In order to strengthen the security of P2P networks, it is necessary to build trust relationships between nodes of
networks. However, the traditional trust evaluation models can't resist the attacks of Pseudospoofing and Pseudostheft
effectively. To resolve the problems, in this paper, the trusted computing method is introduced into P2P networks, and an
idea of group trust model based on trusted computing methods is proposed. In the process of trust evaluation, the model
can realize the anonymous attestation of the node body, which improves the creditability of trust relationships between
nodes and resolves the security problems of P2P networks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.