期刊文献+

一种对等计算安全性的时间自衰减信任管理算法 被引量:21

A Time Self-Decay Trust Management Algorithm for P2P Computing Security
下载PDF
导出
摘要 面向对等计算的信任度评估提出了一种新的信任管理量化算法,该算法解决了已有算法不能很好解决的信任时间衰减特性和节点联盟等问题,系统地对目前有代表性的网络信任评估算法进行了总结和分析,并对当前相关的国内外研究热点作了分类,同时给出了信任相关的一些定义以及算法应该考虑的问题,并提出一套完整解决问题的算法.定义了信任时间矫正函数、域信任矫正函数、信任值校准函数和准确度函数,并构造了信任时间矫正算法与域矫正算法,通过推导说明本算法具有良好的时间衰减性、历史经验相关性、新入节点奖励特性和联盟特性,同时给出了一般性的信任自然衰减曲线和8种典型特征域的系数变化范围.通过实验评价了算法的正确性和有效性,并和Azzedin算法进行比较,表明提出的算法效率和准确性有了显著的提高. A novel quantitative network trust evaluation algorithm for peer-to-peer computing security system is proposed. The main features of the proposed model include time decay function and entity union function. First of all, the current representative algorithms of network trust evaluation are summerized and classified systematically. And the significant research fields of the related algorithms are categarized and the definition of trust related terminology is given. In this paper, an algorithm with trust time correct function, domain trust correct function and the definition of accuracy is constructed. Four features of the algorithm, time decay feature, history experience related feature, new entity award feature and union feature, are proved. At the same time, a natural trust decay curve is described and eight typical domain features are given. The experiments are also designed to evaluate the correctness and performances of the proposed algorithm, the results of the experiments are compared with Azzedin algorithm , and the results prove the sound performance and correctness of the algorithm. Finally, some related future research fields of the paper are pointed out.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第1期1-10,共10页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60573042) 北京市自然科学基金项目(4052016)
关键词 对等计算 网络安全 信任评估 信任管理 量化算法 P2P computing network security trust evaluation trust management evaluation algorithm
  • 相关文献

参考文献34

  • 1I Foster,C Kesselman,S Tuecke.The anatomy of the grid[J].Int'l Journal of High Performance Computing Applications,2001,15(3):1-25
  • 2I Foster,A Iamnitchi.On death,taxes,and the convergence of peer-to-peer and grid computing[C]The 2nd Int'l Workshop on Peer-to-Peer Systems (IPTPS'03),Berkley,CA,2003
  • 3查礼,李伟,余海燕,蔡季萍.面向服务的织女星网格系统软件设计与评测[J].计算机学报,2005,28(4):495-504. 被引量:16
  • 4A Stephanos,S Diomidis.A survey of peer-to-peer content distribution technologies[J].ACM Computing Surveys,2004,36(4):335-371
  • 5D W Chadwick,et al.Merging and extending the PGP and PEM-TEL trust model[J].IEEE Network,1997,11(3):16-24
  • 6M Blaze,J Feigenbaum,J Lacy.Decentralized trust management[C].In:Proc of the 17th Symp on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1996164-173
  • 7A Abdul-Rahman,S HailesA distributed trust model[C].In:Proc of the 1997 New Security Paradigms Workshop.New York:ACM Press,199848-60
  • 8T Beth,M Borcherding,B Klein.Valuation of trust in open network[C].In:Proc of the European Symp on Research in Security (ESORICS).Berlin:Springer-Verlag,19943-18
  • 9A Josang.The right type of trust for distributed systems[C].In:Proc of the 1996 New Security Paradigms Workshop.New York:ACM Press,1996119-132
  • 10A Josang.A model for trust in security systems[C].In:Proc of the 2nd Nordic Workshop on Secure Computer Systems.New York:ACM Press,1997

二级参考文献72

  • 1李岳峰,刘大有.证据理论中的近似计算方法[J].吉林大学自然科学学报,1995(1):28-32. 被引量:7
  • 2[1]Even S, Goldreich O, Lempel A. A randomized protocol for signing contract. Communications of the ACM, 1985, 28(6):637-647
  • 3[2]Brickell E, Chaum D, Damgard I, Graff J. Gradual and verifiable release of a secret. In: Proc CRYPT 87, Berlin, 1998. 156-166
  • 4[3]Giuseppe Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. In:Proc 6th ACM Conference on Computer and Communications Security, Singapore, 1999. 138-146
  • 5[4]Asokan N, Victor Shoup, Michael Waidner. Optimistic fair exchange of digital signatures. In: Proc Eurocrypt'98, Espoo Finland, 1998. 591-606
  • 6[5]Camenisch J, Damg ard I. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. BRICS: Technical Report RS-98-32, 2000
  • 7[6]Matt Blaze, Bleumer G, Martin Strauss. Divertible protocols and atomic proxy cryptography. In: Proc Eurocrypt '98, Espoo Finland,1998. 127-14
  • 8[7]Chaum D, Damg ard I, Pedersen T. Convertible undeniable signatures. In:Proc CRYPTO'90, California, USA,1990. 189-205
  • 9刘大有,软件学报,1996年,7卷,增刊,216页
  • 10Paul C., Richard M.. Managing context data for smart spaces. IEEE Personal Communications, 2000, 1(3): 44~46

共引文献751

同被引文献239

引证文献21

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部