This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n19http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n22http://purl.org/net/nknouf/ns/bibtex#
n10http://localhost/temp/predkladatel/
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n9http://linked.opendata.cz/resource/domain/vavai/projekt/
n6http://linked.opendata.cz/resource/domain/vavai/subjekt/
n5http://linked.opendata.cz/ontology/domain/vavai/
n12http://linked.opendata.cz/resource/domain/vavai/zamer/
n4https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n8http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n20http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n17http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n18http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216208%3A11320%2F11%3A10099812%21RIV12-GA0-11320___/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n23http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n14http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216208%3A11320%2F11%3A10099812%21RIV12-GA0-11320___
rdf:type
skos:Concept n5:Vysledek
dcterms:description
Malicious collectives represent one of the biggest threats for secured P2P applications. In our previous work, we proposed a trust management system called BubbleTrust targeting this problem. In this paper, we investigate the most common malicious strategies as well as the resistance the BubbleTrust uses against them. We created the simulation framework suitable for testing other TMSs in the same scenarios. Our analysis shows that the success of malicious peers in the BubbleTrust depends mainly on the amount of benefit provided to the network and that the analyzed malicious strategies cannot menace the contribution provided by the P2P network. Malicious collectives represent one of the biggest threats for secured P2P applications. In our previous work, we proposed a trust management system called BubbleTrust targeting this problem. In this paper, we investigate the most common malicious strategies as well as the resistance the BubbleTrust uses against them. We created the simulation framework suitable for testing other TMSs in the same scenarios. Our analysis shows that the success of malicious peers in the BubbleTrust depends mainly on the amount of benefit provided to the network and that the analyzed malicious strategies cannot menace the contribution provided by the P2P network.
dcterms:title
Resistance Against Malicious Collectives in BubbleTrust Resistance Against Malicious Collectives in BubbleTrust
skos:prefLabel
Resistance Against Malicious Collectives in BubbleTrust Resistance Against Malicious Collectives in BubbleTrust
skos:notation
RIV/00216208:11320/11:10099812!RIV12-GA0-11320___
n5:predkladatel
n6:orjk%3A11320
n8:aktivita
n17:S n17:P n17:Z
n8:aktivity
P(GAP202/10/0761), P(GD201/09/H057), S, Z(MSM0021620838)
n8:dodaniDat
n14:2012
n8:domaciTvurceVysledku
n13:3100707 n13:3386821
n8:druhVysledku
n16:D
n8:duvernostUdaju
n21:S
n8:entitaPredkladatele
n18:predkladatel
n8:idSjednocenehoVysledku
226726
n8:idVysledku
RIV/00216208:11320/11:10099812
n8:jazykVysledku
n15:eng
n8:klicovaSlova
Peer-to-Peer Networks; Trust Management
n8:klicoveSlovo
n20:Peer-to-Peer%20Networks n20:Trust%20Management
n8:kontrolniKodProRIV
[CAE2D081B954]
n8:mistoKonaniAkce
Gwangju, Korea
n8:mistoVydani
Los Alamitos, USA
n8:nazevZdroje
PDCAT 2011 - 12th International Conference on Parallel and Distributed Computing
n8:obor
n23:IN
n8:pocetDomacichTvurcuVysledku
2
n8:pocetTvurcuVysledku
2
n8:projekt
n9:GAP202%2F10%2F0761 n9:GD201%2F09%2FH057
n8:rokUplatneniVysledku
n14:2011
n8:tvurceVysledku
Zavoral, Filip Novotný, Miroslav
n8:typAkce
n19:WRD
n8:zahajeniAkce
2011-10-20+02:00
n8:zamer
n12:MSM0021620838
s:numberOfPages
6
n22:hasPublisher
IEEE Computer Society
n4:isbn
978-0-7695-4564-6
n10:organizacniJednotka
11320