期刊文献+

基于信誉与合作的信任评价模型研究 被引量:1

Research of Trust Evaluation Model Based on Reputation and Cooperation
下载PDF
导出
摘要 现有的一些信任评价模型采用线性加权的手段进行信任测度,可能出现一个维度指标信息很高而另一个维度指标信息较低的情况,于是存在信息的淹没,严重影响了模型计算节点信任评价的准确性和有效性。针对现有模型存在的不足,提出了一种基于二维度的相互信任矩阵评价模型。该模型依据所给出的信誉与合作评价指标的特点,分别采用二元语义信息处理和数据测度方法对节点的信誉与合作进行评价,从而得出信任评价模型。仿真实验结果分析表明,与线性加权模型相比,该模型能够更有效地抑制恶意节点的影响,提高节点任务执行的成功率。 Because some of the existing trust evaluation model uses the method of linear weighted sum to measure the trust,it may appear a dimension index information is very high,while the other dimension index information is relatively low,thus there is no comprehensive information for computing the trust,and it makes serious impacts on the accuracy and effectiveness of the model to compute the trust evaluation for nodes.For the shorting of the model,the paper proposed a mutual trust matrix evaluation model based on reputation and cooperation.We evaluated the reputation of the nodes by adopting two-tuple linguistic information and evaluated the cooperation of the nodes by adopting date measurement,thus we concluded the mutual trust evaluation of the nodes.At last,the paper compared the model with the mode of linear weighted by analysis of simulation experiment,it appears that the proposed model can suppress the malice node's attacking and improve the efficiency for executing a plan of the nodes.
出处 《计算机科学》 CSCD 北大核心 2011年第5期41-44,共4页 Computer Science
基金 国家自然科学基金项目(60873082 60903058) 湖南省自然科学基金项目(10JJ3087)资助
关键词 信任 相互信任评价 信誉 合作 Trust Mutual trust evaluation Reputation Cooperation
  • 相关文献

参考文献13

  • 1Hu Y J. Some thoughts on agent trust and delegation [C]//Proceedings of the Fifth International Conference on Autonomous Agents. Montreal, Quebec, Canada, 2006.
  • 2Grandison T, Sloman M. Trust management tools for Internet applications[C]//Proceedings of the First International Conference on Trust Management. Greece,2005.
  • 3Greenberg P S, Greenberg R H, Antonucci Y L. Creating and sustaining trust in virtual teams[J]. Business Horizon, 2007,50(4):325-333.
  • 4Lavrac N, Ljubic P. Trust modeling for networked organization using reputation and collaboration estimates[J].Application and Views, 2007,37(3) : 429-438.
  • 5Chen T Y, Chen L C, Chu H C. Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration[J]. Computer in Industry, 2008,59(6) :565-579.
  • 6Herrera F,Martinez L. A model based on linguistic 2-tuples for dealing with multi-granularity hierarchical linguistic contexts in multiexpert decision-making[J]. IEEE Transaction on Systems, Man and Cybernetics, 2001,32(2) :227-234.
  • 7唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 8樊治平,姜艳萍.语言判断矩阵满意一致性的判定方法[J].控制与决策,2004,19(8):903-906. 被引量:13
  • 9Bharadwaj K K, Al-Shamri M Y H. Fuzzy computational models for trust and reputation systems[J]. Electronic Commerce Research and Applications, 2008,32 (8): 37-47.
  • 10Ma'rmol F G, Pe'rez G M. Security threats scenarios in trust and reputation models for distributed systems[J]. Computers Security, 2009,28 (1) : 545-556.

二级参考文献19

  • 1Marimin M U, Itsuo H, Hiroyuki T. Linguistic labels for expressing fuzzy preference relations in fuzzy group decision making [J]. IEEE Trans on Systems, Man, and Cybernetics,1998,28(2):205-218.
  • 2Delgado M, Herrera F, Herrera-Viedma E, et al. Combining numerical and linguistic information in group decision making[J]. Information Sciences,1998,107(1):177-194.
  • 3Bordogna G, Fedrizzi M, Pasi G. A linguistic modeling of consensus in group decision making based on OWA operators[J]. IEEE Trans on Systems, Man, and Cybernetics-Part A: Systems and Humans,1997,27(1):126-132.
  • 4Herrera F, Herrera-Viedma E, Verdegay J L. Direct approach processes in group decision making using linguistic OWA operators[J]. Fuzzy Sets and Systems,1996,78(1):73-87.
  • 5Delgado M, Verdegay J L, Vila M A. On aggregation operations of linguistic label[J]. Int J of Intelligent Systems,1993,8(2):351-370.
  • 6Herrera F, Herrera-Viedma E, Verdegay J L. A model of consensus in group decision making under linguistic assessments[J]. Fuzzy Sets and Systems,1996,79(1):73-87.
  • 7Basile L. Ranking Alternatives by Weak Transitivity Relations[M].London: Kluwer Academic Publishers,1990.
  • 8M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989.
  • 9R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164.
  • 10A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997.

共引文献95

同被引文献16

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部