This HTML5 document contains 44 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n13http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n12http://localhost/temp/predkladatel/
n6http://purl.org/net/nknouf/ns/bibtex#
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n14http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n22http://linked.opendata.cz/ontology/domain/vavai/
n15https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n23http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216208%3A11320%2F14%3A10192754%21RIV15-MSM-11320___/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
n9http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n20http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n16http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216208%3A11320%2F14%3A10192754%21RIV15-MSM-11320___
rdf:type
skos:Concept n22:Vysledek
rdfs:seeAlso
http://link.springer.com/chapter/10.1007/978-3-319-05939-6_7
dcterms:description
Malicious peers in Peer-to-peer networks can develop sophisticated strategies to bypass existing security mechanisms. The effectiveness of contemporary trust management systems is usually tested only against simple malicious strategies. In this paper, we propose a simulation framework for evaluation of resistance of trust management systems against different malicious strategies. We present results of five TMS that represent main contemporary approaches; the results indicate that most of the traditional trust managements are vulnerable to sophisticated malicious strategies. Malicious peers in Peer-to-peer networks can develop sophisticated strategies to bypass existing security mechanisms. The effectiveness of contemporary trust management systems is usually tested only against simple malicious strategies. In this paper, we propose a simulation framework for evaluation of resistance of trust management systems against different malicious strategies. We present results of five TMS that represent main contemporary approaches; the results indicate that most of the traditional trust managements are vulnerable to sophisticated malicious strategies.
dcterms:title
Resistance of Trust Management Systems against Malicious Collectives Resistance of Trust Management Systems against Malicious Collectives
skos:prefLabel
Resistance of Trust Management Systems against Malicious Collectives Resistance of Trust Management Systems against Malicious Collectives
skos:notation
RIV/00216208:11320/14:10192754!RIV15-MSM-11320___
n4:aktivita
n20:P n20:I
n4:aktivity
I, P(GA13-08195S)
n4:dodaniDat
n16:2015
n4:domaciTvurceVysledku
n14:3100707 n14:3386821
n4:druhVysledku
n10:D
n4:duvernostUdaju
n17:S
n4:entitaPredkladatele
n23:predkladatel
n4:idSjednocenehoVysledku
42433
n4:idVysledku
RIV/00216208:11320/14:10192754
n4:jazykVysledku
n5:eng
n4:klicovaSlova
trust management; Peer-to-per networks
n4:klicoveSlovo
n7:Peer-to-per%20networks n7:trust%20management
n4:kontrolniKodProRIV
[A991B91F6C6F]
n4:mistoKonaniAkce
PhuQuoc
n4:mistoVydani
Heidelberg
n4:nazevZdroje
Proceedings of 2nd International Conference on Context-Aware Systems and Applications
n4:obor
n19:IN
n4:pocetDomacichTvurcuVysledku
2
n4:pocetTvurcuVysledku
2
n4:projekt
n18:GA13-08195S
n4:rokUplatneniVysledku
n16:2014
n4:tvurceVysledku
Zavoral, Filip Novotný, Miroslav
n4:typAkce
n13:WRD
n4:zahajeniAkce
2013-11-25+01:00
s:issn
1867-8211
s:numberOfPages
10
n9:doi
10.1007/978-3-319-05939-6
n6:hasPublisher
Springer-Verlag
n15:isbn
978-3-319-05938-9
n12:organizacniJednotka
11320