期刊文献+

P2P环境下基于Bayesian网络的多粒度信任模型 被引量:3

Bayesian network-based multiple granularity trust model in P2P
下载PDF
导出
摘要 Peer-to-Peer网络中,为保证系统的整体可用性,节点间的信任评估模型必须被建立起来。现有的模型不能灵活地反映考虑不同影响因素情况下节点的信任值。同时,不能避免FreeRiding现象。论文全面地描述了节点的行为,将激励机制引入信任模型中。同时考虑了影响节点信任值的不同因素,以及他们之间复杂的依赖关系,利用bayesian网络和领域层次结构相结合的方法有效合理地将各方面因素整合起来,形成能够反映节点在不同方面的本地信任值。 In peer-to-peer network,a trust model must be constructed to provide usability.However,almost all existing models do not take different factors into account in building this trust values,and they can not avoid the free riding phenomenon.In this paper,first we describe the node behavior comprehensively,then incorporate incentive mechanism into trust model.We leverage Bayesian network and domain hierarchy to incorporate all the factors to get peer local trust value.
作者 高迎 程涛远
出处 《计算机工程与应用》 CSCD 北大核心 2007年第13期11-13,21,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60473069 No.60496325) 北京市科技计划重点项目(No.H030130060011)。
关键词 BAYESIAN网络 P2P 信任模型 Bayesian network P2P trust model
  • 相关文献

参考文献7

  • 1王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 2高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20
  • 3高迎,程涛远,王珊.对等网信任管理模型及安全凭证回收方法的研究[J].计算机学报,2006,29(8):1282-1289. 被引量:8
  • 4Resnick P,Zeckhauser R.Trust among strangers in internet transactions:empirical analysis of eBay's reputation system[M]//Baye MR.The Economics of the Intcrnet and E-Commerce ,volume 11 of Advances in Applied Microeconomics.[S.l.]:Elsevier Science,2002.
  • 5Abdul-Rahman A,Hailes S.Supporting trust in virtual communities[C]//Proceedings of the Hawaii International Conference on System Sciences,Maui,Hawaii,4-7 January 2000.
  • 6Kamvar S D,Schlosser M T.EigenRep:reputation management in P2P networks[C]//Lawrence S.Proc of the 12th Int'1 World Wide Web Conf.Budapest : ACM Press, 2003 : 123-134.
  • 7Wang Y.Bayesian network-based trust model in Peer-to-Peer networks[C]//Workshop on "Deception,Fraud and Trust in Agent Societies" at the Autonomous Agents and Multi Agent Systems,2003.

二级参考文献38

  • 1王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 2高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20
  • 3Li NH,Winsborough WH,Mitchell JC.Distributed credential chain discovery in trust management.Journal of Computer Security,2003,11(1):35-86.
  • 4Li NH,Mitchell JC.RT:A role-based trust-management framework.In:Proc.of the 3rd DARPA Information Survivability Conf.and Exposition.Washington,IEEE Computer Society Press,2003.201-212.http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
  • 5Clarke D,Elien JE,Ellison C,Fredette M,Morcos A,Rivest R.Certificate chain discovery in SPKI/SDSI.Journal of Computer Security,2001,9(4):285-322.
  • 6Aura T.Fast access control decisions from delegation certificate databases.In:Proc.of the 3rd Australasian Conf.on Information Security and Privacy (ACISP '98).Brisbane:Springer-Verlag,1998.284-295.http://research.microsoft.com/users/tuomaura/Publications/aura-acisp98.pdf
  • 7Ellison C,Frantz B,Lampson B,Rivest R,Thomas B,Ylonen T.SPKI certificate theory.Internet RFC 2693,1999.
  • 8Jim T.SD3:A trust management system with certificate evaluation.In:Proc.of the 2001 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2001.106-115.
  • 9Li NH,Mitchell UC,Winsborough WH.Design of a role-based trust-management framework.In:Proc.of the 2002 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2002.114-130.http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
  • 10Ajmani S,Clarke DE,Moh CH,Richman S.ConChord:Cooperative SDSI certificate storage and name resolution.In:Proc.of the 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS 2002).Cambridge:Springer-Verlag,2002.141-154.http://pmg.csail.mit.edu/~ajmani/papers/lncs2429.pdf

共引文献40

同被引文献22

  • 1Adarand E, Hubeman B. Free riding on Gnutella [R]. Technical Report, Palo Alto: Xerox PARC, 2000.
  • 2Caronni G. Walking the Web of trust [C] //Sriram R D. Proc of the IEEE 9th Int'l Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises. IEEE Press, 2000: 153-159.
  • 3Wang Y, Vassileva J. Bayesian network-based trustmodel [C] // Proceeding of the IEEE/WIC international Conference on Web Intelligence (wr03), Halifax, Canada, 2003: 372-378.
  • 4Marti S, Garcia-Molina H. Limited reputation sharing in P2P Systems [C] //Proceeding of ACM Conference on Electronic Commerce (EC'04), New York, USA, 2004.
  • 5Selcuk A A, Uzun E, Pariente M R. Areputation-based trust management system for P2P networks [C] //IEEE International Symposium on Cluster Computing and Grid, 2004:251-258
  • 6Li Xiong, Ling Liu. A Reputation-Based Trust Model for Peer-to- Peer eCommerce Communities [C] //Proceedings of the IEEE International Conference on E-Commerce (CEC'03), 2003.
  • 7Altman J.PKI security for JXTA overlay networks,TR-12-03--06[R]. Palo Alto:Sun Microsystem,2003.
  • 8Wang Y,Vassileva J.Bayesian network-based trustmodel [C]//Proceedings of the IEEE/WIC International Conference on Web Intelligence, Halifax, Canada, 2003 : 372-378.
  • 9Marti S,Garcia-Molina H.Limited reputation sharing in P'2P systems[C]//Proceedings of ACM Conference on Electronic Commerce (EC' 04 ), New York, USA, May 2004.
  • 10Selcnk A A,Uzun E,Pariente M R.A reputation-based trust management system for P2P networks[C]//IEEE International Symposium on Cluster Computing and the Grid,April 19-22,2004:251-258.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部