期刊文献+

基于云模型的主观信任评估机制 被引量:1

Subjective trust evaluation mechanism based on cloud model
下载PDF
导出
摘要 针对传统的网络安全手段不能有效解决云计算安全问题的现状,提出在云计算环境中建立主观信任评估模型的研究方案。介于主观信任的模糊性和不确定性的双重特征,引入定性定量转换模型-云模型理论刻画主观信任评估机制的演化过程,给出信任向量、信任云的定量描述。在此基础上定义实体信任云的概念,并设计实体信任云的计算,评估和更新的算法。实例分析和仿真结果表明了该主观信任评估模型的正确性和有效性。 Because the status that traditional network security tools can not be an effective solution to solve cloud computing security issues, the subjective trust evaluation model is proposed to establish the research scheme in the cloud computing environment. Taking into account the subjective trust's dual characteristics of the fuzziness and uncertainty, cloud model theory which can transform between qualitative and quantitative is used to depict the evolution of the subjective trust evaluation mechanism, trust vector and trust cloud are described quantitatively, the concept of the entity's trust cloud is defined and algorithms of calcu lating, assessing and updating the entity's trust cloud are designed. The example analysis and the results of simulation show the correctness and validity of the subjective trust evaluation mechanism.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第12期4151-4155,共5页 Computer Engineering and Design
基金 山西省留学基金项目(2009-28) 山西自然科学基金项目(2009011022-2)
关键词 云计算 主观信任 云模型 信任向量 信任等级云 cloud computing subjective trust cloud model trust vector trust grade cloud
  • 相关文献

参考文献8

二级参考文献120

共引文献470

同被引文献13

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1212
  • 2胡涛,王树宗,杨建军.基于云模型的物元综合评估方法[J].海军工程大学学报,2006,18(1):85-88. 被引量:42
  • 3孟祥怡,张光卫,刘常昱,康建初,李鹤松.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317. 被引量:36
  • 4SAILER R, ZHANG X, JAEGER T, et al. Design and implementa- tion of a TCG-based integrity measurement architecture [ C]//Pro- ceedings of the 13th USENIX Security Symposium. Berkley: USE- NIX Association, 2004, 13: Article No. 16.
  • 5WANG S, ZHENG Z, SUN Q, et al. Cloud model for service selec- tion [ C] // Proceedings of the 2011 IEEE Conference on Computer Communications Workshops. Piscataway: IEEE, 2011 : 666 - 671.
  • 6BERGER S, C.ACERES R, GOLDMAN K A, et al. vTPM: virtual- izing the trusted platform module [ C]// Proceedings of the 15th Conference on USENIX Security Symposium. Berkley: USENIX As- sociation, 2006, 15: Article No. 21.
  • 7LI X, ZHOU F, YANG X. A multi-dimensional trust evaluation mod- el for large-scale P2P computing [ J]. Journal of Parallel and Distrib- uted Computing, 2011, 71(6) : 837 -847.
  • 8JAEGER T, SAILER R, CHANKAR U. PRIMA: policy reduced integrity measurement architecture [ C]// Proceedings of the l lth ACM Symposium on Access Control Models and Technologies. New York: ACM, 2006:19-28.
  • 9DINABURG A, ROYAL P, SHARIF M, et al. Ether: malware a- nalysis via hardware virtualization extensions [ C]// Proceedings of the 15th ACM Conference on Computer and Communications Secur- ity. New York: ACM, 2008:51-62.
  • 10ZHOU Z X, XU H, WANG S P. A novel weighted trust model based on cloud [ J]. Advances in Information Sciences and Service Sciences, 2011, 3(3): 115-124.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部