This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n15http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n19http://purl.org/net/nknouf/ns/bibtex#
n10http://localhost/temp/predkladatel/
n8http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/ontology/domain/vavai/
n18http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216208%3A11320%2F08%3A10084068%21RIV11-MSM-11320___/
n20https://schema.org/
n12http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n9http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n17http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n6http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216208%3A11320%2F08%3A10084068%21RIV11-MSM-11320___
rdf:type
skos:Concept n14:Vysledek
dcterms:description
The P2P network's open and anonymous nature offers an almost ideal environment for malicious activities. In this paper, we categorize current reputation management schemes which offer defenses against many attacks. Our goal is to survey the present reputation management methods and propose a classification which facilitates a system analysis. We identify the main drawbacks which are common to all published methods and outline the possible solutions. The P2P network's open and anonymous nature offers an almost ideal environment for malicious activities. In this paper, we categorize current reputation management schemes which offer defenses against many attacks. Our goal is to survey the present reputation management methods and propose a classification which facilitates a system analysis. We identify the main drawbacks which are common to all published methods and outline the possible solutions.
dcterms:title
Reputation Based Methods for Building Secure P2P Networks Reputation Based Methods for Building Secure P2P Networks
skos:prefLabel
Reputation Based Methods for Building Secure P2P Networks Reputation Based Methods for Building Secure P2P Networks
skos:notation
RIV/00216208:11320/08:10084068!RIV11-MSM-11320___
n3:aktivita
n13:Z
n3:aktivity
Z(MSM0021620838)
n3:dodaniDat
n6:2011
n3:domaciTvurceVysledku
n8:3386821 n8:3100707
n3:druhVysledku
n21:D
n3:duvernostUdaju
n7:S
n3:entitaPredkladatele
n18:predkladatel
n3:idSjednocenehoVysledku
392425
n3:idVysledku
RIV/00216208:11320/08:10084068
n3:jazykVysledku
n17:eng
n3:klicovaSlova
Trust; Security; P2P
n3:klicoveSlovo
n9:P2P n9:Trust n9:Security
n3:kontrolniKodProRIV
[0C93FAAA31FF]
n3:mistoKonaniAkce
TU Ostrava, Ostrava
n3:mistoVydani
Neuveden
n3:nazevZdroje
Proceedings of ICADIWT 2008 - First IEEE International Conference on the Applications of Digital Information and Web Technologies
n3:obor
n5:JC
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:rokUplatneniVysledku
n6:2008
n3:tvurceVysledku
Novotný, Miroslav Zavoral, Filip
n3:typAkce
n15:WRD
n3:wos
000263224700070
n3:zahajeniAkce
2008-08-04+02:00
n3:zamer
n12:MSM0021620838
s:numberOfPages
6
n19:hasPublisher
IEEE Computer Society
n20:isbn
978-1-4244-2623-2
n10:organizacniJednotka
11320