期刊文献+

P2P网络信任模型的无知证据融合问题研究

Research on ignorant evidence fusion in P2P network trust model
下载PDF
导出
摘要 在完全开放的P2P网络环境中,资源共享是用户的自愿行为,用户不愿为自身的行为负担责任,因而要建立节点之间的信任关系。在已有的基于推荐的信任机制中,基于D-S证据理论方法可以很好地解决信任的不确定性问题,但是目前在这一领域地研究还没有注意到证据空间呈现大规模无知前提下证据的合理融合问题。针对这一问题,本文对现有的D-S证据理论加以改进,使其符合P2P网络的安全性要求。 For most P2P file-swapping applications,sharing is a volunteer action,and peers are not responsible for their irresponsible bartering history.So it is necessary to establish a trust mechanism for the P2P network.ln the existing trust models based recommendation,the Dempster-Shafer(D-S) evidence theory based trust model can solve the uncertain problem.But the existing researches on D-S evidence theory do not aware the problem of reasonable evidence fusion when there are large number of the ignorant evidence in the evidence space.ln this paper,we improve the D-S evidence theory to enhance the P2P network security.
作者 张震 王晓明
出处 《计算机工程与应用》 CSCD 北大核心 2007年第2期171-173,183,共4页 Computer Engineering and Applications
基金 暨南大学自然科学基金资助项目。
关键词 P2P D—S证据理论 信任机制 推荐 无知证据融合 P2P D-S evidence theory trust model recommendation fusion of ignorant evidence
  • 相关文献

参考文献14

  • 1Caronni G.Walking the Web of trust[C]//Proc of the IEEE 9th Int'l Workshops on Enabling Technologies:Infrastructure for Collaborative Enterpises:IEEE Press,2000:153-159.
  • 2Oram A.Peer-to-Peer:harnessing the power of disruptive technology[M].Sebastopol:O'Reilly Press,2001:222-238.
  • 3Kamvar S D,Schlosser M T.EigenRep:reputation management in P2P network[C]//Proc of the 12th Int'l World Wide Web Conf,Budapest:ACM Press,123-134.
  • 4Cornelli F.Choosing reputable servants in a P2P network[C]//Proc of the 11th Int'l World Wide Web Conf,Hawaii:ACM Press,2002:441-449.
  • 5窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 6Josang A,The beta reputation system[C]//Proc of the 15th Bled Electronic Commerce Conference e-Rality,Constructing the e-Economy,2002.
  • 7Whitby A,Jasong A,Indulsika J.Filtering out unfair ratings in Bayesian reputation systems[J].Icfain Journal of ManagementReasearch 1,2005,4(2):48-64.
  • 8Patel J,Teacy W T L,Jenning N R,et al.A probabilistic trust model for handling inaccurate reputation sources[C]//Herrmann P.LNCS 3477:iTrust 2005,2005:193-209.
  • 9Dempster A P.Upper and lower probabilities induced by multivalued mapping[J].Annals of Mathematical Statistic,1967,38 (2):325-339.
  • 10Shafer G.A mathematical theory of evidence[M].Princeton:University Press,1976.

二级参考文献17

  • 1Fox G. Peer-to-Peer Networks[J]. IEEE Computer in Science & Engineering, 2001, (3): 75-77.
  • 2Dempster A P. Upper and Lower Probability Induced by a Multi-valued Mapping[J]. Annals Mathematical Statistics, 1967, 38(2): 325-339.
  • 3Shafer G. A Mathematical Theory of Evidence[M]. Princeton: Princeton University Press, 1976.
  • 4Ian Foster, Carl Kesselman, Steven Tuecke. The anatomy of the grid. International J. Supercomputer Applications. http://www.globus.org/research/papers/anatomy.pdf, 2001.
  • 5Andy Oram. Peer to Peer: Harnessing the Power of Disruptive Technologies. New York: O'Reilly & Associates, 2001.
  • 6R. Khare, A. Rifkin. Weaving a Web of trust. World Wide Web, 1997, 2(3): 77~112.
  • 7G. Caronni. Walking the Web of trust. In: Proc. the 9th Workshop on Enabling Technologies (WET ICE' 2000 ) . Los Alomitos, CA: IEEE Computer Society Press, 2000.
  • 8T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. the 3rd European Symposium on Research in Computer Security. Brighton: Springer-Verlag, 1994. 3~18.
  • 9A. Abdul-Rahman, S. Hailes. A distributed trust model. In:Proc. the 1997 New Security Paradigms Workshop. Cumbnia:ACM Press, 1997. 48~60.
  • 10J. Scott. Social Network Analysis: A Handbook. Oxford: SAGE Publications, 2000.

共引文献364

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部