International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-8,Issue-5  ( May, 2020 )
Past issues
  1. Volume-8,Issue-4  ( Apr, 2020 )
  2. Volume-8,Issue-3  ( Mar, 2020 )
  3. Volume-8,Issue-2  ( Feb, 2020 )
  4. Volume-8,Issue-1  ( Jan, 2020 )
  5. Volume-7,Issue-12  ( Dec, 2019 )
  6. Volume-7,Issue-11  ( Nov, 2019 )
  7. Volume-7, Issue-10  ( Oct, 2019 )
  8. Volume-7, Issue-9  ( Sep, 2019 )
  9. Volume-7, Issue-8  ( Aug, 2019 )
  10. Volume-7, Issue-7  ( Jul, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 88
Paper Published : 1238
No. of Authors : 3111
  Journal Paper

Paper Title
UAMPP: Unauthorized Access Model For Peer–To–Peer System

Abstract
Abstract- According to the peer-to-peer (P2P) sociality, an expert-driven multi-semantic unauthorized access model for peer-to-peer semantic community model is built in this paper to introduce UAMPP to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity. No prior Information or a trusted peer is used to leverage trust establishment. Peer do not try to collect trust information from all peer, each peer develops its own local view of trust about the peers interacted in the past. In this way, good peers form dynamic trust groups in their proximity and can isolate malicious peers. Calculated trust information is not global and does not reflect options of all peer. Classifying peers as either trustworthy or untrustworthy is not sufficient in most cases. Metrics should have precision so peers can be ranked according to trustworthiness. Keywords- P2P system, UAMPP, Security


Author - Sai Divya Kalagatla, Ramana Reddy B., Mohana Roopa M.

| PDF |
Viewed - 70
| Published on 2014-12-02
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY