期刊文献+

基于主观逻辑的Web服务信任模型 被引量:4

A Trust Model of Web Services Based on Subjective Logic
下载PDF
导出
摘要 为解决当前Web服务网络中存在的一些与信任相关的安全问题、提高Web服务的安全性和可靠性,基于主观逻辑,文中提出了一个改进的自适应Web服务信任模型iWSTrust及相应的信任度和声誉评估算法.该模型利用主观逻辑对Web服务网络中的实体进行信任建模和推理,并增加可信任的第三方机构来保存信任信息,通过综合考虑Web服务环境中的各个相关实体,分析一次典型交易过程中所涉及的信任关系,并对不同类型的服务请求者进行区分,使得实体的信任度和声誉能够随着交易经验的增加而自适应地改变。模拟实验结果表明,iWSTrust能在一定程度上减少访问到恶意实体的次数, 并惩罚进行欺骗的实体. In order to solve some trust-related security problems existing in current Web service networks and improve the security and reliability of Web services, this paper proposes an improved adaptive trust model of Web services, namely, iWSTrust, and the corresponding evaluation algorithms of its trustworthiness and reputation. In iWSTrust, the subjective logic is first used to model and reason the trust for the entries in Web service networks, and a trusty third party is added to store the trust information. Then, by considering the related entities in the Web service environment, the trust relationships involved in a typical interaction are analyzed. Moreover, different types of service requesters are distinguished, which enables the trustworthiness and reputation of entities to self-adapt with the increase of interaction experience. The results of simulated experiments show that iWSTrust, to some extent, can decrease the number of accessing vicious entities and nunish deceitful entities accordingly.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第10期24-28,43,共6页 Journal of South China University of Technology(Natural Science Edition)
基金 国家高技术研究发展计划(973计划)基金资助项目(G20000263)
关键词 WEB服务 信任模型 主观逻辑 服务代理者 服务提供者 服务请求者 Web service trust model subjective logic service broker service provider service requester
  • 相关文献

参考文献9

  • 1Clark M. UDDI weather report [ EB/OL]. http:∥www.webse-rvicesarchitect. com/content/articles/clark04. asp,2001 - 11 -28.
  • 2Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [A]. Proceedings of the 7th Symposium on Security and Privacy [ C ]. Oakland, CA: IEEE Computer Society Press, 1996. 164 - 173.
  • 3徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 4Josang A. Artificial reasoning with subjective logic [A].Proceedings of the Second Australian Workshop on Commonsense Reasoning [C]. Perth: [ s. n. ], 1997.32 - 48.
  • 5Josang A, Knapskog S J. A metric for trusted systems [A]. Proceedings of the 21st National Security Conference [C]. [s.l.]:NSA,1998.18 -29.
  • 6Josang A. A subjective metric of authentication [A]. Proceedings of the 5th European Symposium on Research in Computer Security [C]. New York: Springer Verlag,1998. 329 - 344.
  • 7SUJin-dian GUOHe-qing GAOYin.An Adaptive Trust Model of Web Services[J].Wuhan University Journal of Natural Sciences,2005,10(1):21-25. 被引量:6
  • 8Rubin R B, Palmgreen P,Sypher H E. Communication Research Measures: A Sourcebook [ M ]. New York: Guilford Publications, 1994.
  • 9Dellarocas C. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems [A]. Proceedings of the 21st International Conference on Information Systems [ C ]. Australia: [ s.n.],2000.520 - 525.

二级参考文献20

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139.
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf.

共引文献114

同被引文献41

  • 1吴根秀.信任函数组合与局部冲突处理[J].计算机工程与应用,2004,40(34):81-84. 被引量:17
  • 2邢清华,雷英杰,刘付显.一种按比例分配冲突度的证据推理组合规则[J].控制与决策,2004,19(12):1387-1390. 被引量:42
  • 3苏锦钿,郭荷清,刘淼.基于Dirichlet分布的扩展主观逻辑[J].华南理工大学学报(自然科学版),2006,34(6):108-111. 被引量:2
  • 4Shaler G. A Mathematical Theory of Evidence [M]. Princeton, New Jersey: Princeton University Press, 1976.
  • 5Zadeh L A. Fuzzy sets [J]. Information and Control, 1965, 8(3): 338-353.
  • 6Josang A. Artificial reasoning with subjective logic [C] // Proc of the 2nd Australian Workshop on Commonsense Reasoning. Perth, Australia: ACS, 1997:9-14.
  • 7Josang A. A logic for uncertain probabilities [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311.
  • 8Josang A, Ismail R. The beta reputation system [C]//Proc of the 15th Bled Conf on Electronic Commerce. Bled, Slovenia: University of Mariber, 2002:17-19.
  • 9Josang A, Hayward R, Pope S. Trust network analysis with subjective logic [C] //Proc of the Australasian Computer Science Conference (ACSC'06). New York: ACM, 2006: 85-94.
  • 10Josang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision [J]. Decision Suoport Systems, 2007, 43(2): 618-644.

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部