期刊文献+

基于模糊理论的主观信任综合评价模型研究 被引量:12

Research of subject trust comprehensive evaluation model based on fuzzy theory
下载PDF
导出
摘要 在开放式网络环境中,信任是安全通信的重要保证。针对主观信任评价带有不确定性,建立了基于模糊理论的主观信任综合评价模型。研究了模糊理论在主观信任评价中的应用,给出了信任问题的定义机制和综合评价机制。最后通过实际数值例子证明了该方法具有有效性、合理性及工程可行性。通过仿真实验比较,证明了该方法能够使网络性能得到改善。 Trust is an important guarantee for secure communications in the open networks. This paper proposed subject trust comprehensive evaluation model based on the fuzzy theory according to the subject trust evaluation with uncertainty. Then studied the application of fuzzy theory in the proposed evaluation model, and discussed the definition mechanisms of trust problem and the evaluation mechanisms of trust. At last, the actual example indicates that the model is reasonable, effective and practical. The simulation experiments show that the method can make the network performance improved.
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1860-1862,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60873082 60903058)
关键词 模糊理论 主观信任 特征向量矩阵 综合评价 fuzzy theory subject trust eigenvector matrix comprehensive evaluation
  • 相关文献

参考文献3

二级参考文献11

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 10邓爱林,朱扬勇,施伯乐.基于项目评分预测的协同过滤推荐算法[J].软件学报,2003,14(9):1621-1628. 被引量:555

共引文献388

同被引文献135

引证文献12

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部