期刊文献+

一个用于多个实体信任度评估的模糊数学模型 被引量:2

A Fuzzy Mathematical Model for Trust Evaluation to More Entities
在线阅读 下载PDF
导出
摘要 以信任度评价指标的可用性、可靠性、完整性、安全防护性、可维护性、以及机密性等6个因素为出发点,建立信任评价指标体系.在此基础上,考虑到信任的主观性及主体对客体评价、判断所具有的模糊性,选用模糊综合评价方法,建立一种与数字系统信任管理相关的,可用于多个实体信任度评估的数学模型.对3个样本实体的信任状况进行实证研究,结果可为数字系统的信任管理提供依据. Taking six factors, such as availability, reliability, integrity, safety, maintainability and confidentiality as the starting point of trust evaluation index, a trust assessment index system is built up. Base on this and considering the subjectivity of trust and fuzziness of opinion and estimation for subject to object, a fuzzy synthetic evaluation method is selected and a mathematical model associated trust management of digital system and used in more entities is established. The process of evaluation using the model is demonstrated for three examples. The result of evaluation can provide gist for trust management of digital systems.
出处 《华侨大学学报(自然科学版)》 CAS 北大核心 2009年第6期637-641,共5页 Journal of Huaqiao University(Natural Science)
基金 国家重点基础研究发展计划(973项目)资助(2007CB310704)
关键词 信任管理 信任度评估 模糊综合评价 模糊数学 trust management trust evaluation fuzzy synthetic evaluation fuzzy mathematics
  • 相关文献

参考文献12

  • 1BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the 1996 IEEE Sympo sium on Security and Privacy. New York: IEEE Computer Society Press, 1996 :164-173.
  • 2BLAZE M, FEIGENBAUM J, IOANNIDIS J, ed al. RFC 2704 : The KeyNote Trust Management System Version 2 [EB/OL]. [2005-02-16]. http://www, cnpaf, net/Class/Rfcen/200502/3756 2. html.
  • 3JOSANG A,KNAP SKOG S J. A metric for trusted systems: Global IT security[M]. Wien: Austrian Computer Society, 1998: 541-549.
  • 4JOSANG A. Trust-based decision making for electronic transactions[C]//YNGSTROM L, et al. Proc of the 4th Nordic Workshop on Secure Computer Systems. Kista: Stockholm University Press, 1999:1-21.
  • 5JOSANG A. The right type of trust for distributed systems[C]//Meadows C. Proceedings of the New Security Paradigns Workshop. Lake Arrowhead: ACM Press, 1996 : 119-132.
  • 6JOSANG A. A model for trust in security systems[C]//Proceedings of 2nd Nordic Workshop on Secure Computer System Systems. Philadelphia: ACM Press, 1997.
  • 7JOSANG A. A subjective metric of authentication[C]//Quisquater J. Proceedings of the ESORICE' 98. Brighton: Springer-Verlag, 1998: 329-344.
  • 8BETH T, BORCHERDING M, KLEIN B Valuation of trust in open network[C]//Gellman D. Proceedings of Euro- pean Symposium on Research in Security. Brighton: Springer-Verlag, 1994:3-18.
  • 9唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 10袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17

二级参考文献33

共引文献611

同被引文献46

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部