期刊文献+

基于模糊理论的Web服务信任评估模型 被引量:9

Web Services Trust Evaluation Model Based on Fuzzy Theory
下载PDF
导出
摘要 针对Web服务环境的开放性、欺骗性和不确定性等特征,提出一种基于模糊理论的Web服务信任评估模型——WSTrustM。该模型采用模糊理论的方法对信任度进行度量并对信任评估因素进行组合权重分配,利用模糊集合理论的隶属度概念对实体之间的信任关系进行等级划分。仿真实验结果证明,该模型在Web服务信任评估方面更加准确,可以降低交互风险、保证交互的成功率。 Aiming at these features of Web service environment such as open,deceptive and uncertain,a Web service trust evaluation model——WSTrustM based on the fuzzy theory is proposed.The model uses the fuzzy theory method to measure trust and combination of weight distribution of trust evaluation of factors,and uses membership degree of fuzzy sets theory to divide grade of entities trust relation.Simulation experimental result shows that the model on the evaluation of Web service trust is more accurate and more reliable,reduces the interaction risk and ensures the success rate of interaction.
作者 李季 朱小勇
出处 《计算机工程》 CAS CSCD 北大核心 2010年第15期25-28,共4页 Computer Engineering
基金 国家自然科学基金资助项目(90818028)
关键词 信任评估模型 信任度计算 模糊集 信任决策 trust evaluation model trust degree calculation fuzzy sets trust decision
  • 相关文献

参考文献7

  • 1Beth T,Borcherding M,Klein B.Valuation of Trust in Open Networks[C]//Proc.of European Symposium on Research in Computer Security.Brighton,UK:[s.n.],1994:3-18.
  • 2Schillo M,Funk P,Rovatsos M.Using Trust for Detecting Deceitful Agents in Artificial Societites[J].Applied Artificial Intelligence,2000,14(8):825-849.
  • 3Josang A.Prospectives for Modeling Trust in Information Security[C]//Proc.of Australian Conference on Information Security and Privacy.Sydney,Australian:Springer-Verlag,1997.
  • 4窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 5唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 6Yu B,Singh M P.An Evidential Model of Distributed Reputation Management[C]//Proc.of the 1st International Joint Conference on Autonomous Agents and Muti-agent System.[S.1.]:ACM Press,2002:294-301.
  • 7陈书义,闻英友,赵宏.基于模糊集合的可信计算信任模型评估[J].计算机科学,2008,35(11):39-41. 被引量:13

二级参考文献11

  • 1郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 3TCG. TPM Work Group [EB/OL]. https: //www. trustedcomputinggroup. org/groups/tpm/, 2007-10
  • 4Microsoft. Next-Generation Secure Computing Base home page [EB/OL]. http://www. microsoft. com/resources/ngscb, 007-01
  • 5Intel. LaGrande Technology Architectural Overview [EB/OL]. http://www. intel. com/teehnology/security/downloads/LT_ Arch_Overview. pdf, 2007-01
  • 6Alan Z. Coming soon to VMware, Microsoft, and Xen: AMD Virtualization Technology Solves Virtualization Challenges [EB/OL]. http://www. devx.com/amd/Artide/30186,2007-01
  • 7JΦsang A. A Subjective Metric of Authentication//Proceedings of the European Symposium on Research in Security (ESORICS'98). Louvain-la-Neuve, Belgium, 1998:329-344
  • 8Patel J, Teacy W T, Luke, et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources//Proceedings of Trust Management Third International Conference (iTrust 2005). INRIA-Rocquencourt, France, 2005:193-209
  • 9TCG. TCPA Main Specification version 1. 1 b [EB/OL]. https://www. trustedcomputinggroup. org/specs/TPM/TCPA_ Main_TCG_Architecture_v1_1b. pdf, 2007-10
  • 10徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113

共引文献538

同被引文献73

引证文献9

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部