Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
%0 Journal Article
%1 noauthororeditor
%A Shree1, S. Udhaya
%A and Dr. M. S. Saleem Basha2,
%D 2014
%J International Journal on Web Service Computing (IJWSC)
%K and security service services web
%N No.3
%R 10.5121/ijwsc.2014.5301
%T AN EXAUSTIVE SURVEY OF TRUST
MODELS IN P2P NETWORK
%V Vol.5
%X Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
@article{noauthororeditor,
abstract = {Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,},
added-at = {2022-03-17T06:34:35.000+0100},
author = {Shree1, S. Udhaya and and Dr. M. S. Saleem Basha2},
biburl = {https://www.bibsonomy.org/bibtex/282fb282c8b60e572abc2c0207e1b5d0d/ijwsc},
doi = {10.5121/ijwsc.2014.5301},
interhash = {8c35ee8d5c0f7a38328ac090d7489f42},
intrahash = {82fb282c8b60e572abc2c0207e1b5d0d},
journal = {International Journal on Web Service Computing (IJWSC)},
keywords = {and security service services web},
language = {english},
number = {No.3},
timestamp = {2022-03-17T06:34:35.000+0100},
title = {AN EXAUSTIVE SURVEY OF TRUST
MODELS IN P2P NETWORK},
volume = {Vol.5},
year = 2014
}