期刊文献+

网格环境下层次信任模型研究 被引量:4

Research on hierarchical trust model in grid environment
下载PDF
导出
摘要 信任管理作为网格研究的核心内容,受到研究人员的高度关注。目前设计的模型中,实体域的信任值由直接信任值和推荐信任值合成,但引入推荐信任就必须对网格域进行层次划分。现有的划分方法只是主观地根据网格域之间的交易情况来划分层次,这种划分方式得到的推荐值的可靠性难以保证,并且不能防止联合欺骗的行为。基于对网格实体域行为的深入研究,给出了一个基于实体域行为的直接信任值动态量化模型,在此基础上,引入匹配指标和粗糙度的概念,给出了一个层次划分模型,利用该模型很好地解决了推荐信任值的计算问题,给出了一个信任评估模型,理论分析和实验结果表明,该模型能够保证推荐信任值的可靠性,并且防止了推荐过程中的联合欺骗,有效地解决了网格环境中信任评估问题。 Trust management is the central part of grid computing system and the model is a prime concern.In the present models,trust values are based on the combination of direct trust and recommend trust.For obtaining the recommend trust,grid domains must be classified.The current classification methods are subjectively based on the transactions in the grid domains.This can't ensure the reliability of recommends trust and it's hard to resist the effect of malicious recommendation.By the research of grid entitative behavior,dynamic quantification model for direct trust based on entitative behavior trust is presented.Match Index and roughness as two new concepts are introduced,and a classification model is given,which solve the problem of how to calculate the recommend trust value.The results of simulation experiments show that the model ensures the reliability of the recommend trust and prevent the malicious recommendation ,effectively evaluate the trust of entities.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第13期132-136,共5页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(the National Grand Fundamental Research 973 Program of China under Grant No.TG1999035801) 国家自然科学基金(the National Natural Science Foundation of China under Grant No.6053012)。
关键词 网格 信任 信誉 信任评估模型 grid computing system trust reputation trust evaluation model
  • 相关文献

参考文献11

  • 1Beth T,Borcherding M,Klein B.Valuation of trust in open networks[C]//Proceedings of the European Symposium on Research in Security (ESoRICS).Brighton :Springer-verglag, 1999:59-63.
  • 2Abdul-Rahman A,Hailes S.A distributed trust model[C]//Proceedings of the 1997 New Security Paradigms Workshop, Cumbria.UK : ACM Press, 1998:48-60.
  • 3Jφang A.A model for trust in security systems[C]//Proceedings of the 2nd Nordic Workshop on Secure Computer Systems,1997.
  • 4Mui L, Mohtashemi M, Halberstadt M.A computational model of trust and reputation[C]//Proceedings of the 35th Hawaii International Conferrence on System Sciences,2002.
  • 5Yahalom R, Klein B,Beth T.Trust relationships in secure systemsa distributed authentication perspective[C]//Proc 1993 IEEE Symp on Research in Security and Privacy,1993 :150-164.
  • 6Yahalom R,Klein B,Beth T.Trust-based navigation in distributed systems[J].Journal of Computing Systems,1994.
  • 7Reiter M K,Stubblebine S G.Resilient authentication using path independence[J].IEEE Transactions on Computers,1998,47(12).
  • 8Misztal B.Trust in modern societies[M].Cambridge MA:Polity Press,1996.
  • 9Buyya R,Stockinger H,Giddy J,et al.Economic models for management of resources in peer-to-peer and grid computing[C]//Technical Track on Cmmercial Applications for High-Performance Computing,SPIE International Symposium on the Convergence of Information Technologies and Communications(ITCom 2001),Denver,Colorado, USA, August, 2001 : 20-24.
  • 10Beth T,Boreherding M,Klein B.Valuation of trust in open systems[C]//Gollmann D.Volume 875 of Lecture Notes in Computer Science:Computer Security ESORICS'94.Berlin:Springer Verlag,1994 : 3-8.

同被引文献37

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部