期刊文献+

分布网络环境主观信任模型研究 被引量:19

Subjective Trust Model in Distributed Network
在线阅读 下载PDF
导出
摘要 研究分布网络环境中主观信任评价和信任合成方法,分析信任的含义和影响信任行为的因素以及信任与信任属性的关系,提出相对经验的定义.基于二项事件后验概率服从Beta分布的特性,提出了基于相对经验和Beta分布的信任评价模型,给出了推荐信任合成方法,建立信任更新协议解决恶意推荐的问题. <Abstrcat> To solve the complex and dynamic trust relationships in distributed network, subjective trust model is proposed. Trust quantification and propagation methods are investigated. The meaning of subjective trust and the factors influencing trust behavior are discussed. The relationship of trust and trust attributes is investigated. A definition of relative experiment is presented. Based on the definition and Beta distribution, a novel subject trust model is proposed, and an algorithm to combine recommendation trust is illustrated. The trust updating protocol is presented to adjust trust relationship.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2005年第6期504-508,共5页 Transactions of Beijing Institute of Technology
关键词 分布式网络 主观信任 信任模型 信任更新协议 distributed network subjective trust trust model trust updating protocol
  • 相关文献

参考文献11

  • 1Beth T, Borcherding M, Klein B. Valuation of trust in open networks [A]. Proceedings of the European Symposium on Research in Security [C]. Brighton:Springer-Verglag, 1999. 59-63.
  • 2Abdul A, Hailes S. A distributed trust model [A].Proceedings of the 1997 New Security Paradigms Workshop[C]. Cumbria, UK: ACM Press, 1998. 48-60.
  • 3Josang A. Modelling trust in information security[D]. Trondheim, Norway: Norwegian University of Science and Technology, 1998.
  • 4Josang A. A subjective metric of authentication[A].Proceedings of the European Symposium on Research in Security '98 [C]. Louvainla-Neuve: Springer Verlatt, 1998. 329-344.
  • 5Lik M, Mojdeh M, Ari H. A computational mode of trust and reputation [Z]. The 35th Hawaii International Conference on System Sciences, Hawaii,2002.
  • 6Xiong Li, Liu Ling. A reputation based trust model for peer-to-peer e-commerce communities[A].Proceedings of the IEEE International Conference on E-Commerce[C]. Newport Beach: Computer Society,2003. 275-284.
  • 7唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 8Zand D. Trust and managerial problem solving [J].Administrative Science Quarterly, 1972,17: 229-239.
  • 9徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 10Yu Bin, Munindar P. Detecting deception in reputation management [A]. Proceedings of Second International Joint Conference on Autonomous Agents and Multi-Agent Systems [C]. Melbourne,Australia: ACM Press, 2003.73-80.

二级参考文献21

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139.
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf.

共引文献334

同被引文献199

引证文献19

二级引证文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部