期刊文献+

开放网络环境中的信任管理框架 被引量:2

Trust-Management Framework in Open Network
下载PDF
导出
摘要 在开放网络环境中,运用用户行为及模糊理论对信任框架进行了建模.给出了信任的定义和信任的计算机制及算法.该算法具有对恶意节点屏蔽能力.引入亲疏系数的概念,可同时解决恶意节点的定义方式以及信任网络初建立时各节点信任度初始化的问题.扩展了云模型,使得信任度期望接近信任评价区间临界区域时,节点拥有与一般信任度期望远离临界区域时完全不同的信任程度.讨论了云模型各参数对信任度计算的影响.通过引入时间衰减系数及行为影响系数,较好地解决了信任的模糊性随时间及行为变化的动态性特点. In open network, the usage and fuzzy set theory have been used to model the issues of trust management. The definition of trust class and the algorithm of trust-computing are discussed. By pre- senting the affinities coefficient, the derivation algorithm of trust has a good ability of shielding on ma- licious nodes. At the same time, the problems of how to define the malicious nodes and how to init the trustworthiness of the nodes are resolved. The cloud model is extended to define the trust model infor- mation and the parameters are discussed in detail. By proving the time decay coefficient and usage ef- fecting coefficient, the fuzziness and dynamic variation characters are considered and resolved. The ex- periments are also designed to evaluate the correctness and performances of the proposed algorithm.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2009年第1期126-130,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家重点基础研究发展计划(973项目)(2007CB310704) 国家"863计划"项目(2006AA01Z456) 教育部博士点基金(20060013007) 北京市自然科学基金(4073037)
关键词 信任管理 用户行为 亲疏系数 云模型 trust management usage control affinities coefficient cloud model
  • 相关文献

参考文献8

  • 1Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]//Proceedings of the 17^th Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996: 164-173.
  • 2Li Ninghui, Mitchell J C, Winsborough W H. Design of a role-based trust management framework[ EB/OL]//Los Alamitos, California: IEEE Computer Society Press, 2002 (2003-04-20) [ 2008-06-20 ]. http://crypto. stanford. edu/- ninghui/papers/rt _ oakland02. pdf.
  • 3Almenarez F, Marin A, Diaz D, et al. Developing a model for trust management in pervasive devices [ C ] ff Proceedings of the 3^rd IEEE int'l Workshop on Pervasive Computing and Communication Security. Washington: IEEE Computer Society Press, 2006: 267-272.
  • 4Melaye D, Demazeau Y. Bayesian dynamic trust model [C] //LNCS3690.Berlin: Springer-Verlag, 2005: 480- 489.
  • 5Sandhu R, Park J. The UCONABC usage control model [J ]. Transaction on Information and System Security, 2004, 7(1):128-174.
  • 6Ruohomaa S, Kutvonen L. Trust management survey [C]//LNCS 3477. Berlin: Springer-Verlag, 2005: 77- 92.
  • 7石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10. 被引量:21
  • 8田春岐,邹仕洪,王文东,程时端.构造分布式P2P环境下抗攻击信任管理模型[J].北京邮电大学学报,2007,30(3):62-65. 被引量:6

二级参考文献41

共引文献25

同被引文献47

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部