Computer Science ›› 2008, Vol. 35 ›› Issue (6): 32-36.
Previous Articles Next Articles
Online:
Published:
Abstract: The anonymity and dynamics of the P2P network bring many security problems. The traditional access control models and trust management models can not satisfy the P2P environment commendably. This paper proposes a double validation method employing trust m
Key words: Role, P2P, Trust, Access control
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I6/32
Cited