首页 | 本学科首页   官方微博 | 高级检索  
     

一种可信P2P网络安全模型
引用本文:张建标,刘辰.一种可信P2P网络安全模型[J].北京工业大学学报,2008,34(9).
作者姓名:张建标  刘辰
作者单位:北京工业大学,计算机学院,北京,100022
基金项目:国家242信息安全计划
摘    要:对等网络(Peer-to-Peer,简称P2P)在广泛应用的同时,安全问题也日渐突出.针对P2P应用的潜在安全风险,基于中心化拓扑的P2P网络结构,结合可信度评测、授权、验证和加密等安全机制,提出了一种基于中心化拓扑的可信P2P网络安全模型,能较好地保证P2P网络的安全可控性,为P2P网络的进一步应用奠定基础.

关 键 词:对等网络  可信  验证

A Model of Trusted Peer-to-Peer Network
ZHANG Jian-biao,LIU Chen.A Model of Trusted Peer-to-Peer Network[J].Journal of Beijing Polytechnic University,2008,34(9).
Authors:ZHANG Jian-biao  LIU Chen
Abstract:An increasing number of Peer-to-Peer (P2P) applications are appeared.The defect of P2P network which causes several security problems must be in focus.In this paper,a model of trusted P2P network will be introduced,which integrates the security mechanisms about integrity measurement,authorization, authentication and encryption.It can make a good security performance on centralized topology P2P network and establish the foundation of further P2P network application.
Keywords:Peer-to-Peer  trust  authentication
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号