期刊文献+

一种带有粗糙集信息量的P2P信任评价模型

P2P trust evaluation model with amount of information for rough set
下载PDF
导出
摘要 针对信任的主观性和不确定性,提出一种新的信任评估模型。利用粗糙集中知识的信息量对属性进行约简,并产生出最小约简;同时利用属性的重要性计算出最小约简中每个属性的权值,在此基础上使用模糊秩序法求出交互节点的信任度。实例表明,该模型是行之有效的。 With the subjective and uncertainty of trust, a new trust evaluation model is proposed. This model reduces attributes by knowledge amount of information for a rough set, and a minimal reduction set is formed. At the same time, every attribute' s weight is computed by using importance of the attribute. On this basis, trust of the interaction peer is evaluated by fuzzy rank order method. The example shows that the model is effective.
作者 李杰
出处 《计算机工程与应用》 CSCD 2012年第6期90-93,共4页 Computer Engineering and Applications
基金 安徽省高校省级优秀青年人才基金重点资助项目(No.2009SQRZ026ZD) 安徽省教育厅教研项目(No.2007JYXM216)
关键词 P2P网络 信任评价模型 粗糙集 信息量 P2P networks trust evaluation model rough set amount of information
  • 相关文献

参考文献13

  • 1McGibney J,Botvich D.A service-centric approach to access control and monitoring based on distributed trust[C]//Proceedings of the IBM CAS Software and Systems Engineering Symposium. New York,USA:ACM Press,2007:294-305.
  • 2Aberer K,Despotovic Z.Managing trust in a peer-to-peer information system[C]/fProc of the 10th Int'l Conf on Information and Knowledge Management(ClKM 2001 ).New York, USA: ACM Press,2001:310-317.
  • 3Ernesto D, Sabrina D C, Stefano P,et al.A reputation-based approach for choosing reliable resources in peer-to-peer networks[C]// Proc of the 9th ACM Conf on Computer and Communications Security.Washington DC,USA: ACM Press, 2002: 207-216.
  • 4Wang Y, Vassileva J.Trust and reputation model in peer-to-peer networks[C]//Proc of the 3rd IEEE Int'l Conf on Peer-to-Peer Computing.Linkoping: IEEE Computer Society, 2003 : 150-158.
  • 5Sepandar D K,Mario T S,Hector G M.The EigenTrust algorithmfor reputation management in P2P networks[C]//Proc of the 12th Int'l Conf on World Wide Web.Budapest: ACM Press, 2003: 640-651.
  • 6Khambatti M, Dasgupta P, Ryu K D.A role-based trust model for peer-to-peer communities and dynamic coalitions[C]//Proc of the 2nd IEEE lnt'l Information Assurance Workshop.Charlotte: IEEE Computer Society,2004:141-154.
  • 7Xiong L,Lin L.PeerTrust:supporting reputation-based trust in peer- to-peer communities[J].IEEE Trans on Data and Knowledge Engineering, 2004,16 (7) : 843-857.
  • 8马新新,耿技.对等网络信任和信誉机制研究综述[J].计算机应用,2007,27(8):1935-1938. 被引量:12
  • 9Song S,Hwang K,Zhou R,et al.Trusted P2P transactions with fuzzy reputation aggregation[J].IEEE Internet Computing,2005,9 (6) :24-34.
  • 10唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236

二级参考文献29

  • 1曾黄麟.粗集理论及其应用(一)[J].四川轻化工学院学报,1996,9(1):18-28. 被引量:41
  • 2郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 3李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:137
  • 4TCG. TPM Work Group [EB/OL]. https: //www. trustedcomputinggroup. org/groups/tpm/, 2007-10
  • 5Microsoft. Next-Generation Secure Computing Base home page [EB/OL]. http://www. microsoft. com/resources/ngscb, 007-01
  • 6Intel. LaGrande Technology Architectural Overview [EB/OL]. http://www. intel. com/teehnology/security/downloads/LT_ Arch_Overview. pdf, 2007-01
  • 7Alan Z. Coming soon to VMware, Microsoft, and Xen: AMD Virtualization Technology Solves Virtualization Challenges [EB/OL]. http://www. devx.com/amd/Artide/30186,2007-01
  • 8JΦsang A. A Subjective Metric of Authentication//Proceedings of the European Symposium on Research in Security (ESORICS'98). Louvain-la-Neuve, Belgium, 1998:329-344
  • 9Patel J, Teacy W T, Luke, et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources//Proceedings of Trust Management Third International Conference (iTrust 2005). INRIA-Rocquencourt, France, 2005:193-209
  • 10TCG. TCPA Main Specification version 1. 1 b [EB/OL]. https://www. trustedcomputinggroup. org/specs/TPM/TCPA_ Main_TCG_Architecture_v1_1b. pdf, 2007-10

共引文献395

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部