請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29730完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 賴飛羆(Feipei Lai) | |
| dc.contributor.author | Yu-De Chen | en |
| dc.contributor.author | 陳昱德 | zh_TW |
| dc.date.accessioned | 2021-06-13T01:16:33Z | - |
| dc.date.available | 2008-07-23 | |
| dc.date.copyright | 2007-07-23 | |
| dc.date.issued | 2007 | |
| dc.date.submitted | 2007-07-19 | |
| dc.identifier.citation | [1] Gnutella. Website: http://www.gnutella.com.
[2] SPKI / SDSI certificates. http://world.std.com/.cme/html/spki.html. [3] S. Androutsellis-Theotokis and D. Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computer Survey, 36(4):335–371, 2004. ACM Press, New York, USA. [4] R. Chen and W. Yeager. Poblano: A distributed trust model for peer-to-peer networks. Sun Microsystems. http://www.jxta.org/docs/trust.pdf. [5] I. Clarke, O. Sandberg, and B. Wiley. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000. [6] N. Daswani, H. Garcia-Molina, and B. Yang. Open problems in data-sharing peer-to-peer systems. In ICDT 2003. [7] E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02), Vienna, Austria, July 2002. [8] A. Hess, J. Holt, J. Jacobson, and K. E. Seamons. Content-triggered trust negotiation. ACM Transactions on Information and System Security (TISSEC), 7(3):428–456, August 2004. [9] A. Hess and K. E. Seamons. An access control model for dynamic client-side content. In the 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Villa Gallia, Como, Italy, June 2003. ACM. [10] M. Kaminsky, G. Savvides, D. Mazi`eres, and M. F. Kaashoek. Decentralized user authentication in a global file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03), pages 60–73, Bolton Landing, New York, October 2003. [11] S. Lee, R. Sherwood, and B. Bhattacharjee. Cooperative peer groups in nice. In Proceedings of IEEE INFOCOM 2003, San Franciso, CA, April 2003. [12] S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. D. Keromytis, and J. M. Smith. Secure and flexible global file sharing. In Proceedings of the USENIX 2003 Annual Technical Conference, pages 165–178, San Antonio, Texas, June 2003. [13] M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. In 1st International Conference on Peer-to-Peer Computing (P2P 2001), Linköping, Sweden, Auguest 2001. [14] R. L. Rivest and B. Lampson. SDSI: A simple distributed security infrastructure. http://theory.lcs.mit.edu/.cis/sdsi.html. [15] T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In Proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden. [16] R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pages 147–158, Stockholm, Sweden, 2005. ACM Press. [17] Y. Wang and J. Vassileva. Trust and reputation model in peer-to-peer networks. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), Linköping, Sweden, September 2003. [18] P. R. Zimmermann. The Official PGP User’s Guide. MIT Press, 1995. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29730 | - |
| dc.description.abstract | 同儕計算(Peer-to-Peer,P2P)是一種通訊模式,在P2P系統中的使用者,每個人擁有相同的能力而且通訊中的任一方都可以初始化建立溝通橋樑,和它對比的模式包含了主從架構。目前P2P檔案分享已經成為了主要的P2P應用,它讓使用者們能夠互相合作地、搜尋、取得檔案。雖然P2P檔案分享系統能有效且穩定的提供可調整和自我組織的檔案服務,但是也因為它天生的分散性,使得在控制分享檔案的散佈這方面困難重重。在本論文裡,建議了一種分散式控制系統,能對符合檔案限制的使用者,限制他們的檔案分享。擁有檔案的使用者有責任去判斷要求檔案者的資格,且評估結果然後包進憑證裡,憑證由擁有檔案的使用者簽章然後交換。擁有憑證的使用者證明他符合資格 。 | zh_TW |
| dc.description.abstract | Peer-to-peer (P2P) is a communications model in which each party has the same capabilities and either party can initiate a communication session. Other models with which it might be contrasted include the client/server model and the master/slave model. P2P file sharing has been a major P2P application, and enables peers to distribute, search, and retrieve files collaboratively. Although P2P file sharing systems offer scalable and self-organized file services with wide availability and good stability, but the decentralized nature make them inherently difficult to control the distribution of shared files. In this thesis, a distribution control system is proposed to restrict the sharing of files to the peers who qualified the constraints associated with the files. Peers are responsible to gauge requesting peers’ qualifications for the files they are holding, and evaluation results are encapsulated in credentials signed and exchanged in the process. Credentials are collected and presented by peers as evidence of qualifications. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-13T01:16:33Z (GMT). No. of bitstreams: 1 ntu-96-R93922113-1.pdf: 404172 bytes, checksum: eebb7509c86cc458499ec1d0b1aab5f8 (MD5) Previous issue date: 2007 | en |
| dc.description.tableofcontents | Chapter 1 .......................................1
Introduction....................................1 1.1 peer-to-peer..............................1 1.2 P2P file sharing..........................3 1.3 Distribution control of P2P file sharing..4 1.4 Related Work..............................5 1.5 Organization..............................6 Chapter 2 .......................................7 Overview........................................7 2.1 Motivation................................7 2.2 Terminology...............................8 2.2.1 Hash function........................13 2.2.2 Digital signature schemes............14 2.3 Architecture..............................18 2.3.1 P2PNS................................20 2.3.2 P2PFS................................20 2.3.3 PTS..................................20 2.3.4 CS...................................22 Chapter 3 .......................................23 Distribution Control.............................23 3.1 Distribution Control Protocol..............23 3.1.1 Setup.................................23 3.1.2 Credential exchange...................24 3.1.3 File transmission.....................26 3.2 Distributor Verification................26 3.3 Requester Evaluation.......................29 Chapter 4 ........................................34 Credential Management............................34 4.1 Online Credential Gathering................34 4.2 Credential Graph Compression...............35 Chapter 5 ........................................37 Conclusion.......................................37 Bibliography:....................................38 | |
| dc.language.iso | zh-TW | |
| dc.subject | 憑證 | zh_TW |
| dc.subject | 同儕計算 | zh_TW |
| dc.subject | 主從架構 | zh_TW |
| dc.subject | 檔案分享 | zh_TW |
| dc.subject | 分散式控制 | zh_TW |
| dc.subject | distribution control | en |
| dc.subject | credential | en |
| dc.subject | peer-to-peer | en |
| dc.subject | client/server | en |
| dc.subject | file sharing | en |
| dc.title | 對等檔案分享系統的分散式控制 | zh_TW |
| dc.title | Distribution Control for Peer-to-Peer File Sharing Systems | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 95-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 李鴻璋,尚榮基,許孟超 | |
| dc.subject.keyword | 同儕計算,主從架構,檔案分享,分散式控制,憑證, | zh_TW |
| dc.subject.keyword | peer-to-peer,client/server,file sharing,distribution control,credential, | en |
| dc.relation.page | 39 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2007-07-19 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-96-1.pdf 未授權公開取用 | 394.7 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
