Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive searching and replication of images in mobile hierarchical peer-to-peer networks
Data & Knowledge Engineering
Secure content access and replication in pure P2P networks
Computer Communications
A trust model for distributed systems based on reputation
International Journal of Web and Grid Services
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
PeerCredential: a reputation-based trust framework for Peer-to-Peer applications
International Journal of Information and Computer Security
Mitigating the Impact of Liars by Reflecting Peer's Credibility on P2P File Reputation Systems
Agents and Peer-to-Peer Computing
Reliable P2P File Sharing Service
Agents and Peer-to-Peer Computing
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A Power Peer-Based Reputation Scheme for Mobile P2P Systems
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Research on district partitioning in P2P network
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
On the modeling of honest players in reputation systems
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A critical analysis of latest advances in building trusted P2P networks using reputation systems
WISE'07 Proceedings of the 2007 international conference on Web information systems engineering
Tailored trustworthiness estimations in Peer-to-Peer networks
International Journal of Internet Technology and Secured Transactions
PATROL: a comprehensive reputation-based trust model
International Journal of Internet Technology and Secured Transactions
Study on distance learning scheme based upon peer to peer(P2P)
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A reputation based trust model for grid security
ICCC'11 Proceedings of the 2011 international conference on Computers and computing
Enhanced reliable trust model for grid computing based on reputation
ICCC'11 Proceedings of the 2011 international conference on Computers and computing
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
A group based reputation system for p2p networks
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Reputation-Based trust systems for p2p applications: design issues and comparison framework
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
A computational reputation model in p2p networks based on trust and distrust
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Uncheatable reputation for distributed computation markets
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
A trust management scheme in structured p2p systems
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Extending trust in peer-to-peer networks
ADBIS'09 Proceedings of the 13th East European conference on Advances in Databases and Information Systems
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper we describe a reputation-based trust management protocol for P2P networks where users rate the reliability of parties they deal with, and share this information with their peers. The protocol helps establish trust among good peers as well as identifying the malicious ones. Results of various simulation experiments show that the proposed system can be highly effective in preventing the spread of malicious content in P2P networks.