ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 9)

Publication Date:

Authors : ; ;

Page : 489-491

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal


Every system in the network considered as peer, which are open to malicious activities in nature. Prevention of these malicious activities is achieved by developing trust between the peers. Trustworthiness of a peer can be calculated based on the prior interactions with other peers in the network. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Interactions and recommendations are based on importance, recentness and peer satisfaction. Here, it is also important to consider the recommender’s trust. For this, recommendation from a neighbor is evaluated by simulation experiments on file sharing operations. Hence, good peers were able isolate malicious peers.

Last modified: 2014-09-23 20:03:54