期刊文献+

基于模糊逻辑的群体信任模型 被引量:3

Group Trust Model Based on Fuzzy Logic
下载PDF
导出
摘要 从信任的主观性和模糊性角度出发,提出了一种基于模糊逻辑的群体信任模型,抽象出顺序模式、选择模式、循环模式和并行模式4种群体构成的基本约束模式及其嵌套复合来刻画群体中个体之间的约束关系,并分别给出了信任度的度量方法.群体信任模型对群体信任关系和特别软件群体的信任关系提供了很好的支持. A group trust model based on fuzzy logic is proposed from the aspect of trust's subjectivity and fuzzy nature and.Four basic group constraint patterns,such as sequence pattern,select pattern,loop pattern and parallel pattern,are proposed.Constraint relation among individuals in a group can be described by four basic constraint patterns and their nesting.The trust degree measure methods of the four basic constraint patterns and their nesting are proposed.The group trust model supports group trust relation,especially software group trust relation.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第7期1004-1008,共5页 Journal of Beijing University of Technology
基金 国家'九七三'计划资助项目(2007CB311100) 北京工业大学博士科研启动基金资助项目(52007013200704) 北京工业大学青年基金资助项目(97002011200702/X1007011200801)
关键词 信任 群体信任关系 信任模型 模糊逻辑 trust group trust relation trust model fuzzy logic
  • 相关文献

参考文献14

  • 1王东安.网格计算中信任模型及其应用研究[D].中国北京:中国科学院计算技术研究所,2005.
  • 2ANDERSON J P. Computer security technology planning study[ R]. Bedford: Hanscom AFB, 1972.
  • 3BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network [ C ]//Proc of the European Symposiums on Research in Security ( ESORICS). Brighton : Springer-Verlag, 1994 : 3-8.
  • 4MARSH S. Formalizing trust as a computational concept[ D]. Scotland, UK: University of Stirling, 1994.
  • 5JOSANG A. A logic for uncertain probabilities [ J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3) : 279-311.
  • 6JOSANG A, KNAPSKOG S J. A metric for trusted systems [ J ]. Global IT Security, Austrian Computer Society, 1998: 541-549.
  • 7BLAZE M, FEIGENBAUM J, STRAUSS M. Compliance checking in the PolicyMaker trust management system [ C ] // Proceedings of the Second International Conference on Financial Cryptography Table of Contents. London: Springer-Verlag, 1998 : 254-274.
  • 8ALMENAREZ F, MARIN A, CAMPO C, et al. PTM: A pervasive trust management model for dynamic open environments [C]//Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust. Boston: IEEE Computer Society Press, 2004 : 1-8.
  • 9SONG S S, HWANG K. Fuzzy trust integration for security enforcement in grid computing[ C]//Proceedings of the 2004 International Symposiums on Network and Parallel Computing (NPC 2004). Berlin: Springer-Verlag, 2005: 9-21.
  • 10王伟,曾国荪.一种基于Bayes信任模型的可信动态级调度算法[J].中国科学(E辑),2007,37(2):285-296. 被引量:22

二级参考文献23

  • 1杨芙清.软件工程技术发展思索[J].软件学报,2005,16(1):1-7. 被引量:268
  • 2袁禄来,曾国荪,姜黎立,蒋昌俊.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. 被引量:53
  • 3Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 4Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 5Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 6Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 7Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 8Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 9Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 10Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.

共引文献387

同被引文献31

  • 1Golbeck,Jennifer,Hendler,et al.Inferring binary trust relations hips in Web-based social networks[J].ACM Transactions on Intemet Technology(TOIT),2006,6(4):497-529.
  • 2Bhuiyan T,Xu Y,Josang A.Integrating trust with public reputation in location-based social networks for recommendation making[C]// Proceedings of IEEE/W/IC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.Sydeny,NSW,2008:107-110.
  • 3Brickley D,Miller L.FOAF Vocabulary Specification 0.91.Namespace Document[OL].http://xmlns.com/foaf/0.
  • 4Li Xiong,Ling Liu.A Reputation-Based Trust Model for Peerto-Peer Ecommerce Communities[C]// Proceedings of IEEE Conference of E-Commerce.ACM Press,2003:275-284.
  • 5Chou A Y.The analysis of online social networking; How technology is changing e-commerce purchasing decision[J].International Journal of Information Systems and Change Manngement,2010,4(4):353-365.
  • 6HANG J, JIANG J F, SHU L, et al. Management and applications of trust in wireless sensor networks : A survey[ J]. Journal of Computer and System Sciences, 2013, 80: 6024517.
  • 7YU Y, LI K, ZHOU W, et al. Trust mechanisms in wireless sensor networks: Attack analysis and counter- measures [ J ]. Journal of Network and Computer Applica- tions, 2012, 35(3): 867-880.
  • 8KHALID O, KHAN SAMEE U, MADANI SAJJAD A, et al. Comparative study of trust and reputation systems for wireless sensor networks [ J]. Security and Communica- tion Networks, 2013, 6(6): 6694588.
  • 9AYMAN T, AYMAN K, ALI C, et al. Fuzzy reputation- based trust model [ J ]. Applied Soft Computing Journal, 2011, 11(1) : 345-355.
  • 10XIA H, JIA Z, JU L, et al. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory [ J ]. IET Wireless Sensor Sys- tems, 2011, 1(4) : 248-251.

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部