期刊文献+

网格中推荐信任计算的关键问题分析

Research on the Computation of Recommend Trust in Grid
下载PDF
导出
摘要 在资源分布广泛、实体直接交互稀疏的网格环境中,推荐信任的计算作为网格信任管理模型中的重要组成部分,已成为一个研究的热点问题。该文在阐述网格信任模型基本概念的基础上,围绕推荐信任计算中的几个关键问题展开分析讨论,指出现有机制的利弊,归纳分析了若干相应改进机制,最后提出了关于下一步的研究方向。 In Grid Environment with the widespread distribution of grid resources and the sparseness of transactions between entities, the computation of recommend trust ,as a key component of trust management, has become a hot spot for research. Based on a presentation of the fundamental conceptions of grid trust model, this paper centered on several problems key to the computation of recommend trust Analysis and discussions are given , pointing out the advantages and drawbacks of the current mechanisms, as well as summarizing several relevant improved mechanisms. Finally, several proposals are offered for further research.
作者 杨林
出处 《计算机安全》 2008年第10期62-64,71,共4页 Network & Computer Security
基金 国家自然科学基金[60573141] 国家863计划[2007AA701302] 江苏省"六大人才高峰"第二批资助项目资助
关键词 网格安全 信任 推荐信任 grid security trust recommend trust
  • 相关文献

参考文献6

  • 1Alfarez Abdul-Rahman;Stephen Hailes.Supporting Trust in Virtual Communities,2000.
  • 2Farag Azzedin;Muthucumaru Maheswaran.Evolving and Managing Trust in Grid Computing Systems.
  • 3Xiangli qu;Xuejun Yang;Wei Chen.A Bias-tuned Dishonesty Eeputation Evaluation Method for Trust Establishment in Grid,2006.
  • 4Farag Azzedin;Muthucumaru Maheswaran.A Trust brokering System and Its Application to R,esource Management in Public-Resource Grids,2004.
  • 5Gui Xiaolin;Xie Bing;Lin Yinan;Qian Depei.Study on the Behavior-based Trust Model in Grid Security System.
  • 6陈建刚,王汝传,王海艳.网格资源访问的一种主观信任机制[J].电子学报,2006,34(5):817-821. 被引量:14

二级参考文献10

  • 1周明辉,梅宏,焦文品.基于中间件的可定制信任管理框架[J].电子学报,2005,33(5):820-826. 被引量:8
  • 2盛骤 谢式千 潘承毅.概率论与数理统计[M].高等教育出版社,1997..
  • 3Josang A,Knapskog S J.A metric for trusted systems[A].Proceedings of the 21st National Security Conference[C].NSA,1998.16-29.
  • 4Yu B,Singh M P.Distributed reputation management for electronic commerce[J].Computational Intelligence,2002,18(4):535-549.
  • 5Yu B,Singh M P.Detecting deception in reputation management[A].Proceedings of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems[C].Melbourne,Australia,2003.73-80.
  • 6Lin C,Varadharajan V,Wang Y,Pruthi V.Enhancing grid security with trust management[A].Services Computing Proceedings[C].IEEE,2004.303-310.
  • 7Song S,Hwang K.Fuzzy trust integration for security enforcement in grid computing[A].International Symposium on Network and Parallel Computing(NPC2004)[C].Heidelberg:Springer-Verlag GmbH,2004.
  • 8Azzedin F,Maheswaran M.Evolving and managing trust in grid computing systems[A].Electrical and Computer Engineering,IEEE CCECE 2002[C].Canadian,2002.1424-1429.
  • 9Azzedin F,Maheswaran M.A trust brokering system and its application to resource management in public-resource grids[A].18th International Parallel and Distributed Processing Symposium (IPDPS'04)[C].Santa Fe:IEEE Computer Society,2004.22-32.
  • 10唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部