期刊文献+

网格环境下基于灰色理论多属性综合信任评价模型 被引量:5

Evaluation model of multi-attribute comprehensive trust based on gray theory in grid
下载PDF
导出
摘要 针对传统信任模型的不足,提出了以灰色系统理论为基础的多属性综合信任评价模型。模型通过定义信任评价等级灰类及其白化权函数,计算网络实体各个属性的灰色评价权,结合层次分析法计算属性权重,最后给出实体灰色综合信任值及信任等级灰类。实例表明,该模型计算简便、评价可靠,为网格环境下解决多属性综合信任评价问题提供了新的方案。 Aiming at the deficiency of traditional trust model, this paper put forward evaluation model of multi-attribute comprehensive trust based on gray system theory. Via defining grade of gray cluster and white-nization weight function of trust evaluation, computing gray evaluation weight of each entity in Web and attribute weight through analytic hierarchy process, presen- ted gray comprehensive trust value and grade of gray cluster of the entities finally. Practical examples show that the model is not only good at computing and evaluating , but also provide a new method to solve evaluation problem of multi-attribute comprehensive trust in grid.
出处 《计算机应用研究》 CSCD 北大核心 2009年第6期2148-2150,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60503012) 国家高技术研究发展计划项目(2007AA01Z405)
关键词 灰色系统 灰色评价权 信任评估 gray system gray evaluation weight trust evaluation
  • 相关文献

参考文献7

二级参考文献14

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2Seamus Moloney.Simulation of a distributed recommendation system for pervasive networks[C].In:Proceedings of the 2005 ACM symposium on Applied computing,2005,1577-1581.
  • 3Georgios Pitsilis,Lindsay Marshall.A model of trust derivation from evidence for use in recommendation systems[EB/OL].School of Computing Science,University of Newcastle Upon-Tyne.http://www.cs.ncl.ac.uk/research/pubs/trs/papers/874.pdf.
  • 4Daniel Lemire.Scale and translation invariant collaborative filtering systems[J].In:Information Retrieval,2005,8(1):129-150.
  • 5Michelle Anderson,Marcel Ball,Harold Boley,Stephen Greene.RACOFI:a rule-applying collaborative filtering system[C].In:Proc.IEEE/WIC COLA'03,Halifax,Canada,October2003.http://www.daniel-lemire.com/fr/documents/publications/racofi-nrc.pdf.
  • 6Xie D Q,Leng J.PKI principle and technology[M].Beijing:Tsinghua University Press,2004,135-141.
  • 7Beth T,Borcherding M,Klein B.Valuation of trust in open networks[A].In:Gollmann D,ed.Proceedings of the European Symposium on Research in Security (ESORICS)[C].Brighton:Springer-Verlag,1994,3-18.
  • 8Josang A.A model for trust in security systems[EB/OL].In:Proceedings of the 2nd Nordic Workshop on Secure Computer Systems,1997.http://security.dstc.edu.au/staff/ajosang/papers.html
  • 9Wang Q Y.Grey math tutorial[M].Wuhan:Huazhong University Press,1996,12-164.
  • 10Deng J L.Grey system theory tutorial[M].Wuhan:Huazhong University Press,1990,128-134.

共引文献265

同被引文献75

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部