{"id":"https://openalex.org/W2344674466","doi":"https://doi.org/10.1109/tdsc.2016.2530720","title":"GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks","display_name":"GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks","publication_year":2016,"publication_date":"2016-02-16","ids":{"openalex":"https://openalex.org/W2344674466","doi":"https://doi.org/10.1109/tdsc.2016.2530720","mag":"2344674466"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2530720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2530720","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101665497","display_name":"Xianfu Meng","orcid":"https://orcid.org/0000-0001-7708-8037"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianfu Meng","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100386802","display_name":"Dongxu Liu","orcid":"https://orcid.org/0000-0003-0691-4025"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongxu Liu","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101665497"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":8.3134,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.96947067,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"15","issue":"1","first_page":"54","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8252520561218262},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6994693279266357},{"id":"https://openalex.org/keywords/chord","display_name":"Chord (peer-to-peer)","score":0.5194896459579468},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5066007375717163},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.5055208206176758},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4975869953632355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4967065453529358},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.49471089243888855},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.48855361342430115},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.4608023166656494},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.45933476090431213},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4285157322883606},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4125927984714508},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14612138271331787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8252520561218262},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6994693279266357},{"id":"https://openalex.org/C194147245","wikidata":"https://www.wikidata.org/wiki/Q1076368","display_name":"Chord (peer-to-peer)","level":2,"score":0.5194896459579468},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5066007375717163},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5055208206176758},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4975869953632355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4967065453529358},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.49471089243888855},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.48855361342430115},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.4608023166656494},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.45933476090431213},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4285157322883606},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4125927984714508},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14612138271331787},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2016.2530720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2530720","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4399999976158142,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W128592171","https://openalex.org/W1494939316","https://openalex.org/W1497524430","https://openalex.org/W1512392693","https://openalex.org/W1577904929","https://openalex.org/W1624640136","https://openalex.org/W1982369977","https://openalex.org/W1984954729","https://openalex.org/W1986587573","https://openalex.org/W1999263346","https://openalex.org/W2003451045","https://openalex.org/W2004842362","https://openalex.org/W2007868971","https://openalex.org/W2015154574","https://openalex.org/W2016016107","https://openalex.org/W2022903691","https://openalex.org/W2028163311","https://openalex.org/W2036534212","https://openalex.org/W2048108814","https://openalex.org/W2053522888","https://openalex.org/W2054162824","https://openalex.org/W2079970015","https://openalex.org/W2084842627","https://openalex.org/W2085081832","https://openalex.org/W2089873708","https://openalex.org/W2111974546","https://openalex.org/W2130234299","https://openalex.org/W2156523427","https://openalex.org/W2157112940","https://openalex.org/W2158049821","https://openalex.org/W2164127405","https://openalex.org/W2181337836","https://openalex.org/W2360871791","https://openalex.org/W2366459921","https://openalex.org/W2374502701","https://openalex.org/W2526799036","https://openalex.org/W3102878109","https://openalex.org/W3151752615","https://openalex.org/W4254761308","https://openalex.org/W6659593869","https://openalex.org/W6664234633","https://openalex.org/W6727749892"],"related_works":["https://openalex.org/W2916013893","https://openalex.org/W1642027348","https://openalex.org/W3023553556","https://openalex.org/W2406819003","https://openalex.org/W2049283755","https://openalex.org/W145920803","https://openalex.org/W2380484878","https://openalex.org/W4221134324","https://openalex.org/W2170496240","https://openalex.org/W2509590646"],"abstract_inverted_index":{"More":[0],"and":[1,13,50,102,131,136,154,163,175,190],"more":[2],"users":[3],"are":[4,37,104],"attracted":[5],"by":[6,10,65,126],"P2P":[7,83],"networks":[8],"characterized":[9],"decentralization,":[11],"autonomy":[12],"anonymity.":[14],"However,":[15],"users'":[16],"unconstrained":[17],"behavior":[18],"makes":[19,117],"it":[20,97],"necessary":[21],"to":[22,89,100,107,143,150],"use":[23],"a":[24,74],"trust":[25,29,35,54,69,76],"model":[26],"when":[27],"establishing":[28],"relationships":[30,70],"between":[31],"peers.":[32],"Most":[33],"existing":[34],"models":[36],"based":[38],"on":[39,119],"recommendations,":[40],"which,":[41],"however,":[42],"suffer":[43],"from":[44],"the":[45,66,95,112,121,138],"shortcomings":[46],"of":[47,53,61,68,123,179],"slow":[48],"convergence":[49],"high":[51],"complexity":[52],"computations,":[55],"as":[56,58],"well":[57],"huge":[59],"overhead":[60,189],"network":[62,188],"traffic.":[63],"Inspired":[64],"establishment":[67],"in":[71,177],"human":[72],"society,":[73],"guarantee-based":[75],"model,":[77],"GeTrust,":[78],"is":[79,98,173],"proposed":[80],"for":[81,94,111],"Chord-based":[82],"networks.":[84],"A":[85],"service":[86,96,124,129,146],"peer":[87,116,125],"needs":[88],"choose":[90],"its":[91,145],"guarantee":[92,133],"peer(s)":[93],"going":[99],"provide,":[101],"they":[103],"both":[105],"required":[106],"pledge":[108],"reputation":[109,165],"mortgages":[110],"service.":[113],"The":[114],"request":[115],"evaluations":[118],"all":[120],"candidates":[122],"referring":[127],"their":[128,132],"reputations":[130],"peers'":[134],"reputations,":[135],"selects":[137],"one":[139],"with":[140],"highest":[141],"evaluation":[142],"be":[144],"provider.":[147],"In":[148],"order":[149],"enhance":[151],"GeTrust's":[152],"availability":[153],"prevent":[155],"malicious":[156],"behavior,":[157],"we":[158],"also":[159],"present":[160],"incentive":[161],"mechanism":[162],"anonymous":[164],"management":[166],"strategy.":[167],"Simulation":[168],"results":[169],"show":[170],"that":[171],"GeTrust":[172],"effective":[174],"efficient":[176],"terms":[178],"improving":[180],"successful":[181],"transaction":[182],"rate,":[183],"resisting":[184],"complex":[185],"attacks,":[186],"reducing":[187],"lowering":[191],"computational":[192],"complexity.":[193]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
