期刊文献+

Extension of Subjective Logic for Time-Related Trust 被引量:3

Extension of Subjective Logic for Time-Related Trust
下载PDF
导出
摘要 To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction, disjunction and negation for traditional logic anddiscounting and consensus operators that are evidential operators specially designed for thepropagation and computation of trust relationships. With the extension of subjective logic fortime-related trust, our time-related trust modelis suitable to model the dynamic trust relationshipin practice. Finally an example of reputation assessment is offered to demonstrate the usage of ourtrust model. To describe the dynamic propcrty of trust relationship, wt propose atime-related trust model and extend Joang's subjective logic to fit for time-related trust model.The extension includes prepositional conjunction, disjunction and negation for traditional logic anddiscounting and consensus operators that are evidential operators specially designed for thepropagation and computation of trust relationships. With the extension of subjective logic fortime-related trust, our time-related trust modelis suitable to model the dynamic trust relationshipin practice. Finally an example of reputation assessment is offered to demonstrate the usage of ourtrust model.
机构地区 SchoolofComputer
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期56-60,共5页 武汉大学学报(自然科学英文版)
基金 SupportedbytheNationalHighTechnologyResearchandDevelopmentProgramofChina(2003AA142010)
关键词 trust model lime-related trust relationship time-related trust model subjective logic trust model lime-related trust relationship time-related trust model subjective logic
  • 相关文献

同被引文献35

  • 1秦大力,谢冬青.开放计算环境中的信任管理模型研究与实现[J].计算机工程与科学,2005,27(12):27-29. 被引量:3
  • 2石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10. 被引量:21
  • 3Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[C]//Proc of the 17th Syrup on Security and Privacy, 1996 : 164-173.
  • 4Blaze M, Feigenbaum J, Keromytis A D. Keynote: Trust Management for Public-Key Infrastructures [C]//Proc of Cambridge 1998 Security Protocols International Workshop, 1999:59-63.
  • 5Jφsang A, Ismail R,Boyd C. A Survey of Trust and Reputation Systems for Online Service ProvisionEM3. Decision Support Systems, 2005.
  • 6Jameel H, Hung Le Xuan, Kalim U, et al. A Trust Model for Ubiquitous Systems Based on Vectors of Trust Values[C]//Proc of the 7th IEEE Int'l Symp on Multimedia,2005.
  • 7Jφsang A. A Subjective Metric of Authentication[C]//Proc of European Syrup on Research in Computer Security, 1998: 329-344.
  • 8Azzedin F, Maheswaran M. Evolving and Managing Trust in Grid Computing Systems[C]//Proc of Conf on Electrical and Computer Engineering, 2002 : 1424-1429.
  • 9Lamsal P. Understanding Trust and Security[EB/OL]. [2004- 05-17]. http://citeseer. nj. nec. com/ lamsa101understanding. html.
  • 10Grandison T. Trust Management for Internet Applications: [Ph D Thesis][D]. Imperial College of London,2003.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部