期刊文献+

基于主观信任协作的信任评估模型 被引量:4

Trust Valuation Model Based on Subjective Trust Coordination
下载PDF
导出
摘要 以开放式网络中主观信任为研究背景,提出了一个完整的信任评估模型,给出了合理的直接信任和推荐信任评估具体计算公式及相关的其他解决办法,解决了主体间信任的评估。通过仿真实验的研究与分析,进一步验证了该信任评估模型的可行性与合理性。 Taking subjective trust as the background in the open network, this paper proposes a trust valuation model, provides a concrete and reasonable formula of direct trust and recommendation trust valuation and other solutions, which solves the valuation of trusts among various entities. Through the research and analysis of simulate experiment, the feasibility and the rationality of this trust valuation model is further con famed.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第12期144-147,共4页 Computer Engineering
基金 成都信息工程学院科技发展基金资助项目(CSRF200406) 成都信息工程学院发展基金资助项目(KYTZ200704) 四川省教育厅青年基金资助项目(2006B062)
关键词 主观信任 信任评估 信任关系 直接信任 间接信任 Subjective trust Trust valuation Trust relationship Direct trust Recommendation trust
  • 相关文献

参考文献8

  • 1Abdul-Rahman A,Hailes S.A Distributed Trust Model[C]//Pro-ceedings of the New Security Paradigms Workshop.1998.
  • 2Abdul-Rahman A,Hailes S.Using Recommendations for Managing Trust in Distributed Systems[C]//Proceedings of the IEEE Malaysia International Conference on Communication.1997.
  • 3Beth T,Borcherding M,Klein B.Valuation of Trust in Open Network[C]//Proceedings of the European Symposium on Research in Security.1994.
  • 4Jφsang A,Knapskog S J.A Metric for Trusted Systems[C]//Pro-ceedings of the 15th IFIPSEC International Information Security Conference.1998.
  • 5Abdul-Rahman A,Hailes S.Supporting Trust in Virtual Communi-ties[C]//Proceedings of Hawaii Int.Conference on System Science.2000.
  • 6Perlman R.An Overview of PKI Trust Models[J].IEEE Network,1999,13(6):38-43.
  • 7徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. 被引量:69
  • 8张仕斌,何大可,遠藤誉.基于模糊聚类的信任类型动态定义机制研究[J].计算机工程,2006,32(9):19-21. 被引量:18

二级参考文献12

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9Beth T,Borcherding M,Klein B.Valuation of Trust in Open Network[C].Proceedings of the European Symposium on Research in Security.Brighton:Springer-Verlag,1994:3-18.
  • 10Chu Y H,Feigenbaum J,LaMacchia B,et al.REFEREE:Trust Management for Web Applications[J].World Wide Web Journal,1997,2(2):127-139.

共引文献84

同被引文献31

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部