期刊文献+

基于主观逻辑的群体信任模型 被引量:7

Group trust model based on subjective logic
下载PDF
导出
摘要 目前信任模型的研究仅仅涉及一对一的个体信任关系,并没有充分考虑对一对多、多对一以及多对多的群体信任关系的支持。从信任的主观性角度出发,提出了4种基本群体约束模式及其嵌套复合来刻画群体构成约束,在此基础上提出了一种基于主观逻辑的群体信任模型,给出了4种基本约束模式及其嵌套复合的直接信任度和推荐信任度的度量公式,对于群体信任关系,特别是软件群体的信任关系提供了很好的支持。通过模型的表达能力和有效性分析表明:群体信任模型具有较好的适用性和实用性。 Today's dynamic trust model only research one to one trust relation and there are no researches about one to many, many to one, many to many trust relation. Based on subjective logic, four basic group constraint patterns and their nesting to compose a group were proposed at the point of view of trust's subjectivity and supports group trust relation. A group dynamic trust model based on these four basic constraint patterns was proposed, and direct trust degree and recommendation trust degree formulae of basic constraint patterns and their nesting were brought up. The model has good applicability and practicability through model's expressive power analysis and model's validity analysis.
出处 《通信学报》 EI CSCD 北大核心 2009年第11期8-14,共7页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311100) 北京工业大学青年基金资助项目(X1007011200801)~~
关键词 信任 群体信任关系 信任模型 主观逻辑 trust group trust relation trust model subjective logic
  • 相关文献

参考文献15

  • 1王东安.网格计算中信任模型及其应用研究[D].中国北京:中国科学院计算技术研究所,2005.
  • 2JOSANG A. A logic for uncertain probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3):279-311.
  • 3JOSANG A, KNAPSKOG S J. A metric for trusted systems[J]. Global IT Security, Austian Computer Society, 1998.541-549.
  • 4ANDERSON J E Computer Security Technology Planning study[R]. Bedford: HanscomAFB, 1972.
  • 5BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[A]. Proc of the European Sysposium on Research in Security (ESORICS)[C]. Brighton: Springer-Verlag, 1994. 3-8.
  • 6MARSH S. Formalising Trust as a Computational Concept[D]. Scotland, UK: University of Stirling, 1994.
  • 7BLAZE M, FEIGENBAUM J, STRAUSS M. Compliance checking in the PolicyMaker trust management system[A]. Proc of the Second International Conference on Financial Cryptography Table of Contents[C]. London: Springer-Verlag, 1998.254-274.
  • 8ALMENAREZ E MARIN A, CAMPO C, et al. PTM: A pervasive trust management model for dynamic open environments[A]. Proc of the 1st Workshop on Pervasive Security, Privacy and Trust[C]. Boston: IEEE Computer Society Press, 2004. 1-8.
  • 9SONG S S, H'WANG K. Fuzzy trust integration for security enforcement in grid computing[A]. Proc of the Int'l Symp on Network and Parallel Computing (NPC 2004)[C]. Berlin: Springer-Verlag, 2005. 9-21.
  • 10王伟,曾国荪.一种基于Bayes信任模型的可信动态级调度算法[J].中国科学(E辑),2007,37(2):285-296. 被引量:22

二级参考文献24

  • 1杨芙清.软件工程技术发展思索[J].软件学报,2005,16(1):1-7. 被引量:268
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1250
  • 3袁禄来,曾国荪,姜黎立,蒋昌俊.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. 被引量:53
  • 4Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 5Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 6Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 7Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 8Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 9Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 10Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.

共引文献498

同被引文献64

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部