期刊文献+

采用贝叶斯网的信任管理模型 被引量:1

A Trust Management Model based on Bayesian Network
原文传递
导出
摘要 论文利用贝叶斯网络的特性,在Yao Wang、Julita Vassileva模型的基础上,通过使用一种记录交易结果的各个属性来更新CPT的方法,提出了一个基于贝叶斯网的信任管理模型,该模型在计算信任时能够综合考虑上下文相关性和多面性。 Taking the advantage of the characteristics of the Bayesian network, this paper puts forward a trust manage-ment model based on Yao Wang and Julita Vassilevas model, by using a method for updating CPTs by recording all attributes of every transaction, which can comprehensively consider the correlation and many-sidedness of the context in computation of trust.
出处 《信息安全与通信保密》 2008年第2期61-62,共2页 Information Security and Communications Privacy
关键词 信任 信任管理 贝叶斯网络 CPT trust rust management Bayesian Network CPT
  • 相关文献

参考文献6

  • 1王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 2[2]Josang A,Keser C,Dimitrakos T.Can We Manage Trust[R].Paris,May 2005:1~4.
  • 3[3]Grandison T,Sloman M.A survey of Trust in Internet Applications[J].IEEE Communications Surveys,2000,4(4):3~13.
  • 4[4]Singh A,Liu L.TrustMe:Anonymous Management of Trust Relationship in Decentralized P2P Systems[C].IEEE,2003:2~8.
  • 5[5]Sepandar D Kamvar,Mario T Schlosser,Hector Garcia-Molina.The EigenTrust Algorithm for Reputation Management in P2P Networks[C].Budapest,Hungary:ACM,2003:1~12.
  • 6[6]Wang Yao,Vassileva Julita.Bayesian NetworkBased Trust Model[C].IEEE,2003:2~7.

二级参考文献35

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943. 被引量:16
  • 3Anderson J P.Computer Security Technology Planning Study.ESD-TR-73-51,Vol.I,AD-758 206,ESD/AFSC,Hanscom AFB,Bedford MA,October 1972
  • 4ISO/IEC,Information technology-security Techniques-Evaluation Criteria for IT Security.Part 1:Introduction and General Model.2nd ed.2005.(Available at URL:http://standards.iso.org/ittf/PubliclyAvailableStandards/c040612_ISO_IEC_15408-1_2005(E).zip,accessed on April 14,2006)
  • 5Trusted Computing Group,TCG Architecture Overview,v1.2,28 April 2004.(Available at URL:https://www.trustedcomputinggroup.org/specs/IWG/TCG 1 0 Architecture_Overview.pdf,accessed on April 14,2006)
  • 6Gates B.Trustworthy Computing.Wired News,Jan.17,2002.(Available at URL:http://www.wired.com/news/business/0,1367,49826,00.html,accessed on April 14,2006)
  • 7Algirdas A,Jean-Claude L,Brian R,et al.Basic concepts and taxonomy of dependable and secure computting.IEEE Trans Dependable Secure,2004,1(1):11-33
  • 8Friedman B,Kahn P H Jr,Howe D C.Trust online.Comm of the ACM,2000,43(12):34-40
  • 9Lazowska E D,Patterson D A.Distributed computing.Science,2005,308(6),May (Available at URL:http://www.sciencemag.org/sciext/computers/,accessed on April 14,2006)
  • 10Beruardo E A,Huberman A,Free Riding on Gnutella.Tech Rept:SSL-00-63,XeroxPARC,2000.8

共引文献58

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部