期刊文献+

基于模糊模拟的主观信任评价模型研究 被引量:3

Research of subjective trust evaluation model based on fuzzy simulation
下载PDF
导出
摘要 通过对开放网络环境中主观信任评价方法的讨论,考虑到主观信任的模糊性,提出以可信性理论为基础的主观信任量化表述与评价方法,并给出了主体信任属性评价值为模糊变量情形下主观信任可信性的模拟计算方法。实例分析表明,该方法对主观信任评价是可行和有效的。 Through discussing the evaluation methods of subjective trust in open network,a new approach of subjective trust evaluation based on credibility theory is presented with considerations of the fuzzy nature of the subjective trust.And then under the situations that the key attributes of subjects are characterized as fuzzy variables,a simulation technique is given to calculate the credibility of the subjective trust.The example indicates that the presented approach is feasible and effectual for valuing the subjective trust in open network.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第16期102-104,共3页 Computer Engineering and Applications
基金 山东财政学院重点科研资助项目(No.07ZD01)
关键词 信任管理 主观信任 信任类型 可信性测度 模糊变量 trust management subjective trust trust class credibility measure fuzzy variable
  • 相关文献

参考文献11

  • 1Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[C]// Proc of IEEE Symposium on Security and Privacy,Oakland,CA, USA, 1996:164-173.
  • 2Chang E,Thomson P, Dillon T,et al.The fuzzy and dynamic nature of trust[C]//Leeture Notes in Computer Science, 2005,3592:161 - 174.
  • 3Jφseng A.Prospective for modeling trust in information security[C]// Proc of the Information Security and Privacy,Second Australasian Conference, SPA 1997: 2-13.
  • 4Beth T,Borcherding M,Klein B.Evaluation of trust in open networks[C]//Proc of European Symposium on Research in Security (ESORICS).Berlin : Springer-Verlag, 1994: 3-18.
  • 5Jφseng A.A logic for uncertain probabilities[J].Internafional Journal of Uncertainty, Fuzziness & Knowledge Based Systems, 2001,9 (3) : 279-311.
  • 6唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 7张仕斌,何大可.Fuzzy Model for Trust Evaluation[J].Journal of Southwest Jiaotong University(English Edition),2006,14(1):23-28. 被引量:7
  • 8曾文才.模糊综合评判失效的纷析与对策[J].系统工程理论方法应用,1995,4(2):53-59. 被引量:29
  • 9张仕斌,刘全,曾鸿.基于开放式网络环境的模糊自主信任模型[J].清华大学学报(自然科学版),2006,46(z1):1109-1114. 被引量:7
  • 10Liu B,Liu Y.Expected value of fuzzy variable and fuzzy expected value models[J].IEEE Transactions on Fuzzy Systems,2002,10(4): 445-450.

二级参考文献22

  • 1[9]Kamvar S D,Schlosser M T,Garcia-Molina H.The eigentrust algorithm for reputation management in P2P networks[A].Proc 12th Iht World Wide Web Conf[C].Budapest,Hungary:ACM Press,2003:640-651.
  • 2[10]Marti S,Garcia-Molina H.Limited reputation sharing in P2P systems[A].Proceedings of the 5th ACM Conf Electronic Commerce[C].New York,NY:ACM Press,2004:91 -101.
  • 3[11]Tutte W T.Graph Theory[M].Cambridge University Press,2004.
  • 4[14]CHAN Haowen,Perrig A,SONG Dawn.Random key predistribution schemes for sensor networks[A].Proc 2003IEEE Symp Security and Privacy[C].IEEE Computer Society,2003:197.
  • 5[15]Bremaud P.Markov chains:Gibbs fields,Monte Carlo simulation,and queues[M].New York:Springer-Verlag,1999.
  • 6[16]Watts D J,Strogatz S H.Collective dynamics of "small-world" networks[J].Nature,1998,393:440-442.
  • 7[17]Watts D J.Small Worlds:the Dynamics of Networks Between Order and Randomness[M].New Jersey:Princeton University Press,2004.
  • 8[1]Gambetta D.Can we trust trust?[A].Gambetta D,ed.Trust:Making and Breaking Cooperative Relations[C].Oxford:Basil Blackwell.1990:213-238.
  • 9[2]Jφsang A.Prospectives of modeling trust in information security[A].Proceedings of the 2nd Australasian Conf on Infor Security and Privacy[C].Sydney,Australia:Springer,1997.
  • 10[3]Jφsang A.A logic for uncertain probabilities[J].Int J Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.

共引文献265

同被引文献26

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部