{"id":"https://openalex.org/W2795311942","doi":"https://doi.org/10.23919/icact.2018.8323920","title":"NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture","display_name":"NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W2795311942","doi":"https://doi.org/10.23919/icact.2018.8323920","mag":"2795311942"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2018.8323920","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323920","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100646908","display_name":"Li Shi","orcid":"https://orcid.org/0000-0002-0098-4607"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Shi Li","raw_affiliation_strings":["Computer Science and Engineering Department, Ewha Womans University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Ewha Womans University, Seoul, Korea","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025644339","display_name":"Inshil Doh","orcid":"https://orcid.org/0000-0003-2814-2070"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Inshil Doh","raw_affiliation_strings":["Computer Science and Engineering Department, Ewha Womans University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Ewha Womans University, Seoul, Korea","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030248227","display_name":"Kijoon Chae","orcid":"https://orcid.org/0000-0002-6045-5192"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kijoon Chae","raw_affiliation_strings":["Computer Science and Engineering Department, Ewha Womans University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Ewha Womans University, Seoul, Korea","institution_ids":["https://openalex.org/I138925566"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100646908"],"corresponding_institution_ids":["https://openalex.org/I138925566"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02549451,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"992","last_page":"998"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8910181522369385},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.7283607125282288},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6023087501525879},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5390770435333252},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.536323070526123},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5192877650260925},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47012579441070557},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.44861900806427},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4350014925003052},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4187563359737396},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4172281324863434},{"id":"https://openalex.org/keywords/content-delivery-network","display_name":"Content delivery network","score":0.41260966658592224},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3468644618988037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20781758427619934},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09030482172966003}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8910181522369385},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.7283607125282288},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6023087501525879},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5390770435333252},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.536323070526123},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5192877650260925},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47012579441070557},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.44861900806427},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4350014925003052},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4187563359737396},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4172281324863434},{"id":"https://openalex.org/C2778898579","wikidata":"https://www.wikidata.org/wiki/Q72588","display_name":"Content delivery network","level":3,"score":0.41260966658592224},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3468644618988037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20781758427619934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09030482172966003},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2018.8323920","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323920","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1536575595","https://openalex.org/W1560267311","https://openalex.org/W1799921276","https://openalex.org/W1967216298","https://openalex.org/W1986147097","https://openalex.org/W2093375622","https://openalex.org/W2111600644","https://openalex.org/W2118268795","https://openalex.org/W2156523427","https://openalex.org/W2598426107","https://openalex.org/W4254761308","https://openalex.org/W6631966980","https://openalex.org/W6633449523"],"related_works":["https://openalex.org/W2916013893","https://openalex.org/W2406819003","https://openalex.org/W2049283755","https://openalex.org/W2608789585","https://openalex.org/W2380484878","https://openalex.org/W2521155355","https://openalex.org/W2170496240","https://openalex.org/W2509590646","https://openalex.org/W2097156757","https://openalex.org/W2381388525"],"abstract_inverted_index":{"A":[0],"content":[1,72,83,255],"delivery":[2,12],"network":[3,8,33,43],"(CDN),":[4],"as":[5,103,260],"a":[6,40,59,104,182,187,201,221,233,243,277],"distributed":[7,32],"architecture,":[9,62,76,172],"enhances":[10],"efficient":[11,46,71,311],"of":[13,17,27,53,253,268,281,289],"content.":[14],"The":[15,266],"interconnection":[16],"different":[18,133,146,150,153,167,247,264],"CDNs":[19],"(CDNi)":[20],"further":[21],"improves":[22],"efficiency":[23],"and":[24,37,90,135,186,196,249,314],"the":[25,51,54,81,85,100,108,117,123,137,142,171,205,209,217,251,254,269,284,286,290,300,304],"experience":[26],"end":[28,77,143],"users.":[29],"As":[30],"another":[31],"with":[34,64,96,141,303],"high":[35,38,278],"availability":[36,252],"performance,":[39],"peer-to-peer":[41],"(P2P)":[42],"can":[44,79,91,111,130,224],"provide":[45],"resource":[47],"sharing.":[48],"To":[49,191],"combine":[50],"advantages":[52],"two":[55,175],"networks,":[56],"we":[57,173,198],"propose":[58,174,200],"hybrid":[60],"CDNi-P2P":[61,75],"along":[63],"trust":[65,161,176,184,189,206,212,219,228,231,240],"management":[66],"models":[67,177],"to":[68,159,178,294],"achieve":[69],"more":[70,194,310,315],"delivery.":[73],"In":[74,148],"users":[78,98,110,144,165,259,282],"obtain":[80],"requested":[82],"from":[84],"nearest":[86],"CDN":[87],"edge":[88],"server,":[89],"also":[92,199],"share":[93,136],"these":[94],"contents":[95,138],"other":[97,114],"in":[99,122,145,166,232,246,283],"same":[101],"domain":[102],"P2P":[105],"network.":[106],"After":[107],"transactions,":[109],"rate":[112],"each":[113],"based":[115],"on":[116,170,299],"reputation":[118,154,193],"evaluation":[119,155],"method":[120],"adopted":[121],"system.":[124,147],"For":[125],"some":[126],"mobile":[127,164,222,230,258],"users,":[128],"they":[129,261],"move":[131,262],"among":[132,263],"domains":[134,248],"who":[139],"have":[140],"general,":[149],"systems":[151],"adopt":[152],"standards.":[156],"This":[157],"leads":[158],"disparate":[160,239],"values":[162,241],"for":[163,204,242],"systems.":[168],"Based":[169],"solve":[179],"this":[180],"problem:":[181],"local":[183,227],"model":[185,207],"cross-domain":[188],"model.":[190],"evaluate":[192],"effectively":[195],"accurately,":[197],"search":[202,213,306],"algorithm":[203,214],"called":[208],"non-redundant":[210],"indirect":[211],"(NRIT-SA).":[215],"Using":[216],"proposed":[218,291],"models,":[220],"user":[223,245],"transform":[225],"his/her":[226],"into":[229],"new":[234],"domain.":[235],"We":[236],"thus":[237],"avoid":[238],"single":[244],"improve":[250],"possessed":[256],"by":[257],"domains.":[265],"result":[267,302],"performance":[270,313],"analysis":[271],"shows":[272,309],"that":[273],"when":[274],"there":[275],"is":[276],"connectivity":[279],"degree":[280],"system,":[285],"calculation":[287,312],"time":[288],"NRIT-SA":[292,308],"tends":[293],"be":[295],"stable.":[296],"And":[297],"depending":[298],"comparison":[301],"full":[305],"algorithm,":[307],"reliable":[316],"result.":[317]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
