期刊文献+

基于可拓云的网络信任评估 被引量:6

Network trust evaluation based on extension cloud
下载PDF
导出
摘要 针对网络信任评估中存在不确定因素的问题,以复杂开放网络中的安全交易为研究背景,引入可拓云理论,利用可拓学中的物元理论和云模型的不确定性兼二者定性与定量相结合的优点,提出了基于可拓云的网络信任评估模型,实现了信任值定性与定量之间的转换。在此模型基础上提出基于可拓云的网络信任评估方法,对网络安全交易能够有效地进行信任评估,为最终信任决策提供有利依据。仿真实验结果表明:信任决策调度算法提高了信任评估的准确性和交易的成功率,有效缓解了网络交易实体的欺骗行为,评估方法具有可行性和有效性。 Aiming at the problem of uncertain factors in network trust evaluation,under the research background of security trading in complex open network,the extension cloud theory was introduced. Using the matter-element theory of extenics and the uncertainty of cloud model and the advantage of both the quantitative and qualitative analysis,an extension cloud-based network trust evaluation model was proposed. In the proposed model,the transformation between qualitative trust value and quantitative trust value was realized. And then,an evaluation method based on the extension cloud was put forward on the basis of the proposed model. The trust assessment of network security trading can be achieved effectively for providing good basis for final trust decision. The simulation experimental results show that,the trust evaluating and scheduling algorithm has improved the accuracy of trust evaluation and the successful rate of transaction in complex network environment and alleviated the network transaction entity fraud effectively. The proposed network trust extension method is effective and feasible.
出处 《计算机应用》 CSCD 北大核心 2016年第6期1533-1537,1557,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(71263045) 甘肃省科技支撑计划项目(1204FKCA162)~~
关键词 云模型 信任评估 物元云 可拓云理论 信任决策 cloud model trust evaluation matter-element cloud extension cloud theory trust decision
  • 相关文献

参考文献14

  • 1SAILER R, ZHANG X, JAEGER T, et al. Design and implementa- tion of a TCG-based integrity measurement architecture [ C]//Pro- ceedings of the 13th USENIX Security Symposium. Berkley: USE- NIX Association, 2004, 13: Article No. 16.
  • 2WANG S, ZHENG Z, SUN Q, et al. Cloud model for service selec- tion [ C] // Proceedings of the 2011 IEEE Conference on Computer Communications Workshops. Piscataway: IEEE, 2011 : 666 - 671.
  • 3BERGER S, C.ACERES R, GOLDMAN K A, et al. vTPM: virtual- izing the trusted platform module [ C]// Proceedings of the 15th Conference on USENIX Security Symposium. Berkley: USENIX As- sociation, 2006, 15: Article No. 21.
  • 4孟祥怡,张光卫,刘常昱,康建初,李鹤松.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317. 被引量:36
  • 5LI X, ZHOU F, YANG X. A multi-dimensional trust evaluation mod- el for large-scale P2P computing [ J]. Journal of Parallel and Distrib- uted Computing, 2011, 71(6) : 837 -847.
  • 6杨玉丽,彭新光,付东来.基于云模型的主观信任评估机制[J].计算机工程与设计,2013,34(12):4151-4155. 被引量:1
  • 7张琳,刘婧文,王汝传,王海艳.基于改进D-S证据理论的信任评估模型[J].通信学报,2013,34(7):167-173. 被引量:38
  • 8张仕斌,许春香.基于云模型的信任评估方法研究[J].计算机学报,2013,36(2):422-431. 被引量:122
  • 9蔡红云,杜瑞忠,田俊峰,王静红.基于云模型和风险评估的信任模型研究[J].计算机工程,2012,38(23):139-142. 被引量:6
  • 10JAEGER T, SAILER R, CHANKAR U. PRIMA: policy reduced integrity measurement architecture [ C]// Proceedings of the l lth ACM Symposium on Access Control Models and Technologies. New York: ACM, 2006:19-28.

二级参考文献82

共引文献1411

同被引文献63

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部