期刊文献+

分布式网络环境下实体行为信任的评估方法 被引量:4

Behavior trust computation in distributed network
下载PDF
导出
摘要 随着分布式网络的发展,网络的资源环境变得越来越复杂和难以预测,使得越来越多的应用需要建立信任,特别是在本来互不相识的实体之间建立信任。主要给出了较全面反映信任特性的信任计算方法,首次给出了证据更新的计算方法,在此基础上给出了基于客观证据的直接信任、推荐信任和推荐者自身信任更新的计算公式,并在计算中增加了可信度因子,使得通过计算得到的信任自包含可信度;提出了同构推荐者和非同构推荐者的概念和基于这两者的不同的信任计算方法,提高了信任评估的可信度;论述了信任推荐的4种拓扑结构及其计算方法。最后分析了计算方法体现出信任的主观性、动态性、非传递性和受历史影响等特性。方法具有实用、防欺骗和可扩展特点,可直接用来指导实际网络的信任计算。 With the development of the distributed network,more and more applications need to establish the trust,especially among the stranger entity,due to the complicated environment of the share resource.Because the share system is open,dynamic and uncertain,so it is difficult for the nodes to master all the security information,which leads to the undependability and security threat.So far,some of the trust model has been given,but they still have some limitations.Some model don't distinguish trusted-evidence from the no trusted-evidence,it may cause the cheating from the malice node; Some model only update node's trust and ignore updating of the recommendation-node's trust which not only don't punish the cheating of the recommender but also don't encourage the recommendation+So how to get a comprehensive computation of the trust,which embodies the characteristic of the trust,still is an important thing to research.Comprehensive methods of trust computation,such as updating of the evidence and recommender's trust,direct trust computation and recommendation trust computation,are discussed.Also the authors discuss the trust recommendation structure such as sequent,parallel,sequent-parallel and network structure.The trust evaluation in this paper,which can keep down the cheating and reflects the trust characteristic such as subjectivity,dynamic,notransitivity and so on,is practical and scalable.The authors also give a new notion of the homogeneous recommender and heterogeneous recommender,by distinguishing the two kinds of the recommendation,can get more accurate trust evaluation.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第17期1-5,48,共6页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(the National Grand Fundamental Research 973 Program of Chinaunder Grant No.2006CB708301) 国家自然科学基金(the National Natural Science Foundation of Chinaunder GrantNo.60673187) 教育部科技创新培育重点项目(No.707005) 诺基亚研究生科研创新基金 河北省科学技术研究与发展指导计划项目(No.07213570)
关键词 分布式网络 行为信任计算 信任分析 distributed network computation of the behaviour trust analysis of the trust
  • 相关文献

参考文献11

  • 1Chong Soon-Keow,Abawajy J H,Dew R A.A multilevel trust management framework[C]//ACIS-ICIS 2007:776-781.
  • 2Conrad M,French T,Huang Wei,et al.A lightweight model of trust propagation in a multi-client network environment[C]//ARES 2006: 482-487.
  • 3Hwang Junseok,Lee Choong ttee,Kim Soyoung.Trust embedded grid system for the harmonization of practical requirements[C]// IEEE SCC 2005:51-60.
  • 4林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 5Azzedin F, Maheswaran M.Evolvlng and managing trust in grid computing systems[C]//Conference on Electrical and Computer Engineering.Canada : IEEE Computer Society Press, 2002 : 1424-1429.
  • 6田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938. 被引量:70
  • 7Grandison T,Sloman M.A survey of trust in internet applications[J]. IEEE Communications Surveys,2000.
  • 8Wang Y,Vassilevaa J.Bayesian network-based trust model Web Intelligence[C]//IEEE/WIC International Conference on Web Intelligence, 2003 : 372-378.
  • 9Virendra M,Jadliwala M,Chandrasekaran M,et al.Quantifying trust in mobile ad-hoc networks[C]//2005 Interuational Conference on Integration of Knowledge Intensive Multi-Agent Systems(IEEE Cat. No.05EX 1033 ), 2005 : 65-70.
  • 10Wang Yao,Vassileva J.Bayesian network tnlst model in peer-topeer networks[C]//LNAt 2872:Second International Workshop on Agents and Peer-to-Peer Computing, 2004:23-34.

二级参考文献30

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 4Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 5Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 6Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 7International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 8Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 9Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 10Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33

共引文献312

同被引文献45

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部