期刊文献+

信任传递模型研究综述 被引量:11

A review of trust transitivity models
下载PDF
导出
摘要 信任传递是人们预先判断陌生事物是否可信的重要方式,广泛应用于P2P网络和无线传感器网络安全维护、电子商务推荐系统构建、消费者行为预测等研究领域。本文对信任传递模型的相关研究进行了综述,首先对信任传递研究的起源和定义进行了阐述,然后分别对信任传递的数学模型和社会网络模型进行了评述,最后探讨了信任传递模型进一步的研究方向。 Trust transitivity is very useful in prejudging the trustworthiness of unfamiliar items in special contexts.It’s widely used in researches such as security protection in P2P networks and wireless sensor networks,formation of electronic commerce recommendation system and prediction of consumer behavior.This paper firstly has a literature review of trust transitivity models and elaborates on the origin and concept of trust transitivity;it then analyzes the mathematical and social network models of trust transitivity and finally discusses the further study.
作者 胡祥培 尹进
出处 《东南大学学报(哲学社会科学版)》 CSSCI 北大核心 2013年第4期46-51,57,共7页 Journal of Southeast University(Philosophy and Social Science)
  • 相关文献

参考文献43

  • 1Jennifer Golbeck,James Hendler.Inferring Binary TrustRelationships in Web-based Social Networks[J].ACMTransactions on Internet Technology,2006,6(4):497-529.
  • 2Audun Jsang,Ross Hayward,Simon Pope.Trust Net-work Analysis with Subjective Logic[C].Proceedings ofthe 29th Australasian Computer Science Conference,Aus-tralia:Australian Computer Society,Inc.,2006:85-94.
  • 3Bruce Christianson,William Harbison.Why isnt TrustTransitive?[J].Security Protocols,1997(1189/1997):171-176.
  • 4Audun Jsang.The Right Type of Trust for DistributedSystems[C].Proceedings of the 1996 workshop on Newsecurity paradigms,ACM,1996,119-131.
  • 5Matt Blaze,Joan Feigenbaum,Jack Lacy.DecentralizedTrust Management[C].Security and Privacy,IEEE,1996,164-173.
  • 6Thomas Beth,Malte Borcherding,Birgit Klein.Valuationof Trust in Open Networks[C].Proceedings of the ThirdEuropean Symposium on Research in Computer Security,Springer,1994:3-18.
  • 7Karl Aberer,Zoran Despotovic.Managing trust in a peer-2-peer information system[C].Proceedings of the tenthinternational conference on Information and knowledge man-agement,ACM,New York.2001:310-317.
  • 8Audun Jsang An Algebra for Assessing Trust in Certifica-tion Chains[C].Proceedings of the Network and Distribu-ted Systems Security Symposium(NDSS’99).Citeseer,1999.
  • 9单明辉,贡佳炜,倪宏,曾学文,陈君.一种基于评价偏离度的信任传递方法[J].计算机工程与应用,2008,44(24):1-3. 被引量:1
  • 10李健利,高勇,霍光磊,刘博.基于声誉的P2P信任系统[J].计算机应用,2011,31(1):147-150. 被引量:3

二级参考文献207

共引文献410

同被引文献98

  • 1张钢,张东芳.国外信任源模型评介[J].外国经济与管理,2004,26(12):21-25. 被引量:36
  • 2胡蓉,邓小昭.网络人际交互中的信任问题研究[J].图书情报知识,2005,22(4):98-101. 被引量:31
  • 3于川,赵欣,彭丽华.居民选择就诊机构的影响因素分析[J].现代预防医学,2006,33(12):2380-2382. 被引量:22
  • 4邢春晓,高凤荣,战思南,周立柱.适应用户兴趣变化的协同过滤推荐算法[J].计算机研究与发展,2007,44(2):296-301. 被引量:148
  • 5茆诗松 周纪芗 等.概率论与数理统计[M].北京:中国统计出版社,2000..
  • 6郭世泽,陆哲明.复杂网络基础理论[M].北京:科学出版社,2012.
  • 7Castellano C, Fortunato S, Loreto V. Statistical physics of social dynamics[ J]. Review of Modem Physics,2009(81 ) : 591-646.
  • 8James D Doyle,Louise A Heslop,Alex Ramirez,et al. Trust in- tentions in readers of blogs [ J ]. Management Research Review, 2012(9) :837-856.
  • 9Kuo F Y, Yu C P. An Exploratory Study of Trust Dynamics inWork-oriented Virtual Teams[ J]. Journal of Computer-Mexlia- ted Communication, 2009,14(4) :823 - 854.
  • 10Grabowski A, Kosin ski R A. Epidemic Spreading in a Hierarchi- cal Social Network[J]. Phsical Review E,2004,70(3) :031908.

引证文献11

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部