期刊文献+

基于主观逻辑的信任搜索算法 被引量:3

Trust Search Algorithm Based on Subjective Logic
下载PDF
导出
摘要 针对现有信任模型中信任搜索算法不能准确有效地对信任进行搜索与合成,利用主观逻辑理论对信任进行量化与计算,提出基于主观逻辑的信任搜索算法。算法由两个关键技术组成:信任路径提取算法与信任路径合成算法。仿真实例验证了该算法在信任合成时减少了信任网络中冗余信息对信任合成的影响,提高了信任搜索效率,使得合成结果更加准确。 The trust search algorithm in the current trust models can not search and combine trust effectively and exactly. This paper uses subjective logic theory to quantify and compute trust, develops a new trust search algorithm based on subjective logic which is composed of an algorithm of obtaining trust paths and an algorithm of combination of trust paths. According to the experimental results, the algorithm makes the search of trust information effective, reduces the bad effect caused by redundant information, and makes the combination exact.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第3期178-180,204,共4页 Computer Engineering
关键词 主观逻辑 信任路径 信任合成 subjective logic trust path combination of trust
  • 相关文献

参考文献6

  • 1Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks[C]//Proceedings of the European Symposium on Research in Security,. Brighton: Springer-Verglag, 1999: 59-63.
  • 2Abdul-Rahman A, Hailes S. A Distributed Trust Model[C]// Proceedings of the 1997 New Security Paradigms Workshop. Cumbria: ACM Press, 1998: 48-60.
  • 3Mohtashemi M, Mui L. Evolution of Indirect Reciprocity by Social Information: the Role of Trust and Reputation in Evolution of Altruism[J]. Journal of Theoretic Biology, 2003, 223(4): 523-531.
  • 4唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 5Jφsang A, Hayward R, Pope S. Trust Network Analysis with Subjective Logic[C]//Proc. of Australasian Computer Science Conference. Australasian: [s. n.], 2006.
  • 6Jφsang A, Gray L, Kinateder M. Simplification and Analysis of Transitive Trust Networks[J]. Web Intelligence and Agent Systems Journal, 2006, 4(2): 139-161.

二级参考文献1

共引文献235

同被引文献29

  • 1唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3Kamvar S D, Schlosser M T, Molina G H. The EigenTrust Algorithm for Reputation Management in P2P Networks[C]//Proc. of the 12th Int'l World Wide Web Conf.. New York, USA: ACM Press, 2003.
  • 4Li Xiong, Ling Liu. A Reputation-based Trust Model for Peer-to-Peer E-commerce Communities[C]//Proc. of CEC'03. Newport Beach, California, USA: IEEE Press, 2003.
  • 5Yao Wang, Vassileva J. Trust and Reputation Model in Peer-to-Peer Networks[C]//Proc. of the 3rd International Conference on Peer-to-Peer Computing. [S. l.]: IEEE Press, 2003.
  • 6Reiter M K, Stubblebine S G. Resilient Authentication Using Pathindependence[J]. IEEE Transactions on Computers, 1998, 47(12): 1351-1362.
  • 7BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[A]. Proceedings of the 17th Symposium on Security and Privacy. Oakland[C]. IEEE Computer Society Press, 1996.164-173.
  • 8ABDUL-RAHMAN A, HAILES S. A distributed trust model[A]. Proc of the 1997 Workshop on New Security Paradigms[C]. ACM Press, 1997.48-60.
  • 9JOSANG A. A subjective metric of authentication[A]. Proc of the 5th European Symposium on Research in Computer Security[C]. London, Springer-Verlag, 1998.329-444.
  • 10WANG Y, VASSILEVA J. Bayesian network-based trust model[A]. Proc of the IEEE Computer Society WIC International Conference on Web Intelligence[C]. Washington DC: IEEE Computer Society, 2003. 372-378.

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部