期刊文献+

网格资源访问的一种主观信任机制 被引量:14

A Subjective Trust Mechanism of Resource Access in Grid
下载PDF
导出
摘要 针对网格环境资源访问过程中的信任问题,为避免主观随意性,提出了基于贝叶斯函数的信任机制,通过判断并使用推荐能力最强的中间节点作为推荐者,搜索出对资源节点的信任链路,使用贝叶斯函数对由信任链路得到的资源节点的每种属性进行综合判断,最终确定是否访问该资源节点,模拟实验结果表明该信任模型的有效性. To solve the trust problem during resource access in grid service and to avoid subjective notion during the execution of subjective trust, the trust mechanism based Beta function is proposed. The trust relations are set up upon recommendations among nodes from the reference of social network relation. Through judging the recommendation ability of medium nodes according to the former interaction result with the method of probability and statistics, the best recommendation ability nodes are selected as the recommenders to search trust links according to the limitation of the requester about link recommendation value and recommendation number, the trust values of each attribute for the resource node presented by the last nodes on the trust links are synthesized with Beta function to decide whether the access to resource node can be enforced. The experimental result expresses its validity.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第5期817-821,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573141 No.70271050) 江苏省自然科学基金(No.BK2005146) 江苏省自然科学基金预研项目(No.BK2004218) 江苏省高技术研究计划(No.BG2004004 No.BG2005037 No.BG2005038) 江苏省计算机信息处理技术重点实验室基金(No.kjs050001) 江苏省高校自然科学研究计划(No.05KJB520092)
关键词 网格服务 贝叶斯函数 信任机制 声望 grid service beta function trust mechanism reputation
  • 相关文献

参考文献10

  • 1Josang A,Knapskog S J.A metric for trusted systems[A].Proceedings of the 21st National Security Conference[C].NSA,1998.16-29.
  • 2Yu B,Singh M P.Distributed reputation management for electronic commerce[J].Computational Intelligence,2002,18(4):535-549.
  • 3Yu B,Singh M P.Detecting deception in reputation management[A].Proceedings of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems[C].Melbourne,Australia,2003.73-80.
  • 4唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 5Lin C,Varadharajan V,Wang Y,Pruthi V.Enhancing grid security with trust management[A].Services Computing Proceedings[C].IEEE,2004.303-310.
  • 6Song S,Hwang K.Fuzzy trust integration for security enforcement in grid computing[A].International Symposium on Network and Parallel Computing(NPC2004)[C].Heidelberg:Springer-Verlag GmbH,2004.
  • 7Azzedin F,Maheswaran M.Evolving and managing trust in grid computing systems[A].Electrical and Computer Engineering,IEEE CCECE 2002[C].Canadian,2002.1424-1429.
  • 8Azzedin F,Maheswaran M.A trust brokering system and its application to resource management in public-resource grids[A].18th International Parallel and Distributed Processing Symposium (IPDPS'04)[C].Santa Fe:IEEE Computer Society,2004.22-32.
  • 9周明辉,梅宏,焦文品.基于中间件的可定制信任管理框架[J].电子学报,2005,33(5):820-826. 被引量:8
  • 10盛骤 谢式千 潘承毅.概率论与数理统计[M].高等教育出版社,1997..

二级参考文献18

  • 1L Xiong,L Liu.A reputation-based trust model for peer-to-peer ecommerce communities[A].IEEE Conference on Electronic Commerce (CEC'03)[C].Newport Beach,USA,June,2003.
  • 2NSF.CISE-Trusted Computing[Z].www.nsf.gov,March 20,2003.
  • 3Microsoft.Trustworthy Computing[R].Microsoft White Paper,www.microsoft.com,2002.
  • 4徐峰.[D].南京:南京大学计算机软件研究所,2003.
  • 5T Grandison,M Sloman.A survey of trust in internet applications[J].IEEE Communications Surveys and Tutorials,2000,4(4):2-16.
  • 6H Schmidt.Trusted components-towards automated assembly with predictable properties[A].Proceedings of the 4th ICSE Workshop on Component-Based Software Eng[C].Canada,2001.
  • 7S Mishra.A middleware for constructing highly available,fault tolerant,and attack tolerant services[A].the Proceedings of the 17th ISCA International Conference on Computers and Their Applications (CATA 2002)[C].San Francisco,CA,April 2002.
  • 8Bill Gates.Trustworthy Computing[R].www.microsoft.com,Jan.17,2002.
  • 9Trusted Computing Group.What Is TCG?[R].http://www.trustedcomputinggroup.org/,April,2003.
  • 10B Lampson,M Abadi,M Burrows,E Wobber.Authentication in distributed systems:Theory and practice[J].ACM Transactions on Computer Systems,1992,10(4):265-310.

共引文献268

同被引文献204

引证文献14

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部