期刊文献+

基于贝叶斯网络和行为日志挖掘的行为信任控制 被引量:9

Behaviour Trust Control Based on Bayesian Networks and User Behavior Log Mining
下载PDF
导出
摘要 目前评估网络用户行为的方法成本高且缺乏可操作性,为了便捷有效地对用户行为信任进行预测与评价,文中首先提出了基于贝叶斯网络的用户行为信任预测和控制算法,算法利用聚类和分布密度函数设置算法参数,建立可量化的证据与信任等级之间的对应关系.接着实现基于IIS和.Net底层架构的可配置式信任管理插件,形成用户行为日志,为预测和控制算法提供证据,免除了一般W eb日志的清洗工作.实验结果表明,文中算法可预测多属性下的行为信任等级,提高服务器的安全性和可靠性,并约束了用户的商业行为. The existing evaluation methods of network user behaviors are of high cost and low practicability. In or- der to effectively forecast and evaluate network user behavior trust with ease, a trust forecast and control algorithm of user behaviors is proposed based on Bayesian networks, in which the clustering algorithm and the distribution density function are used to set parameters, and the corresponding relationship between quantitive evidence and trust grade is obtained. Afterwards, the configurable plug-in of trust management is implemented based on IIS and. Net framework to create user behavior logs, thus providing evidences for the forecast and control algorithm and avoiding the data cleaning of common Web logs. Experimental results indicate that the proposed algorithm is capable of predicting the trust grade in multi-trust-attribute conditions, improving the security and reliability of the server and restricting the trade behaviors of the user.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第5期94-100,共7页 Journal of South China University of Technology(Natural Science Edition)
基金 国家自然科学基金委员会与中国民用航空总局联合资助项目(60776816) 广东省自然科学基金重点项目(8251064101000005) 广东省科技计划项目(2007B060401007) 广东工业大学青年基金资助项目(072058)
关键词 信任管理 行为信任 贝叶斯网络 用户行为 日志挖掘 trust management behavior trust Bayesian networks user behavior log mining
  • 相关文献

参考文献22

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 3Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems [ C] //Proceedings of Canadian Conference on Electrical and Computer Engineering. Winnipeg : IEEE ,2002 : 1424-1429.
  • 4耿延军,张红旗,周靖.基于模糊理论的行为信任评估研究[J].计算机工程与设计,2007,28(24):5906-5908. 被引量:2
  • 5刘玉龙,曹元大.分布网络环境主观信任模型研究[J].北京理工大学学报,2005,25(6):504-508. 被引量:19
  • 6Marsh Stephen Paul. Formalising trust as a computational concept [ D]. Scotland : Department of Computing Science and Mathematics, University of Stifling, 1994.
  • 7Blaze Matt, Feigenbaum Joan, Lacy Jack. Decentralized trust management [ C]// Proceedings of the 17th Symposiren on Security and Privacy. Los Mamitos : IEEE, 1996 : 164-173.
  • 8刘鹏,刘欣,陈钟.信任管理研究综述[J].计算机工程与应用,2004,40(32):39-43. 被引量:17
  • 9Blaze Matt, Feigenbaum Joan, loannidis John, et al. The role of trust management in distributed systems security [ C]//Proc of Security Issues for Mobile and Distributed Objects. London : Springer-Verlag ,2001 : 185-210.
  • 10Abdul-Rahman Alfarez, Hailes Stephen. A distributed trust model [ C]//Proceedings of New Security Paradigms Workshop. Cumbria : ACM, 1998:48-60.

二级参考文献97

共引文献775

同被引文献87

引证文献9

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部