Full Paper View Go Back
Furnishing of Ethical Associations in Related Structures
M. Saidireddy1
1 Dept. of CSE, KG Reddy College of Engineering and Technology, Hyderabad, India.
Section:Research Paper, Product Type: Journal
Vol.6 ,
Issue.3 , pp.69-71, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrnsc/v6i3.6971
Online published on Jun 30, 2018
Copyright © M. Saidireddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M. Saidireddy, “Furnishing of Ethical Associations in Related Structures,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.3, pp.69-71, 2018.
MLA Style Citation: M. Saidireddy "Furnishing of Ethical Associations in Related Structures." International Journal of Scientific Research in Network Security and Communication 6.3 (2018): 69-71.
APA Style Citation: M. Saidireddy, (2018). Furnishing of Ethical Associations in Related Structures. International Journal of Scientific Research in Network Security and Communication, 6(3), 69-71.
BibTex Style Citation:
@article{Saidireddy_2018,
author = {M. Saidireddy},
title = {Furnishing of Ethical Associations in Related Structures},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2018},
volume = {6},
Issue = {3},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {69-71},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=342},
doi = {https://doi.org/10.26438/ijcse/v6i3.6971}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.6971}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=342
TI - Furnishing of Ethical Associations in Related Structures
T2 - International Journal of Scientific Research in Network Security and Communication
AU - M. Saidireddy
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 69-71
IS - 3
VL - 6
SN - 2347-2693
ER -
Abstract :
The systems of Peer-To-Peer are motivating towards a foremost paradigm move in the direction of genuinely distributed computing. Classification of peers as moreover trustworthy or untrustworthy is not enough in most of the cases. Metrics should include accuracy hence peers can be ranked consistent with trustworthiness. Metric of reputation is considered on basis of recommendations and it is considered as important when deciding in relation to strangers as well as new acquaintances. When scheming of reputation metric, recommendations are assessed on basis of trust metric of recommendation. In this work we aim at introducing an architecture known as SORT which is a representation of self-organizing Trust intends to reduce malevolent activity in P2P structure by setting up trust associations between peers in their proximity.
Key-Words / Index Term :
Peer-To-Peer systems, Trustworthiness, Reputation, Trust, Self-organizing trust model, Acquaintance.
References :
[1] S. Staab, B. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T. Dillon, E. Chang, F.K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap, “The Pudding of Trust,” IEEE Intelligent Systems,vol. 19, no. 5, pp. 74-88, 2004.
[2] E. Terzi, Y. Zhong, B. Bhargava, Pankaj, and S. Madria, “An Algorithm for Building User-Role Profiles in a Trust Environment,” Proc. Fourth Int’l Conf. Data Warehousing and Knowledge Discovery (DaWaK), vol. 2454, 2002.
[3] S. Saroiu, K. Gummadi, R. Dunn, S.D. Gribble, and H.M. Levy, “An Analysis of Internet Content Delivery Systems,” Proc. Fifth USENIX Symp. Operating Systems Design and Implementation (OSDI), 2002.
[4] Ahmet Burak Can, and Bharat Bhargava “SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems”, 2013
[5] F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, “Implementing a Reputation-Aware Gnutella Servant,” Proc. Networking 2002 Workshops Web Eng. and Peer-to-Peer Computing, 2002.
[6] H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, “Sybilguard: Defending against Sybil Attacks via Social Networks,” ACM SIGCOMM Computer Comm. Rev., vol. 36, no. 4, pp. 267-278, 2006.
[7] M. Ripeanu, I. Foster, and A. Iamnitchi, “Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design,” IEEE Internet Computing, vol. 6, no. 1, pp. 50-57, Jan. 2002.
[8] M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying Trust in Mobile Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Integration of Knowledge Intensive Multi-AgentSystems (KIMAS), 2005.
[9] Y. Wang and J. Vassileva, “Bayesian Network Trust Model in Peer-to-Peer Networks,” Proc. Second Workshop Agents and Peer-to-Peer Computing at the Autonomous Agents and Multi Agent Systems Conf. (AAMAS), 2003.
[10] A. Habib, D. Xu, M. Atallah, B. Bhargava, and J. Chuang, “A Tree- Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 7, pp. 1010-1014, July 2005.
[11] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for InternetApplications,” ACM SIGCOMM Computer Comm. Rev., vol. 31, no. 4, pp. 149-160, 2001.
[12] R. Zhou and K. Hwang, “Powertrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing,” IEEE rans. Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473, Apr. 2007.
[13] K. Aberer and Z. Despotovic, “Managing Trust in a Peer-2-Peer Information System,” Proc. 10th Int’l Conf. Information and KnowledgeManagement (CIKM), 2001.
[14] S. Xiao and I. Benbasat, “The Formation of Trust and Distrust in Recommendation Agents in Repeated Interactions: A Process- Tracing Analysis,” Proc. Fifth ACM Conf. Electronic Commerce (EC), 2003.
[15] G. Swamynathan, B.Y. Zhao, and K.C. Almeroth, “Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System,” Proc. Int’l Conf. Parallel and Distributed Processing and Applications (ISPA), 2005.
[16] Z. Despotovic and K. Aberer, “Trust-Aware Delivery of Composite Goods,” Proc. First Int’l Conf. Agents and Peer-to-Peer Computing, 2002.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.