期刊文献+

基于主观信任和推荐的信任模型 被引量:6

Research into a trust model based on subjective trust and recommendation
下载PDF
导出
摘要 研究了分布网络环境中交易实体的信任问题,分析了信任的含义并考虑影响信任行为的外部环境因素,结合主观判断和推荐,构建了一种新型信任模型并引入惩罚机制,建立信任更新协议。 To solve the trust problems of deal partners in distributed network, the meanings of trust and the factors of influencing trust behavior are discussed. A new trust model based on subjective trust and recommendafion with punishment mechanism is proposed, and the trust updating protocol is presented to adjust trust relationship.
出处 《重庆工商大学学报(自然科学版)》 2006年第2期160-163,共4页 Journal of Chongqing Technology and Business University:Natural Science Edition
关键词 主观信任 推荐 信任模型 信任更新协议 subjective trust recommendation trust model trust updating protocol
  • 相关文献

参考文献5

  • 1KINI A, CHOOBINH J. Trust in electronic: definition and theoretical considerations. 31^st Annual Hawaii Int 1 Conf system Sciences. 1998 [ EB/OL]. (2002 - 10 - 17 ) [ 2003 - 12 - 16 ]. http :ieeexplore. ieee. org/ie14/5217 14270/00655251. pdf
  • 2JONES S, TRUST E C. Requirements for trust and confidence in e - commerce [ A ]. European Commission [C].Joint Research Centre, 1999 : 300 - 305
  • 3SANG A . A subject ivemetric of authentication [ A ]. Proceedings of the European Sympo sium on Research in Security 98[ C]. Louvainla2N euve: Springer Verlag, 1998: 329- 344
  • 4刘玉龙,曹元大.分布网络环境主观信任模型研究[J].北京理工大学学报,2005,25(6):504-508. 被引量:19
  • 5李仁发,钟少宏.基于信任普适计算环境下的信任模型[J].科学技术与工程,2005,5(8):476-480. 被引量:10

二级参考文献26

  • 1[1]Weiser M. The computer for the 21st century. Sci Amer, 1991;265(3) :94-104
  • 2[2]Blaze M, Feigenhaum J, Lacy J. Decentralized trust management. In:Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996 ; May: 164-173
  • 3[3]Ellison C, et al. SPKI certificate theory. RFC2693, September 1999
  • 4[4]Pretty good privacy user's guide. Distributed with the PGP software, Version 7.0,2001
  • 5[5]An introduction of cryptography. Distributed with the PGP software, Version 7.0,2001
  • 6[6]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proc of 17th Symposium on Security and Privacy,IEEE CS Press,1996:164-173
  • 7[7]McKnight D H, Chervany N L. The meanings of trust. Trust in Cyber-Societies-LNAI, 2001; 2246: 27- 54
  • 8[8]Gambetta D. Can we trust trust? In: ed Gambetta D,trust:making and breaking cooperative relations, Oxford, Basil Blackwell,1991:213-237
  • 9[9]Konarad K, Fuchs G, Bathel J, Trust and electronic com-mercemore than a technical problem. The 18th Symp Reliable distributed systems, 1999, Lausanne, swithzerland, http://ftp. informatik. rwth-aachen. de/dblp/db/conf/srds/srds99. html.
  • 10[10]Povey D. Trust management. 1999,http:/security. dstc. edu.au/predentations/trust.

共引文献25

同被引文献64

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部