2012
DOI: 10.1007/978-3-642-25959-3_26
|View full text |Cite
|
Sign up to set email alerts
|

iTrust: Trustworthy Information Publication, Search and Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…In addition, we plan to investigate the time to reach a certain number of nodes, given a particular probability density function for the time that a node takes to forward messages. We also plan to apply the results of this probabilistic analysis of message forwarding to our existing iTrust information publication, search and retrieval network [26].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, we plan to investigate the time to reach a certain number of nodes, given a particular probability density function for the time that a node takes to forward messages. We also plan to apply the results of this probabilistic analysis of message forwarding to our existing iTrust information publication, search and retrieval network [26].…”
Section: Discussionmentioning
confidence: 99%
“…Forwarding has been applied to replication and data consistency [9], failure detection [30], and buffer management and message filtering [12]. Forwarding has also been applied to data aggregation [22] and decentralized search [26]. In each of these cases, messages are communicated to multiple nodes in the network.…”
Section: Introductionmentioning
confidence: 99%
“…The drawbacks come from the fact that Gossiping based search methods are more concentrated on the load balanced query/information dissemination and they do not provide approaches in other aspects, such as the way to route queries, or mechanisms to match a query to a resource description. The works in [229,[255][256][257][258] are some examples of gossip based resource discovery protocols.…”
Section: Gossiping-based Approachesmentioning
confidence: 99%
“…iTrust is just such a system. iTrust is designed to impede attempts to censor or filter information accessed over the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…I had previously described the design of iTrust, which is a novel information distribution and retrieval system without centralized mechanisms and no centralized control in . In , I presented basic guiding principles of iTrust, the basic design of iTrust, the implementation of iTrust, the iTrust user interface, and the performance evaluation of iTrust. In addition, I also demonstrated that the probability of matching a query is high, even if some of the participating nodes are subverted or non‐operational.…”
Section: Introductionmentioning
confidence: 99%