期刊文献+

基于可信性理论的主观信任模型研究 被引量:3

Research of subjective trust model based on credibility theory
下载PDF
导出
摘要 通过对开放网络环境中主观信任评价方法的讨论,引入可信性理论来研究主观信任的模糊性,并提出了极大化期望值准则下的主观信任量化评价方法。针对主体信任属性评价值以及评价权重均为模糊变量的情形,给出了主观信任模糊期望值的模拟计算方法。实例分析表明,该方法对主观信任评价是可行和有效的。 Through discussing the evaluation methods of subjective trust in open network,the fuzzy quality of subjective trust was investigated by introducing credibility theory,and the quantitative evaluation approach of subjective trust was presented based on the criteria of maximizing expected value.Then under the situation that the key attributes of subjects and the weight of evaluation were characterized as fuzzy variables,a simulating method was given to calculate the expected value of subjective trust.Finally,t...
作者 王小斌
出处 《计算机应用》 CSCD 北大核心 2009年第3期874-876,共3页 journal of Computer Applications
基金 山东财政学院重点科研课题(07ZD01)
关键词 主观信任 可信性测度 模糊变量 期望值 subjective trust credibility measure fuzzy variable expected value
  • 相关文献

参考文献5

二级参考文献27

  • 1[9]Kamvar S D,Schlosser M T,Garcia-Molina H.The eigentrust algorithm for reputation management in P2P networks[A].Proc 12th Iht World Wide Web Conf[C].Budapest,Hungary:ACM Press,2003:640-651.
  • 2[10]Marti S,Garcia-Molina H.Limited reputation sharing in P2P systems[A].Proceedings of the 5th ACM Conf Electronic Commerce[C].New York,NY:ACM Press,2004:91 -101.
  • 3[11]Tutte W T.Graph Theory[M].Cambridge University Press,2004.
  • 4[14]CHAN Haowen,Perrig A,SONG Dawn.Random key predistribution schemes for sensor networks[A].Proc 2003IEEE Symp Security and Privacy[C].IEEE Computer Society,2003:197.
  • 5[15]Bremaud P.Markov chains:Gibbs fields,Monte Carlo simulation,and queues[M].New York:Springer-Verlag,1999.
  • 6[16]Watts D J,Strogatz S H.Collective dynamics of "small-world" networks[J].Nature,1998,393:440-442.
  • 7[17]Watts D J.Small Worlds:the Dynamics of Networks Between Order and Randomness[M].New Jersey:Princeton University Press,2004.
  • 8[1]Gambetta D.Can we trust trust?[A].Gambetta D,ed.Trust:Making and Breaking Cooperative Relations[C].Oxford:Basil Blackwell.1990:213-238.
  • 9[2]Jφsang A.Prospectives of modeling trust in information security[A].Proceedings of the 2nd Australasian Conf on Infor Security and Privacy[C].Sydney,Australia:Springer,1997.
  • 10[3]Jφsang A.A logic for uncertain probabilities[J].Int J Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.

共引文献271

同被引文献25

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部