2009
DOI: 10.1016/j.comcom.2009.03.002
|View full text |Cite
|
Sign up to set email alerts
|

Reputation management algorithms for DHT-based peer-to-peer environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Tian et al [15] proposed a super-peer based trust model, in which peers gather in a group according to their interest similarity and unfair feedbacks are filtered by algorithm based on peers similarity. In addition, a reputation management algorithm for distributed hash table (DHT)-based P2P environment is presented to select "good" peers cooperating and withstand malicious activity of single malevolent peers and their collusions as well [16] . Moreover, a role-based trust model is presented to establish trust among anonymous peers exactly [17] .…”
Section: Related Workmentioning
confidence: 99%
“…Tian et al [15] proposed a super-peer based trust model, in which peers gather in a group according to their interest similarity and unfair feedbacks are filtered by algorithm based on peers similarity. In addition, a reputation management algorithm for distributed hash table (DHT)-based P2P environment is presented to select "good" peers cooperating and withstand malicious activity of single malevolent peers and their collusions as well [16] . Moreover, a role-based trust model is presented to establish trust among anonymous peers exactly [17] .…”
Section: Related Workmentioning
confidence: 99%
“…In our opinion this assumption appears too strong; transitive trust should be conditional, rather than assumed a priori. On the other hand, the EigenTrust algorithm has many interesting features, namely self-policing, anonymity preservation, reputation improvement as a consequence of lasting fair behaviour, overhead minimization, and robustness against malicious collectives -for these reasons, it is still often used as a starting point for other protocols (Fedotova and Veltri, 2009).…”
Section: Votingmentioning
confidence: 99%
“…Reputation management in Peer-to-Peer networks based on Distributed Hash Tables (DHT) is the main idea presented by (Fedotova and Veltri 2009). The authors proposed an algorithm that permits the peers in the network to obtain individual ranking values for each node based on knowledge exchange.…”
Section: Related Workmentioning
confidence: 99%