نتایج جستجو برای: group based p2p systems

تعداد نتایج: 4474437  

2011
Chithra Selvaraj

This paper deals with a Role based Trust (RT) model for Peer-to-Peer (P2P) networks. P2P networks are essentially decentralized in nature to enhance resource sharing and collaboration. The anonymous and open nature of P2P systems offers an almost ideal environment for unauthorized access of digital content and also for easy distribution of malware. Today’s popular P2P systems have to challenge ...

Journal: :CoRR 2011
Anis Ismail Mohamed Quafafou Gilles Nachouki Mohammad Hajjar

Peer-to-peer (P2P) Data-sharing systems now generate a significant portion of internet traffic. P2P systems have emerged as a popular way to share huge volumes of data. Requirements for widely distributed information systems supporting virtual organizations have given rise to a new category of P2P systems called schemabased. In such systems each peer is a database management system in itself, e...

2004
Mudhakar Srivatsa Ling Liu

A number of recent structured Peer-to-Peer (P2P) systems are built on top of distributed hash table (DHT) based P2P overlay networks. Almost all DHT-based schemes employ a tight-deterministic data placement and ID mapping schemes. This feature on one hand provides assurance on location of data if it exists, within a bounded number of hops, and on the other hand, opens doors for malicious nodes ...

2009
Pingjian Zhang Juanjuan Zhao

P2P file sharing system is one of the hot research topics. However, most of such systems do not support auto extraction of metadata and provide only searches via resource titles. Combining the Chord algorithm and the SHA algorithm, this paper proposed a new P2P search model based on Distributed Hash Table (DHT). The procedures of establishing such P2P networks are presented. The design and impl...

2005
Rakesh Kumar Keith W. Ross

We study mediated P2P marketplaces in which payment for P2P service is done via a trusted intermediary but the intermediary cannot monitor the rendered service. The lack of direct monitoring provides opportunities for malicious peers to launch crippling “lying attacks” against the marketplace. In this paper we propose a suite of payment schemes that are specifically designed to thwart lying att...

2006
Marco Conti Jon Crowcroft Franca Delmastro Andrea Passarella

P2P systems are a natural way of supporting GroupCommunication (GC) applications. Furthermore, their core characteristics (e.g., self-organisation, self-recovery, decentralisation) match particularly well MANET features. For these reasons we developed and tested a simple yet significant GC application on top of different P2P substrates. Our aim is to understand which type of P2P system is more ...

2003
Alexander Löser Wolf Siberski Martin Wolpers Wolfgang Nejdl

Peer-to-peer (P2P) networks have become an important infrastructure during the last years. Using P2P networks for distributed information systems allows us to shift the focus from centrally organized to distributed information systems where all peers can provide and have access to information. In previous papers, we have described an RDF-based P2P infrastructure called Edutella which is a speci...

2007
Runfang Zhou Kai Hwang

To build an efficient reputation system for peer-to-peer (P2P) networks, we need fast mechanisms to aggregate peer evaluations and to disseminate updated scores to a large number of peer nodes. Unfortunately, unstructured P2P networks are short of secure hashing and fast lookup mechanisms as in structured P2P systems like the DHT-based Chord. In light of this shortcoming, we propose a gossiping...

2006
Amit Mathur Suneuy Kim Mark Stamp

Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a security mechanism for a single host at the operating system level. This allows the operating system to ensure that authenticated users have access to resources based on their assigned roles. RBAC is more challenging in peer-...

2015
Kharade Varsha

P2P architecture is the next-generation network paradigm to replace the traditional client-server architecture. Typical P2P systems are characterized by the decentralized control, scalability and robustness. Centrally managed storage services, such as Dropbox, are popular for synchronizing data between several devices. P2P-based approaches that run fully decentralized, such as BitTorrentSync, a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید