Containing sybil attacks on trust management schemes for peer-to-peer networks.
Lin CaiRoberto Rojas-CessaPublished in: ICC (2014)
Keyphrases
- peer to peer networks
- trust management
- file sharing
- management system
- trust evaluation
- malicious users
- peer to peer
- trust model
- virtual communities
- access control
- hierarchical peer to peer networks
- service providers
- resource selection
- test bed
- virtual organization
- computing environments
- distributed environment
- decision support
- query routing
- database
- web services
- decision making