Computer Science ›› 2008, Vol. 35 ›› Issue (6): 32-36.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: The anonymity and dynamics of the P2P network bring many security problems. The traditional access control models and trust management models can not satisfy the P2P environment commendably. This paper proposes a double validation method employing trust m

Key words: Role, P2P, Trust, Access control

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!