期刊文献+

群组协同决策中基于决策者可信的信任模型研究 被引量:2

Research on Trust Model Based on Trusted Decision Makers in Group Collaborative Decision Making
下载PDF
导出
摘要 针对群组协同决策支持系统的特点,提出了基于决策者可信的信任模型.该模型通过决策者实体的历史行为证据来建立实体之间的信任关系,评估分布式环境下动态的决策者的可信度.给出了基于历史交互行为的直接信任度、间接信任度和通过信息熵理论来计算决策者的总体信任度的计算方法,为系统的安全决策提供了有效的解决方案.通过模拟实验验证了该信任模型的可靠性. This paper presents a trust model based on trusted decision makers with the characteristics of Group Collaborative Decision Supported Systems(GCDSS).The trust model establishes the trust relationship among entities and evaluates the trust value of dynamic decision makers in distributed environment by historical actions of decision makers.The paper proposes a method of direct trust value computation,indirect trust value computation based on historical actions and integrated trust value computation by using entropy theory,which provides an effective resolvent for secure decision making.Lastly,the paper validates the reliability of the trust model by simulation experiment.
作者 彭涛 窦万峰
出处 《南京师范大学学报(工程技术版)》 CAS 2010年第2期79-83,共5页 Journal of Nanjing Normal University(Engineering and Technology Edition)
基金 江苏省高校自然科学基金(07KJD520112)
关键词 信任模型 群组协同决策支持系统 信任关系 决策者可信 trust model GCDSS trust relationship trusted decision makers
  • 相关文献

参考文献7

  • 1徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 2Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[C] // Dale J,Dinolt G.Proceedings of the 17th Symposium on Security and Privacy.Oakland,CA:IEEE Computer Society Press,1996:164-173.
  • 3Winsborough W H,Seamons K E,JonesV E.Automated trust negotiation[C] // DARPA Information Survivability Conference and Exposition,2000.New York; IEEE Computer Society,2000:88-102.
  • 4Abdul-Rahman A,Hailes S.A distributed trust model[C] // Proc of the 97 New Security Paradigms Workshop.Cumbria:ACM,1997:48-60.
  • 5Beth T,Borcherding M,Klein B.Valuation of trust in open network[C] // Gollmann D.Proceedings of the European Symposium on Research in Security(ESORICS).Brighton UK:Springer-Verlag,1994:3-18.
  • 6Wang Yao,VaSSileva J.Trust and reputation model in peer-to-peer networks[C] // The Third International Conference on Peer-to-Peer Computing.Singapore; IEEE,2003:761-763.
  • 7Wilensky U.NetLogo[CP/OL].[2010-01-16].http://ccl.northwestern.edu/netlogo/.Center for Connected Learning and Computer Based Modeling,Northwestern University,Evanston,IL,1999.

二级参考文献20

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139.
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf.

共引文献112

同被引文献21

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部