期刊文献+

基于灰色系统理论的主观信任模型 被引量:20

Subjective Trust Model Based on Grey System Theory
下载PDF
导出
摘要 通过对传统信任计算模型的讨论,提出了以灰色系统理论为基础的灰关联分析模型,证明了模型稳定性的充分必要性.新模型主要将实体的某些难以用数值精确刻画的关键属性以白化权函数量化,引入灰关联度的概念和计算方法,将实体的信任水平定义为实体的关键属性值序列与最优属性值序列的灰关联度,从而得到该实体信任水平的相对参考值.实例表明,该模型不仅发挥了灰关联分析可靠性高、所需样本量少等优点,而且很适合软件作自动化处理,是一个既能反映主体信任的灰性,又具有直观、简洁语义的定量描述机制,为进一步建立信誉数据库进行大规模分析提供了较好的基础,也为网络环境中的信任计算提供了一个具有实用价值的新方法. Through discussing the traditional trust computation model, a grey relation analysis model is presented, which is based the grey system theory, and the abundant necessity of the model stability is proved. The new model measures the entity's some key attributes by whiting functions,which is difficult to depict exactly by value, imports the concept and the computation method of the grey relation degree, defines the entity's trust level as the grey relation degree of its key attributes value list and the best key attributes value list, and gains the entity's relative trust value. The example indicates that the model not only exerts the excellence of the grey relation analysis, such as high reliability,few swatch needed,etc, but also is adapt to be dealed with by software. The model not only reflects the fuzziness of the entity's trust, but also possesses the quantitative description mechanism,which is intuitionistic and succinct semanteme, provides the good foundation for the establishment and cosmically analysis of credit database forwardly, and offers a practical and valuable new method for the trust computation in networks circumstance .
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第5期801-804,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金(60203017)资助
关键词 信任 信任计算 关键属性 灰关联分析 trust trust computation key attributes grey relation analysis
  • 相关文献

参考文献11

  • 1Seamus Moloney.Simulation of a distributed recommendation system for pervasive networks[C].In:Proceedings of the 2005 ACM symposium on Applied computing,2005,1577-1581.
  • 2Georgios Pitsilis,Lindsay Marshall.A model of trust derivation from evidence for use in recommendation systems[EB/OL].School of Computing Science,University of Newcastle Upon-Tyne.http://www.cs.ncl.ac.uk/research/pubs/trs/papers/874.pdf.
  • 3Daniel Lemire.Scale and translation invariant collaborative filtering systems[J].In:Information Retrieval,2005,8(1):129-150.
  • 4Michelle Anderson,Marcel Ball,Harold Boley,Stephen Greene.RACOFI:a rule-applying collaborative filtering system[C].In:Proc.IEEE/WIC COLA'03,Halifax,Canada,October2003.http://www.daniel-lemire.com/fr/documents/publications/racofi-nrc.pdf.
  • 5Xie D Q,Leng J.PKI principle and technology[M].Beijing:Tsinghua University Press,2004,135-141.
  • 6Beth T,Borcherding M,Klein B.Valuation of trust in open networks[A].In:Gollmann D,ed.Proceedings of the European Symposium on Research in Security (ESORICS)[C].Brighton:Springer-Verlag,1994,3-18.
  • 7Josang A.A model for trust in security systems[EB/OL].In:Proceedings of the 2nd Nordic Workshop on Secure Computer Systems,1997.http://security.dstc.edu.au/staff/ajosang/papers.html
  • 8唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 9Wang Q Y.Grey math tutorial[M].Wuhan:Huazhong University Press,1996,12-164.
  • 10Deng J L.Grey system theory tutorial[M].Wuhan:Huazhong University Press,1990,128-134.

二级参考文献1

共引文献235

同被引文献170

引证文献20

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部