期刊文献+

基于模糊理论的间接推荐信任传递研究 被引量:3

Indirect Recommendation Trust Transitivity Study based on Fuzzy Theory
原文传递
导出
摘要 信任关系的建立是网络实体交互的前提和基础。文章针对信任的模糊性,在模糊理论的基础上,提出了一种间接推荐信任传递模型,不仅把模糊逻辑推理同信任传递结合起来,在无直接推荐时利用间接推荐得到实体间的信任值;而且利用图论知识找寻信任路径,解决了多路径信任评估的问题。该模型可以全面地评估实体的信任程度,很大程度上保障了网络实体行为的安全可靠。 Trust relationship establishment is fundamental for network entity interaction. According to the fuzziness of trust, this paper proposes an indirect recommendation trust transitivity model based on fuzzy theory. This model not only can gain the trust value between entities which have no direct recommendation by the fuzzy reasoning method, but also solve multi - roads trust evaluation problem by utilizing graph theory to find trust roads. This model can evaluate the entities' trustworthiness completely, security and reliability of network entities' behavior can be guaranteed greatly.
作者 龙毅宏 潘丹
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2009年第16期114-117,共4页 Journal of Wuhan University of Technology
关键词 模糊理论 间接推荐 信任传递 fuzzy theory indirect recommendation trust transitivity
  • 相关文献

参考文献5

  • 1Cristina Satizabal, Rafael Paez, Jordi Forne. PKI Trust Relationship.from a Hybrid Architecture to a Hierarchical Model[ C]// Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06). Vienna:[s. n. ] ,2006: 563-570.
  • 2Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks[C]//Proceedings the European Symposium on Research in Computer Security. Springer-Verlag: Brighton UK, 1994: 3-18.
  • 3Jφsang A. Trust-based Decision Making for Electronic Transactions[C]//Proeeedings of the 4^th Nordic Workshop on Secure Computer Systems(NORDSEC'99). Sweden:Stockholm University, 1999:1-21.
  • 4唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 5卢开澄,卢华明.图论及其应用[M].北京:清华大学出版社,2002.12-74.

二级参考文献10

  • 1M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989.
  • 2R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164.
  • 3A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997.
  • 4T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18.
  • 5A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311.
  • 6E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998.
  • 7D. Gambetta. Can we trust trust? In: Trust: Making and Breaking Cooperative Relations (Electronic edition), Department of Sociology, University of Oxford, Chapter 13. http: ∥www. sociology. ox. ac. uk/papers/gambetta 213 ~ 237. pdf, 2000.213~237.
  • 8LA扎德.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982.63-84.
  • 9C. C. Lee. Fuzzy logic in control systems: Fuzzy logic controller-Part Ⅱ. IEEE Trans. System, Man, and Cybernetics, 1990, 20(2): 419~435.
  • 10唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236

共引文献85

同被引文献19

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部