期刊文献+

对基于可信计算的网格行为信任模型的量化评估方法研究 被引量:5

Quantitative Assignment of the Grid Behavior Trust Model Based on Trusted Computing
原文传递
导出
摘要 针对基于可信计算的网格行为信任模型,运用波动信息能量变换给出了根据实体的交互经验和交互时间计算历史信任值和直接信任值的方法;用Hausdorff距离构造了函数相关程度的算法,进而给出了自我信任值的计算方法。通过采用门限值作为平均值、自我信任值为偏差量的正态分布函数构造了推荐信任值的更新函数,给出了域间评估流程图,并用一个有2 000个实体的区域网格进行域内数据更新实验。分析结果说明了各评估算法的合理性和有效性。 For the quantitative assignment of the grid behaviors trust model based on trusted computing,it gives an algorithm of calculating the direct trust values and the history trust values from interactive experience and interactive time using fluctuation energy conversion,makes a function correlation algorithm using hausdorff function,and in turn gives a method of calculating the self-confidence value,makes an update function using a normal distribution function with the threshold as average value and self-confidence value as deviation,gives the inter-domain evaluation process,finally shows the reasonableness and effectiveness of the assessment method by running the update process and analysising the result of the data of a regional grid with 2 000 entities.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2010年第5期587-590,共4页 Geomatics and Information Science of Wuhan University
基金 国家985工程信息平台建设资助项目(0X0007) 福建省自然科学基金资助项目(2009J01304)
关键词 网格 行为信任 可信计算 量化评估 直接信任值 更新函数 grid behavior trust trusted computing quantitative assessment direct trust value update function
  • 相关文献

参考文献21

  • 1Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure[M]. San Fransisco, CA: Morgan Kaufmann, 1999.
  • 2Azzedin F, Maheswaran M. Evolving and Managing Trust in Grid Computing Systems[C]. IEEE Canadian Conference on Electrical Computer Engineering, Winnipeg, Canada, 2002.
  • 3Novotny J, Tuecke S, Welch V. An Online Credential Repository for the Grid: MyProxy[OL]. http: // www. globus, org/alliance/publications/papers/ myproxy, pdf, 2001.
  • 4刘鹏.我国网格研究现状[OL].http://Chinagrid.net/grid/paperptlour CONUTRY.pdf,2006.
  • 5蒋大保.网格环境下的安全技术研究[D].北京:中国科学院高能物理所,2002.
  • 6Jianc C, Wang C, Liu X, et al . A Survey of Job Schedu 2 Ling in Grids[C]. The 9th Internalional Asia2 Pacific Web Conference (APWeb2007), Ber lin, Germany,2007.
  • 7Abwajyj H. Fauh2tolerant Scheduling Policy for Grid Computing Systems [C].The 18th IEEE Inter national Parallel and Dist ributed Processing Symposium. Los Alamitos ,Cal, USA, 2004.
  • 8刘玉龙,曹元大,李剑.一种新型推荐信任模型[J].计算机工程与应用,2004,40(29):47-49. 被引量:15
  • 9王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 10王东安,徐浩,南凯,阎保平.基于推荐的网格计算的信任模型[J].计算机应用研究,2006,23(2):96-98. 被引量:12

二级参考文献73

  • 1王莉苹,杨寿保.网格环境中的一种信任模型[J].计算机工程与应用,2004,40(23):50-53. 被引量:32
  • 2干志勤,曾国荪.网格环境下的基于行为的信任评估模型[J].计算机应用与软件,2005,22(2):62-64. 被引量:14
  • 3M Blaze,J Feigenbaum,J Lacy.Decentralized Trust Management[C].In:Proceedings of the IEEE Symposium on Security and Privacy,1996
  • 4A Abdul-Rahman,S Hailes.Supporting trust in virtual communities[C].In:Hawaii Int'l Conference on System Sciences,2000
  • 5Bin Yu,Munindar P Singh.A Social Mechanism of Reputation Management in Electronic Communities[C].In:Proceedings of the 4th International Workshop on Cooperative Information Agents,2000:154~165
  • 6Bin Yu,Munindar P Singh.An Evidential Model of Distributed Reputation Management[C].In:Proceedings of the 1st International Joint Conference on Autonomous Agents and MultiAgent Systems(AAMAS),2002-06
  • 7Farag Azzedin,Muthucumaru Maheswaran.Integrating Trust into Grid Resource Management Systems[C].In:Proceedings of the International Conference on Parallel Processing,2002
  • 8Farag Azzedin,Muthucumaru Maheswaran.Evolving and Managing Trust in Grid Computing Systems[C].In:Proceedings of the IEEE Canadian Conference on Electrical&Computer Engineering,2002
  • 9Farag Azzedin,Muthucumaru Maheswaran.Towards Trust-Aware Resource Management in Grid Computing Systems[C].In:Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid,2002
  • 10I Foster,C Kesselman,S Tuecke.The anatomy of the Grid:Enabling scalable virtual organizations[C].In:Int;l Journal on Supercomputer Applications,2001

共引文献82

同被引文献41

  • 1陈建刚,王汝传,王海艳.网格资源访问的一种主观信任机制[J].电子学报,2006,34(5):817-821. 被引量:14
  • 2桂劲松,陈志刚,邓晓衡,刘安丰.基于D-S证据理论的网格服务行为信任模型[J].计算机工程与应用,2007,43(2):25-28. 被引量:8
  • 3Microsoft company network working group. Extensible Authentication Protocol (EAP) Key Management Framework [EB/OL]. [2012-04-01]. http://technet.microsofl.com/zh-cn/ library/cc268397.
  • 4Rand M, Kenton G, Michael N, et al. Microsoft Exchange Server 2003 Unleashed [M]. Chittagong: SAMS Press, 2003: 7-13.
  • 5Federal Financial Institutions Examination Council. Authentication in an internet banking environment, information technology examination handbook [EB/OL]. [2012-04-01]. http: //www.Jfiec.gov Authentication/.
  • 6Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems [C]//Proceedings of the IEEE Canadian Conference on Electrical Computer Engineering, Vancouver: IEEE Press, 2002:171-178.
  • 7The Globus Security Team. Globus toolkit version 4 grid security infrastructure: A standards perspective [EB/OL]. [2012-04-01 ]. http://globus.org/toolkit/docs/4.0/security/GT4-GSI- Overview.pdf .
  • 8Novotny J, Tuecke S, Welch V. An online credential repository for the grid: MyProxy [EB/OL]. [2012-04-01]. http:// www. globus. org/alliance/pub lications/myproxy.pdf.
  • 9Trust Computing Group. TCG main specification Version 1.1b [EB/OL]. [2012-04-02]. http://wwww.trustedcomputinggroup. org/home.
  • 10Abwajyj H. Fault tolerant scheduling policy for grid computing systems [C]//Proceedings of the 18th IEEE International Parallel and Dist Ributed Processing Symposium. Los Alamitos: IEEE Computer Society Press, 2004: 238-244.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部