期刊文献+

一种主观信任评价模型的研究 被引量:5

Research of subjective trust valuation model
下载PDF
导出
摘要 以开放式网络环境中主体间的信任(简称主观信任)为研究背景,提出了一个较完整的主观信任评价模型;并给出了合理的直接信任评价和推荐信任评价的计算公式及相关的其他解决办法,解决了主观信任的评价;通过仿真实验的研究与分析,进一步验证了该主观信任评价模型的可行性与合理性。 Taking trust between various entities(i.e.subjective trust) as the background in the open network,this paper proposed a subjective trust valuation model,provided the concrete and reasonable formula of direct trust and recommendation trust valuation and the other solutions,which had solved the valuation of subjective trust.Through the research and analysis of simulate experiment,the feasibility and the rationality of this trust valuation model is further confirmed.
作者 甘刚 张仕斌
出处 《计算机应用研究》 CSCD 北大核心 2008年第6期1839-1841,1849,共4页 Application Research of Computers
基金 四川省青年基金资助项目(2006B062)
关键词 主观信任 信任评价 直接信任 间接信任 subjective trust trust valuation direct trust recommendation trust
  • 相关文献

参考文献6

  • 1ABDUL-RAHMAN A, HAILES S. A distributed trust model[ C] // Proc of the 1997 New Security Paradigms Workshop. Cumbria: ACM Press, 1998:48-60.
  • 2BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[ C] //GOLLMANN D. Proc of European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994:3-18
  • 3JφSANG A, KNAPSKOG S J. A metric for trusted systems[ C] //Proc of Global IT Security. Wien : Austrian Computer Society, 1998 : 541-549.
  • 4徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. 被引量:69
  • 5张仕斌,何大可,遠藤誉.基于模糊聚类的信任类型动态定义机制研究[J].计算机工程,2006,32(9):19-21. 被引量:18
  • 6PERLMAN R. An overview of PKI trust models [J], IEEE Network, 1999, 13(6):38-43.

二级参考文献12

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9Beth T,Borcherding M,Klein B.Valuation of Trust in Open Network[C].Proceedings of the European Symposium on Research in Security.Brighton:Springer-Verlag,1994:3-18.
  • 10Chu Y H,Feigenbaum J,LaMacchia B,et al.REFEREE:Trust Management for Web Applications[J].World Wide Web Journal,1997,2(2):127-139.

共引文献84

同被引文献46

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部