ATM: an automatic trust monitoring algorithm for service software
Proceedings of the 2009 ACM symposium on Applied Computing
A fuzzy trust model using multiple evaluation criteria
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Context-sensitive trust computing in distributed environments
Knowledge-Based Systems
A quantitative trust model based on multiple evaluation criteria
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Comparative trust management with applications: Bayesian approaches emphasis
Future Generation Computer Systems
Hi-index | 0.00 |
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. However, this approach has several drawbacks as well including trust issues and lack of coordination and control among the peers. In this paper, we present a trust model for a peer-to-peer structured large-scale network computing system and completely define the trust model and describe the schemes used in it. Central to the model is the idea of maintaining a recommneder network that can be used to obtain references about a target domain. Simulation results indicate that the trust model is capable of building and maintaning trust and also identifying the bad domains.