期刊文献+
共找到3,144篇文章
< 1 2 158 >
每页显示 20 50 100
TrustZone半虚拟化与容器化实现机制
1
作者 余发江 王朝州 《信息网络安全》 北大核心 2025年第10期1523-1536,共14页
TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种Tr... TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种TrustZone半虚拟化与容器化实现机制pvTEE,使虚拟机或容器中的客户能够高效、并行利用主机平台的可信执行环境运行可信应用。pvTEE通过前端驱动vTEEdriver、虚拟设备vTEE、主机代理程序vTEEproxy以及后端驱动TEEdriver,将虚拟机或容器内客户的调用请求转发至可信执行环境中的可信应用执行。主机、虚拟机和容器中的客户仅可调用自身场景的可信应用,无法访问其他应用。同时,主机、虚拟机及容器各自有独立的日志获取能力与安全存储服务。pvTEE基于ARMv8.2 CPU服务器、QEMU KVM虚拟机和Docker容器实现,实验结果表明,客户在虚拟机中调用可信应用完成一次RSA加解密操作,相比在主机场景中仅增加约6%的时间开销。 展开更多
关键词 TRUSTZONE 可信执行环境 虚拟化 容器化 云服务
在线阅读 下载PDF
A multi-dimensional trust attestation solution in 5G-IoT
2
作者 Xiangrong Li Yu Zhang +2 位作者 Haotian Zhu Yubo Wang Junjia Huang 《Digital Communications and Networks》 2025年第1期225-233,共9页
The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important... The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important to IoT security.5G-IoT with its low latency,wide connectivity and high-speed transmission extends the business scenarios of IoT,yet it also brings new challenges to trust proof solutions of IoT.Currently,there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes,while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios.In order to solve the above problems,this paper proposes an adaptive multi-dimensional trust proof solution.Firstly,the static and dynamic attributes of sensing nodes are metricized,and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes,and a multi-dimensional fine-grained trusted metric model is established in this paper.Then,based on the comprehensive metrics,the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes.At the same time,the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency.Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes,while having a small impact on the latency of the 5G network. 展开更多
关键词 5G-IoT Trusted metrics Trust model
在线阅读 下载PDF
基于TrustZone的以太坊密钥保护方法
3
作者 任正伟 虞雳 +4 位作者 王丽娜 贺广鑫 徐士伟 童言 邓莉 《武汉大学学报(理学版)》 北大核心 2025年第2期187-198,共12页
在以太坊中,用户数字资产的安全性与其私钥紧密相关,一旦私钥泄漏,用户将面临无法挽回的数字资产损失。加密货币钱包常被用于管理和保护区块链系统的密钥。但是,现有的加密货币钱包安全性不高。为了更好地保护以太坊用户的数字资产,在... 在以太坊中,用户数字资产的安全性与其私钥紧密相关,一旦私钥泄漏,用户将面临无法挽回的数字资产损失。加密货币钱包常被用于管理和保护区块链系统的密钥。但是,现有的加密货币钱包安全性不高。为了更好地保护以太坊用户的数字资产,在不影响以太坊系统正常功能的情况下,提出了一种基于TrustZone的以太坊密钥保护方法,以在用户通过支持TrustZone的移动终端接入和使用以太坊系统时,提高用户密钥在生成、存储和使用过程中的安全性。在该方法中,与私钥相关的操作都是在TrustZone的安全世界中进行的。私钥未被使用时,将以安全文件的形式被保存在本地文件系统中。当有交易需要被签名时,将存有对应私钥的安全文件加载到安全世界中,并恢复出私钥以对交易签名,从而使得私钥可以安全而持续地被使用。在模拟环境下实现了该方法的原型系统,并对系统的功能和性能进行了验证和测试。实验结果表明,本文的原型系统在以太坊系统中能够正常运行,性能开销在合理范围内,具有可行性。 展开更多
关键词 以太坊 加密货币钱包 密钥保护 TRUSTZONE 安全文件
原文传递
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
4
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
在线阅读 下载PDF
Formal Compatibility Model for Trusted Computing Applications 被引量:2
5
作者 ZHU Lu YU Sheng +1 位作者 ZHANG Xing SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2009年第5期388-392,共5页
The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG sp... The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG specifications cannot directly function on platforms complying with Chinese specifications because the two cryptography schemes are not compatible with each other. In order to transplant those applications with little to no modification, the paper presents a formal compatibility model based on Zaremski and Wing's type system. Our model is concerned not only on the syntactic compatibility for data type, but also on the semantic compatibility for cryptographic attributes according to the feature of trusted computing. A compatibility algorithm is proposed based on the model to generate adapters for trusted computing applications. 展开更多
关键词 trusted computing compatibility trusted cryptography module (TCM) TCM service module (TSM)
原文传递
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology 被引量:2
6
作者 CHEN Lu ZHANG Huanguo +2 位作者 ZHANG Liqiang LI Song CAI Liang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期523-527,共5页
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform. 展开更多
关键词 resource sharing trusted computing VIRTUALIZATION UCON (usage control) chain of trust
在线阅读 下载PDF
A Trusted Environment Construction Method for Security-Sensitive Software
7
作者 LI Jing ZHANG Huanguo +1 位作者 ZHAO Bo FANG Lingling 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期383-390,共8页
This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in t... This paper presents a trusted-environment construction method based on the underlying hardware.This method aims at protecting the security-sensitive software in the aspects of software loading,running,and storing in the general operating system.It extends the trust chain of the traditional trusted computing technology to reach the target software,ensuring trusted loading.The extended memory management mechanism effectively pre-vents memory dumping and memory tampering for the high-sensitivity data.The file monitoring mechanism protects files from vicious operation made by attackers.Flexible-expanded storage environment provides the target software with static storing protection.Experimental system verifies that the method is suitable for general operating system and can effectively protect security-sensitive software with low overhead. 展开更多
关键词 information security trusted computing securitysensitive software trusted environment
原文传递
一种TrustZone架构下的密钥管理机制 被引量:2
8
作者 崔晓煜 赵波 +1 位作者 樊佩茹 肖钰 《山东大学学报(理学版)》 CAS CSCD 北大核心 2017年第6期92-98,共7页
针对嵌入式设备上用户隐私数据缺乏加密保护问题,提出一种TrustZone架构下的密钥管理机制。结合PUF技术与用户PIN码生成与设备、用户双关联的用户密钥,保护用户隐私数据的机密性和完整性;同时设计了一种适用于公用嵌入式设备的多用户数... 针对嵌入式设备上用户隐私数据缺乏加密保护问题,提出一种TrustZone架构下的密钥管理机制。结合PUF技术与用户PIN码生成与设备、用户双关联的用户密钥,保护用户隐私数据的机密性和完整性;同时设计了一种适用于公用嵌入式设备的多用户数据保护场景,提供多用户密钥的生成、存储、更新和销毁方法。最后,描述了基于TrustZone密钥管理模块的实现方法,并进行安全性分析与效率测试,实验表明,该机制具有很好的安全性和密钥管理效率。 展开更多
关键词 TRUSTZONE 隐私数据 PUF 密钥管理
原文传递
TrustZone架构下基于RPMB的隐私数据保护方法 被引量:3
9
作者 喻潇 田里 +1 位作者 刘喆 王捷 《计算机应用》 CSCD 北大核心 2018年第A02期164-169,共6页
针对当前移动终端中缺乏有效隐私数据保护方案的问题,利用RPMB分区提出了一种隐私数据保护方法。该方法对隐私数据进行加密保护,并且通过认证密钥以及写计数、随机数等机制实现对数据的认证读和认证写操作。首先,因为TrustZone架构在移... 针对当前移动终端中缺乏有效隐私数据保护方案的问题,利用RPMB分区提出了一种隐私数据保护方法。该方法对隐私数据进行加密保护,并且通过认证密钥以及写计数、随机数等机制实现对数据的认证读和认证写操作。首先,因为TrustZone架构在移动终端得到广泛支持,选取TrustZone架构作为RPMB分区载体;然后,基于TrustZone和RPMB两者在安全世界中添加支持模块;再次,通过认证密钥以及写计数、随机数等组件实现对数据的认证读和认证写操作;最后,搭建实验平台对环境作出仿真,同时模拟攻击测试。实验结果表明,该方法对读写操作的重放攻击有较好的防御功能。 展开更多
关键词 隐私数据保护 RPMB分区 TRUSTZONE eMMC存储 认证
在线阅读 下载PDF
Survey on Key Technology Development and Application in Trusted Computing 被引量:7
10
作者 Juan Wang Yuan Shi +5 位作者 Guojun Peng Huanguo Zhang Bo Zhao Fei Yan Fajiang Yu Liqiang Zhang 《China Communications》 SCIE CSCD 2016年第11期70-90,共21页
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi... Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future. 展开更多
关键词 cyberspace security information security information system security CRYPTOGRAPHY trusted computing
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
11
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment VIRTUALIZATION mobile platform
原文传递
Temporal Dynamics in Social Trust Prediction 被引量:1
12
作者 CAI Guoyong LV Rui +1 位作者 TANG Jiliang LIU Huan 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期369-378,共10页
Inferring unknown social trust relations attracts increasing attention in recent years. However, social trust, as a social concept, is intrinsically dynamic, and exploiting temporal dynamics provides challenges and op... Inferring unknown social trust relations attracts increasing attention in recent years. However, social trust, as a social concept, is intrinsically dynamic, and exploiting temporal dynamics provides challenges and opportunities for social trust prediction. In this paper, we investigate social trust prediction by exploiting temporal dynamics. In particular, we model the dynamics of user preferences in two principled ways. The first one focuses on temporal weight; the second one targets temporal smoothness. By incorporating these two types of temporal dynamics into traditional matrix factorization based social trust prediction model, two extended social trust prediction models are proposed and the cor- responding algorithms to solve the models are designed too. We conduct experiments on a real-world dataset and the results dem- onstrate the effectiveness of our proposed new models. Further experiments are also conducted to understand the importance of temporal dynamics in social trust prediction. 展开更多
关键词 trust prediction temporal dynamics social network
原文传递
A Trustworthiness-Based Distribution Model for Data Leakage Prevention 被引量:1
13
作者 YIN Fan WANG Yu +1 位作者 WANG Lina YU Rongwei 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期205-209,共5页
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor cal... Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution model that aims at data leakage prevention (DLP). In our model, first, the distributor calculates the user's trustworthiness based on his historical behaviors; second, according to the user's trustworthiness and his obtained file set overlapping leaked file set, the distributor accesses the probability of the user's intentional leak behavior as the subjective risk assessment; third, the distributor evaluates the user's platform vulnerability as an objective element; last, the distributor makes decisions whether to distribute the file based on the integrated risk assessment. The experiments indicate that the model can distinguish users of different types and make the probability of malicious users' requirements being denied much higher than that of honest users' requirements being denied, so that the model is capable of preventing data leakage validly. 展开更多
关键词 distribution model trustworthiness data leakage prevention (DLP)
原文传递
Static Analysis-Based Behavior Model Building for Trusted Computing Dynamic Verification
14
作者 YU Fajiang YU Yue 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期195-200,共6页
Current trusted computing platform only verifies application's static Hash value, it could not prevent application from being dynamic attacked. This paper gives one static analysis-based behavior model building metho... Current trusted computing platform only verifies application's static Hash value, it could not prevent application from being dynamic attacked. This paper gives one static analysis-based behavior model building method for trusted computing dynamic verification, including control flow graph (CFG) building, finite state automata (FSA) constructing, e run cycle removing, e transition removing, deterministic finite state (DFA) constructing, trivial FSA removing, and global push down automata (PDA) constructing. According to experiment, this model built is a reduced model for dynamic verification and covers all possible paths, because it is based on binary file static analysis. 展开更多
关键词 trusted computing dynamic verification behavior model finite-state automata (FSA) push down automata (PDA)
原文传递
TVIDS: Trusted Virtual IDS With SGX
15
作者 Juan Wang Shirong Hao +5 位作者 Yi Li Zhi Hong Fei Yan Bo Zhao Jing Ma Huanguo Zhang 《China Communications》 SCIE CSCD 2019年第10期133-150,共18页
Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc... Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reducing equipment costs and operational cost. However, virtual intrusion detection systems (VIDS) face more serious security threats due to running in a shared and virtualized environment instead of proprietary devices. Cloud service providers or malicious tenants may illegally access and tamper with the policies, packet information, and internal processing states of intrusion detection systems, thereby violating the privacy and security of tenant’s networks. To address these challenges, we use Intel Software Guard Extensions (SGX) to build a Trusted Virtual Intrusion Detection System (TVIDS). For TVIDS, to prevent cloud service providers from accessing sensitive information about the users’ network, we build a trusted execution environment for security policy, packets processing, and internal state so that cloud service providers and other malicious tenants can’t access the protected code, policy, processing states, and packets information of the intrusion detection system. We implemented TVIDS on the basis of the Snort which is a famous open-source IDS and evaluated its results on real SGX hardware.The results show that our method can protect the security of the virtual IDS and brings acceptable performance overhead. 展开更多
关键词 network function VIRTUALIZATION INTRUSION detection system SGX TRUSTED EXECUTION environment
在线阅读 下载PDF
CipherTrust为企业信息系统带来强大的安全防护能力
16
《信息安全与通信保密》 2006年第5期35-36,共2页
关键词 企业信息系统 安全防护能力 Trust公司 垃圾邮件 信息安全 间谍软件 网关设备 安全邮件 行为分析 MAIL
原文传递
Trust in AI:How to build global confidence
17
作者 Heather West Wan Sie Lee +1 位作者 Wael Diab Cao Xinxin 《China Standardization》 2024年第6期59-62,共4页
During the ISO Annual Meeting,the session themed on“Trust in AI:How to build global confidence”was held on September 10.Wael Diab,Chair of ISO/IEC JTC 1/SC 42 on AI,Heather West,Senior Director of Cybersecurity&... During the ISO Annual Meeting,the session themed on“Trust in AI:How to build global confidence”was held on September 10.Wael Diab,Chair of ISO/IEC JTC 1/SC 42 on AI,Heather West,Senior Director of Cybersecurity&Privacy Services at U.S.based law firm Venable and coordinator of the alliance for trust in AI,and Wan Sie Lee,Director of Trusted AI&Data at Singapore's Infocomm Media Development Authority(IMDA)were invited as vips to discuss how to prevent potential risks brought by the rapid development of AI technologies,and how standards can play a crucial role in the process to build global confidence on AI.The meeting took place in hybrid forms,attracting participants from all over the world both on site and online. 展开更多
关键词 AUTHORITY DIRECTOR attracting
原文传递
Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges 被引量:1
18
作者 Yang Cao Shiva Raj Pokhrel +2 位作者 Ye Zhu Robin Doss Gang Li 《Machine Intelligence Research》 EI CSCD 2024年第2期294-317,共24页
Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security fie... Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security field.It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system.However,ZTA automation and orchestration,towards seamless deployment on real-world networks,has been limited to be reviewed in the existing literature.In this paper,we first identify the bottlenecks,discuss the background of ZTA and compare it with traditional perimeter-based security architectures.More importantly,we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ZTA.Overall,in this review paper,we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA. 展开更多
关键词 Zero trust architecture cyber security artificial intelligence access control AUTHENTICATION
原文传递
Trust Assessment Under the Integrated Air-Space-Ground Network Environment 被引量:1
19
作者 Zhe Liu Yinghao Yuan +1 位作者 Bo Zhao Xiaoyan Peng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第2期405-420,共16页
While playing an increasing role in the field of air-space integrated networks,terminal entities are exposed to more serious security risks than ordinary terminal entities on the ground,including but not limited to as... While playing an increasing role in the field of air-space integrated networks,terminal entities are exposed to more serious security risks than ordinary terminal entities on the ground,including but not limited to astronomical risks(e.g.,solar activity),link disruptions,and malicious attacks.In the integrated air-space-space network,after the terminal entity is loaded into the rocket for launch,real-time monitoring measures are implemented on the ground site for all links to the intended orbit.On top of the real-time monitoring measures,the need for a comprehensive evaluation of the air-space integration network is growing.In this paper,we further classify the security requirements and evaluation benchmarks of the terminal entities of the air-space integration network around the security evaluation requirements of the air-space integration network.On this basis,the relevant concept of trust value is introduced to assess the security status of terminal entities of air-space-sky integrated networks,and on this basis,a security assessment system of air-space-sky integrated network terminals is proposed.The exploration and development of field applications are initially realized. 展开更多
关键词 air-space-ground integrated network terminal security trust elements sensitivity real-time judgment
原文传递
Building trust networks in the absence of trust relations 被引量:2
20
作者 Xin WANG Ying WANG Jian-hua GUO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第10期1591-1600,共10页
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platfo... User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platforms.These issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks. 展开更多
关键词 Trust network Sparse learning Homophily effect Interaction behaviors
原文传递
上一页 1 2 158 下一页 到第
使用帮助 返回顶部