期刊文献+

基于概率和可信度方法的普适计算信任模型 被引量:1

Probability and credibility-based trust model for pervasive computing
下载PDF
导出
摘要 根据普适计算环境下信任的特点以及现有信任模型存在的不足,提出一种基于概率和可信度方法的信任模型。模型综合考虑影响信任的主观和客观因素,通过主观信任、直接信任和推荐信任得到总体信任。计算推荐信任时引入基于可信度的匹配度算法对多个推荐实体进行取舍,在计算前就把不符合推荐条件的实体排除,再结合对推荐链路的更新,能够更有效地避免恶意推荐的影响,计算出来的信任值可靠度更高。 According to the traits of trust in pervasive computing and the shortages of the existing trust model, a probability and credibility-based trust model was given. Considering the subjective and objective factors, the trust was acquired by subjective trust, directive trust and recommendatory trust. Based on the credibility-based matching degree algorithm, the entities falling short of recommendatory condition were excluded before calculation. And combining the update of recommendatory chain, the problem of vicious recommendation was solved. The trust was more credible.
出处 《计算机应用》 CSCD 北大核心 2010年第9期2379-2382,共4页 journal of Computer Applications
基金 国家863创新基金资助项目(2009AAJ124)
关键词 普适计算 信任 概率理论 可信度方法 pervasive computing trust probability theory credibility theory
  • 相关文献

参考文献5

  • 1HE R, NIU J W, ZHANG G W. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing [ C]/! Third International Symposium on Parallel and Distributed Processing and Applications, LNCS3758. Berlin: Springer, 2005:541-552.
  • 2ALMENAREZ F, MARTIN A, DIAZ D, et al. Developing a model for trust management in pervasive devices [ C]// Proceedings of the 3rd IEEE International Workshop on Pervasive Computing and Communication Security. Washington, DC: IEEE Computer Society Press, 2006:267-272.
  • 3SONG S S, HWANG K. Fuzzy trust integration for security enforcement in grid computing [ C]// NPC2004: Proceedings of the International Symposium on Network and Parallel Computing, LNCS 3222. Berlin: Springer, 2005:9-21.
  • 4徐文拴,辛运帏,卢桂章.普适计算环境下信任机制的研究进展[J].计算机科学,2008,35(2):52-57. 被引量:6
  • 5MUI L, MOHTASHEMI M, HALBERSTADT A. A computational model of trust and reputation [ C]//Proceedings of the 35th Annual Hawaii International Conference on System Sciences. Washington, DC: IEEE Computer Society, 2002 : 188 - 196.

二级参考文献46

  • 1Bussard L,Roudier Y, Molva R. Untraceable secret credentials: Trust establishment with privacy. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW;04), Orlando, Florida, March 2004. 122-126.
  • 2Sharmin M, Ahmed S, Ahamed S I. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for mobile devices of pervasive computing environments. In: Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, Nevada, USA, April 2006. 306-313.
  • 3Haque M, Ahamed S I. M-LPN: An approach towards a dependable trust model for pervasive computing applications, In:Proceedings of the International Conference on Parallel Processing Workshops (ICPPW'06), Columbus, Ohio, USA, August 2006. 189 -195.
  • 4Sharmin M, Ahmed S, Ahamed S I. An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments. In: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), Pisa, Italy, March 2006. 258-263.
  • 5Sharmin M,Ahmed S, Ahamed S I. SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in pervasive computing environments. In: Proceedings of the IEEE International Conference on Information Technology (ITCC 2005 ), Las Vegas, NV, USA, April 2005. 271-276.
  • 6Sharmin M,Ahamed S I,Ahmed S, et al. SSRD+.. A privacy-aware trust and security model for resource discovery in pervasive computing environment. In: Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, USA, September 2006. 67-70.
  • 7Wolfe S T, Ahamed S I, Zulkernine M. A trust framework for pervasive computing environments. In: Proceedings of the 4th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Dubai, UAE, March 2006. 312-319.
  • 8Ngo H Q, Shehzad A,Liaquat S, et al. Developing context-aware ubiquitous computing systems with a unified middleware framework. In:Yang L T, et al. eds. The 2004 International Conference on Embedded & Ubiquitous Computing (EUC2004), LNCS 3207, Aizu, Japan, August 2004. 672-681.
  • 9Hung L X,Phuong T V,Giang P D, et al. Security for ubiquitous computing: Problems and proposed solution. In: Proceedings of the 12th IEEE International Conference on Embedded and Realtime Computing Systems and Application (RTCSA'06), Sydney, August 2006. 110-113.
  • 10Hung L X,Giang P D, Zhung Y, et al. A trust-based security architecture for ubiquitous computing systems. In: Mehrotra S, et al. eds. Proceedings of IEEE Intelligence and Security Informatics Conference (ISI 2006), LNCS 3975, San Diego, California, May 2006. 753-754.

共引文献5

同被引文献19

  • 1李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 2Weiser M.The computer for the twenty-first century[J]. Scientific American, 1991,265 (3) 94-104.
  • 3Wu I,Li X,Song M,et al.Security in ad hoc networks and pervasive computing[J].Security and Communication Networks, 2010,3 (5) : 359-361.
  • 4Hilary H H.Security is fuzzy:applying the fuzzy logic paradigm to the multipolicy paradigm[C]//Proceedings of the ACM Workshop on New Security Paradigms, 1993. New York:ACM, 1993: 175-184.
  • 5Janczewski L J, Portougal V.Need-to-know principle and fuzzy security clearances modeling[J].Information Man- agement & Computer Security,2000,8 (5):210-217.
  • 6Erwig M, Schneider M.Spatio-temporal predicates[J].IEEE Transactions on Knowledge and Data Engineering,2002, 14(4) : 881-901.
  • 7Li L,Cao T.Context-role based access control model for ubiquitous computing environment[J].Asian Journal of Information Technology, 2008,7 (2) :74-78.
  • 8Khan M, Sakamura K.Context-aware access control for clinical information systems[C]//Proceedings of the In- ternational Conference on Innovations in Information Technology (IIT ), 2012.United Arab Emirates : IEEE, 20 l 2 : 123-128.
  • 9郭亚军,王亮,洪帆,韩兰胜.基于信任的普适计算的动态授权模型[J].华中科技大学学报(自然科学版),2007,35(8):70-73. 被引量:5
  • 10张立臣,王小明.普适计算环境下的时空访问控制模型[J].计算机工程与应用,2008,44(17):94-97. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部