期刊文献+

面向可信和行为模式匹配的两层服务选择方法 被引量:1

Trust and behavioral modeling based two layer service selection
下载PDF
导出
摘要 在面向服务框架下,用户对服务有着不同的交互经验,并根据这些经验建立信任且对其评价,然而用户可能产生错误的评价进而影响公正的选择.为解决这一问题,提出一种两层选择算法选取可信并且符合用户偏好的服务.第1层用户将自己的经验与群体的评价趋势进行比对,优化自身的记录,生成更加可靠的经验信息.第2层用户由自己的偏好选出最符合需求的建议者.结果表明,这个方案可以过滤掉恶意的或经验不足的评价者,并选择出符合用户行为模式的服务. In the Service-Oriented Architecture(SOA),the consumer has many experiences in service,and then based on the experiences he builds trust and reputation.But lack of experiences or a malicious adviser will lead to unfair selection.In this paper,we propose a two-layer selecting algorithm to meet the demand of the consumer.In the first layer the consumer uses social records update his own to get more accurate experience.Afterwards,in the second layer,the consumer selects the most suitable.The result shows that our approach will filter the malicious participants,and then chose the services which fit consumer’s preference.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2014年第4期198-204,共7页 Journal of Xidian University
基金 中央高校基本科研业务费资助项目(JY10000903001) 长江学者和创新团队发展计划资助项目(IRT1078)
关键词 服务选择 服务质量 信任管理 行为模式 service selection quality of service trust behavioral modeling
  • 相关文献

参考文献15

  • 1Falcone R,Castelfranchi C.Generalizing Trust:Inferencing Trust Worthiness from Categories[C]//Lecture Notes in Artificial Intelligence:5396.Berlin:Springer-Verlag,2008:65-80.
  • 2万涛,廖维川,马建峰.面向多服务器架构的认证协议分析与改进[J].西安电子科技大学学报,2013,40(6):174-179. 被引量:8
  • 3Huynh T D,Jennings N R,Shadbolt N R.An Integrated Trust and Reputation Model for Open Multi-agent Systems[J].Autonomous Agents and Multi-Agent Systems,2006,13(2):119-154.
  • 4Kerr R, Cohen R.Smart Cheaters Do Prosper:Defeating Trust and Reputation Systems[C]//Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems:2.Budapest:IFAAMAS,2009:798-805.
  • 5Noorian Z,Ulieru M.The State of the Art in Trust and Reputation Systems:a Framework for Comparison[J].Journal of Theoretical and Applied Electronic Commerce Research,2010,5(2):97-117.
  • 6Jsang A,Quattrociocchi W.Advanced Features in Bayesian Reputation Systems[C]//Lecture Notes in Computer Science:5695.Heidelberg:Springer Verlag,2009:105-114.
  • 7Whitby A,Josang A,Indulska J.Filtering Out Unfair Ratings in Bayesian Reputation Systems[C]//Proceedings of 7th International Workshop on Trust in Agent Societies.NewYork:IEEE,2004:48-64.
  • 8Wang Yonghong,Singh M P. Formal Trust Model for Multiagent Systems[C]//Proceedings of the 20th International Joint Conference on Artifical Intelligence. San Francisco:IJCAI,2007:1551-1556.
  • 9Keung S,Griffiths N.Building a Trust-based Social Agent Network[C]//Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems:1.Budapest:IFAAMAS,2009:68-79.
  • 10Sen S,Malone N,Chakraborty K.Comprehensive Trust Management[C]//Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems:1.Budapest:IFAAMAS,2009:129-146.

二级参考文献21

  • 1Bell M. SOA Modeling Patterns for Service-Oriented Discovery and Analysis[MJ. NewJersey:John Wiley &. Sons, 2010: 390.
  • 2Alzahrani A,Janicke H, Abubaker S. Decentralized XACML Overlay Network[CJ / /The lOth IEEE International Conference on Computer and Information Technology. Piscataway: IEEE, 2010: 1032-1037.
  • 3Liu A, Chen F, HwangJ, et al. Designing Fast and Scalable XACML Policy Evaluation Engines[J]. IEEE Transactions on Computers, 2011, 60(12): 1802-1817.
  • 4Marouf S, Shehab M, Squicciarini A, et al. Adaptive Reordering &. Clustering Based Framework for Efficient XACML Policy Evaluation[J]. IEEE Transactions on Services Computing, 2011, 4(4): 300-313.
  • 5Le Traon Y, Mouelhi T, Pretschner A, et al. Test-driven Assessment of Access Control in Legacy Applications[CJ/ / International Conference on Software Testing, Verification, and Validation. Piscataway: IEEE, 2008: 238-247.
  • 6Mouelhi T, Fleurey F, Baudry B, et al. A Model-based Framework for Security Policy Specification, Deployment and Testing[CJ/ /The 11th International Conference on Model Driven Engineering Languages and Systems. Heidelberg: Springer-Verlag, 2008: 537-552.
  • 7Mouelhi T, Traon Y L, Baudry B. Transforming and Selecting Functional Test Cases for Security Policy Testing[CJ// International Conference on Software Testing, Verification and Vahidation. Piscataway: IEEE, 2009: 171-180.
  • 8Martin E, Xie Tao. Automated Test Generation for Access Control Policies[CJ / /International Workshop on Software Engineering for Secure Systems. Piscataway: IEEE, 2006: 752-753.
  • 9Bertolino A, Daoudagh S, Lonetti F, et al. Automatic XACML Requests Generation for Policy Testing[CJ/ /IEEE 5th International Conference on Software Testing, Verification and Validation. Piscataway: IEEE, 2012: 842-849.
  • 10Lee Y S, Kim E, Seok SJ, et al. A Smartcard-Based User Authentication Scheme to Ensure the PFS in Multi-Server Environments[J]. IEICE Transactions on Communications, 2012, E95-B(2): 619-622.

共引文献7

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部