期刊文献+

一种抗欺诈的C2C卖方信誉计算模型研究 被引量:8

Fraud Against Model for Seller's Reputation of C2C
下载PDF
导出
摘要 针对C2C信誉模型中小额商品信誉炒作、信誉共谋、信誉诋毁等问题,引入交易价格、反馈可信度、共谋因子等参数,提出一种买方视角下抗欺诈的卖方成员信誉计算模型(C2CRep)。实验中通过收集网络交易数据,定义可疑欺诈的基本特征对数据进行抽取,并设定信誉计算误差(RCE)指标检验由欺诈行为带来的信誉值在社区信誉所占比例来检验模型的应用效果。结果表明,C2CRep在3类不同比例的欺诈行为中,RCE明显低于SPORAS与淘宝信誉模型,且RCE值在3类实验中都低于15%,抗欺诈性强。 A fraud against model for seller's reputation(C2CRep) from the buyer's view was put forward through introducing the price,credibility of feedback,collusion to resist fraud by abundance of cheap goods,collusion,and slander problems.The online purchase and feedback data was used to verify the model's validity.The suspicious fraud data was filtered by basic characteristics defined,and reputation compute error index(RCE) was presented.Results show that RCE of C2CRep is significantly lower than SPORAS and Taobao's reputation model in three type fraud.RCE is below 15% under three situations,and it reflects a strong anti-attack performance.
出处 《计算机科学》 CSCD 北大核心 2012年第2期68-71,共4页 Computer Science
基金 国家自然科学基金项目(61070139) 江西省科技厅软科学项目(赣财教字[2007]173号) 江西省教育厅重点科技项目(GJJ10019)资助
关键词 信誉模型 抗欺诈 电子商务 Reputation model Fraud against E-commerce
  • 相关文献

参考文献11

  • 1Gahill V,Gray E,Seigneur J M,et al.Using trust for secure col-laboration in uncertain environments[J].IEEE Pervasive Com-puting Magazine,2003,2(3):52-61.
  • 2Ba S,Pavlou P.Evidence of the Effect of Trust Building Tech-nology in Electronic Markets:Price Preminums and Buyer Be-havior[J].MIS Quarterly,2002,26(3):243-268.
  • 3Zacharia G,Maes P.Trust management through reputation me-chanisms[J].Applied Artificial Intelligence,2000,14(9):881-907.
  • 4王茜,杜瑾珺.一种P2P电子商务安全信任模型[J].计算机科学,2006,33(9):54-57. 被引量:14
  • 5Mui L,Mohtashemi M.A computational model for trust andreputation[A]∥Proceedings of the 35th Annual Hawaii Inter-national Conference on System Science(HICSS’02)[C].2002:2431-2439.
  • 6Josang A,Bhuiyan T.Optimal trust network with subjectivelogic[C]∥2nd Int.Conf.Emerging Security Inf.,Systems andTechnologies(SECURWARE 2008).IARIA,2008:179-184.
  • 7Sabater J,Sierra C.Review on computational trust reputationmodels[J].Artificial Intelligence Review,2006,24(1):33-60.
  • 8Bharadwaj K K,Yahya M,Al-Shamri.Fuzzy computationalmodels for trust and reputation systems[J].Electronic Com-merce Research and Applications,2009,8(1):37-47.
  • 9Xiong L,Liu L.PeerTrust:Supporting reputation-based trustfor peer-to-peer electronic communities[J].IEEE Trans.onKnowledge And Data Engineering,2004,16(7):843-857.
  • 10路松峰,刘芳,胡和平,刘巍锋.一种节点信誉相关的P2P网络信任管理模型[J].小型微型计算机系统,2009,30(11):2139-2145. 被引量:8

二级参考文献15

  • 1李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 2Anirban Mondal, Masaru Kitsuregawa. Privacy, security and trust in P2P cnvironmcnts:a perspective[ C]. In: Procce.dings of the 17th International Conference on Database and Expert Systems Applications. Los Alamitos: IEEE Computer Society,2006,682-686.
  • 3Scpander D Kamvar,Mario T Schlossor,Hector Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks [ C]. In: Proceedings of the 12th International World Wide Web Conference. New York: ACM Press,2003,640-651.
  • 4Xia Chun-hc, Shi Yun-ping, Li Xiao-jian, ctal. P2P worm detection based on application identification[ M]. Frontiers of Computer Science in China,Higher Education Press,Co-published with Springer- Verlag GmbH,2007,1 ( 1 ) : 114-122.
  • 5Matt Blaze, Joan Feigenbaum, Jack Lacy. Decentralized trust management[ C]. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos: IEEE Computer Society, 1996, 164-173.
  • 6Shalendra Cb, habra, Emesto Damiaai, Sabdna De Capitani di Vimercarl, et al. A protocol for reputation management in super-peer networks[ C]. In:Proceedings of the 15th International Workshop on Database and Expert Systems Applications, Los Alamitos: IEEE Computer Society ,2004,979-983.
  • 7Li Xiong,Ling Liu. A reputation-based trust model for Peer-to-Peer ecommerce communities [ C ]. In:Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce, New York: ACM Press, 2003,228 -229.
  • 8Karl Aberer,Zoran Despotovie. Managing trust in a Peer-2-Peer information system[ C ]. In:Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management,New York:ACM Press,200! ,310-317.
  • 9Ion Stoica, Robert Morris, David Liben-Nowell, et al. Chord: a sealable Peer-to-Peer lookup protocol for internet applications [ J ]. IEEE,/ACM Transactions on Networking ,2003,11 ( 1 ) : 17-32.
  • 10Beth T,Borcherding M,Klein B.Valuation of trust in open networks.ESORICS 94,Brighton,UK,November 1994

共引文献20

同被引文献60

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部