期刊文献+

模糊自主信任建立策略的研究 被引量:6

Research of Fuzzy Autonomous Trust Establishment Strategy
下载PDF
导出
摘要 该文首先从分析开放式网络环境中有关信任的问题和主观信任的模糊性入手,以模糊理论为基础,引入隶属度来描述信任的模糊性,解决了模糊信任模型的建模问题;以图论为基础,将网络环境模型化为一个无向图G(V,E),定义了基于本地信息交互的信任评价规则;提出了基于开放式网络环境的模糊自主信任模型,具体研究了自主信任建立策略及建立完全可信网络的实现机制及条件;最后通过仿真实验讨论了网络拓扑结构对自主信任建立的影响,并以小世界网络模型(φ-model)为基础分析讨论了自主信任建立的速度问题,这为网络管理的研究提供了一个有价值的新思路。 Firstly, this paper analyzes some questions of trust and the fuzziness of subjective trust, based on fuzzy set theory, the fuzziness of trust is described by membership function, and how to create the fuzzy trust model has been solved. Secondly, based on the graph theory, the network is modeled as an undirected graph G(V,E), and the rule of trust evaluation is defined by the aid of local information interaction. Thirdly, the model of fuzzy autonomous trust establishment based on open network environment is proposed; trust establishment strategy, the mechanism and condition of establishing a fully trusted network are studied in this paper. Finally, the influence of network topology to autonomous trust establishment is discussed through simulation experiment, and the convergence rate of autonomous trust establishment based on the small-world model (φ-model) is analyzed in this paper, which enlightens a new way for network management.
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第8期1492-1496,共5页 Journal of Electronics & Information Technology
基金 成都信息工程学院科技发展基金(CSRF200406)资助课题
关键词 自主信任建立 信任模型 信任向量 模糊集合理论 图论 Autonomous trust establishment, Trust model, Trust vector, Fuzzy set theory, Graph theory
  • 相关文献

参考文献18

  • 1Gambetta D.Can We Trust Trust?[M] In D.Gambetta editor,Trust:Making and Breaking Cooperative Relations.Basil Blackwell:Oxford,1990:213-238.
  • 2Josang A.Prospectives of modeling trust in information security[A].In:Proceedings of the 2nd Australasian Conference on Information Security and Privacy[C].Sydney,Australia,1997:219-231.
  • 3Josang A.A logic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.
  • 4Blaze M,Feigenbaum J,Keromytis A D.Keynote:Trust management for public-key infrastructures[A].In:Christianson B,Crispo B,William S,et al..eds.Cambridge 1998 Security Protocols International Workshop[C].Cambridge,UK,April15-17,1998.Berlin:Springer-Verglag,1999:59-63.
  • 5Beth T,Borcherding M,Klein B.Valuation of trust in open networks[A].In:Gollmann D.ed.Proceedings of the European Symposium on Research in Security (ESORICS)[C].Brighton,United Kingdom,November 1994:3-18.
  • 6Jφsang A.Trust-Based decision making for electronic transactions[EB/OL].In:Proceedings of the 4th Nordic Workshop on Secure Computer System(NORDSEC'99)[C].Stockholm,Sweden,Stockholm University Report 99-005,1999.
  • 7Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[A],In:Dale J,Dinolt G,eds.Proceedings of the Symposium on Security and Privacy[C].Oakland:IEEE Computer Society Press,1996:164-173.
  • 8Pretty good privacy user's guide[S].Distributed with the PGP software.Version 8.0.2003.
  • 9Housley R.Internet X.509 Public Key Infrastructure,Certificate and CRL Profiles[S].RFC2459,1999.
  • 10Sonja Buchegger,Jean-Yves Le Boudec.The effect of rumor spreading in reputation systems for mobile Ad-hoc networks[A].In Proceedings of Modeling and Optimization in Mobile,Ad hoc and Wireless Networks (WiOpt)[C],Sophia-Antipolis,France,March 2003:66-75.

同被引文献56

引证文献6

二级引证文献163

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部