期刊文献+

可信网络中一种敏感鲁棒的信任计算模型 被引量:1

Sensitive and robust model of trust computation in trusted networks
下载PDF
导出
摘要 提出一种敏感、鲁棒的信任度计算模型。在缺乏直接交易证据时,基于推荐信任、信誉等间接信任度估计信任度初值,随交易的建立和累积与直接交易证据共同作出信任评价,并最终过渡至直接信任度计算。采用动态平衡系数,兼顾信任度初值估值和直接交易证据小样本风险,逐步降低信任度初值估值风险并将其限制在最初的有限次交易以内;同时增加交易证据对信任度的贡献。在直接信任度计算中,采用双滑动窗口机制,即稳定性窗口N和敏感性窗口M,使信任度保持相对稳定又对交易满意度动态敏感。采用动态权值法赋予明显偏离信任度均值的节点信任度较小权值,提高模型的抗攻击能力。给出了直接信任度稳定性窗口N、敏感性窗口M、稳定性—敏感性平衡系数的建议值。仿真结果验证了本方法的有效性。 This paper proposed a sensitive and robust trust computation model.At the stage for lack of direct transaction proofs,estimated an initial trust value based on recommendation trust or reputation.With the construction of new transactions and their accumulation,calculated trust by combining of the initial value and new transaction proofs,then transferred to the direct trust computation model,at last.It adopted a balancing coefficient to weaken risks in estimating initial trust values,and restricted them within limited initial transactions.At the same time,strengthened the contribution of proofs from direct transactions,step by step.In the computation of direct trust,a double window mechanism,which included a stability window N and a sensibility window M were adopted respectively to make trust relative stable but sensitive.It integrated node reputation by weighted trust degrees from other nodes.To strengthen the abilities of anti-attacking,trust values obviously deviating from mean were dynamically set with small weights.Proposed values of stability window N,sensitiveness window M,and stability-sensitiveness balance coefficient of direct trust model.Simulation results prove the effectiveness of the proposed model.
出处 《计算机应用研究》 CSCD 北大核心 2011年第7期2497-2501,共5页 Application Research of Computers
基金 河南省高校青年骨干教师资助计划项目(2009GGJS-056) 郑州市科技攻关计划项目(2010GYXM364)
关键词 可信网络 信任模型 双滑动窗口 敏感性 动态权值 动态平衡系数 trustable network trust model double moving windows sensitivity dynamic weight dynamic balancing coefficient
  • 相关文献

参考文献11

  • 1ALMENAREZ F, MARIN A, DIAZ D,et al. Developing a model for trust management in pervasive devices[ C ]//Proc of the 3rd IEEE Interuational Workshop on Pervasive Computing and Communication Security. Washington DC : IEEE Computer Society ,2006:267-272.
  • 2SCHMIDT S, STEELE R, DILLON T S, et al. Fuzzy trust evaluation and credibility development in multi-agent systems [ J ]. Applied Soft Computing Journal,2007,7(2) :492-505.
  • 3徐兰芳,胡怀飞,桑子夏,徐凤鸣,邹德清.基于灰色系统理论的信誉报告机制[J].软件学报,2007,18(7):1730-1737. 被引量:28
  • 4HE Rui, NIU Jian-wei, ZHANG Guang-wei. CBTW: a trust model with uncertainty quantification and reasoning for pervasive computing [ C]//Proc of the 3rd International Symposium on Parallel and Distributed Processing and Applications. Berlin: Springer-Verlag, 2005: 541-552.
  • 5ZHOU Rong-fang, HWANG K. Power-trust:a robust and scalable reputation system for trusted peer-to-peer computing[ J]. IEEE Trans on Parallel and Distributed Systems,2007,18(4) :450-473.
  • 6JAMEEL H, HUNG L X, KALIM U,et al. A trust model for ubiquitous systems based on vectors of trust values [ C ]//Proc of the 7th IEEE International Symposium on Multimedia. Washington DC : IEEE Computer Society,2005:674-679.
  • 7THEODORAKOPOULOS G, BARAS J S. On trust models and trust evaluation metrics for Ad hoc networks [ J ]. IEEE Journal on Selected Areas in Communications,2006,24(2):318-328.
  • 8SUN Yan, YU Wei, HAN Zhu, et al. Trust modeling and evaluation in Ad hoc networksp [ C ]//Proc of IEEE Global Telecommunications Conference. Washington DC : IEEE Computer Society ,2005 : 1-10.
  • 9田春岐,邹仕洪,田慧蓉,王文东,程时端.一种基于信誉和风险评价的分布式P2P信任模型[J].电子与信息学报,2007,29(7):1628-1632. 被引量:47
  • 10田春岐,邹仕洪,王文东,程时端.一种基于推荐证据的有效抗攻击P2P网络信任模型[J].计算机学报,2008,31(2):270-281. 被引量:42

二级参考文献46

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 3Kamvar S and Schlosser M.The Eigen Trust algorithm for reputation management in P2P networks.Proceedings of the 12th International Conference of WWW,Budapest,Hungary,2003:640-651.
  • 4Yamamoto A,Asahara D,and Itao T,et al.Distributed pagerank:A distributed reputation model for open P2P networks.Proceedings of the 2004 International Symposium on Applications and the Internet workshops(SAINTW'04),Tokyo,Japan,2004:389-396.
  • 5Altman J.PKI Security for JXTA overlay networks.Technical Report,TR-I2-03-06,Palo Alto:Sun Microsystem,2003.
  • 6Cornelli F,Damiani E,and Vimercati D C,et al..Choosing reputable servents in a P2P network.Proceedings of the 11th International Conference of WWW,Hawaii,ACM Press,2002:441-449.
  • 7Liang Z Q and Shi W S.PET:A personalized trust model with reputation and risk evaluation for p2p resource sharing.The 38th International Conference on System Science,Hawaii,2005:256-264.
  • 8Yu B and Singh M P.An evidential model of distributed reputation management.Proceedings of the First Int.Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS),Bologna,Italy,2002:254-301.
  • 9Song S S,Hwang K,and Zhou R F.Trusted P2P transactions with fuzzy reputation aggregation.IEEE Internet Computing Magazine,2005,9(6):24-34.
  • 10Friedman E and Resnick P.The social cost of cheap pseudonyms.Journal of Economics and Management Strategy,2001,10(2):173-199.

共引文献109

同被引文献9

  • 1JENNINGS N R. An agent - based approach for build- ing complex software systems [ J ]. Communication of the ACM,2001 ,44(4):35 -41.
  • 2HUYNH T D,JENNINGS N R,SHADBOT N R. An in- tegrated trust and reputation model for open multi - agent systems [ J ]. Autonomous Agents and Multi - Agent Systems ,2006,13 (2) : 119 - 154.
  • 3MCKNIGHT D H,CHERVANY N L. What is trust? a conceptual analysis and interdisciplinary model [ C ]// Americas Conference of Information Systems. Long Beach : CA, 2000 : 827 - 833.
  • 4MCKNIGHT D H,CHOUDHURY V, KACMAR C. De- veloping and validating trust measures for e - com- merce : an integrative typology [ J ]. Information Systems Research ,2003,13 ( 3 ) :334 - 359.
  • 5ARTZ D,GIL Y. A survey of trust in computer science and the semantic web [ J ]. Journal of Web Semantics, 2007,5(2) :58 -71.
  • 6LOU P, ONG S K, NEE A Y C. Agent - based distributed scheduling for virtual job shops [ J ]. International Journal of Production Research,2009,48(13) :3889 -3895.
  • 7LOU P, LIU Q,ZHOU Z D, et al. Multi - agent - based proactive - reactive scheduling for a job shop [ J ]. In- ternational Journal of Advanced Manufacturing Tech- nology,2012,59( 1 -4) :311 -324.
  • 8SCHOORMAN F D, MAYER R C. An integrative model of organizational trust :past, present,and future [ J ]. Academy of Management Review, 2007,32 (2) : 344 - 354.
  • 9甘佳,段桂江.云制造服务信任评估技术[J].计算机集成制造系统,2012,18(7):1527-1535. 被引量:23

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部