期刊文献+

情境感知的网络用户可信评估模型 被引量:1

A Context-aware Network User Trusted Evaluation Model
下载PDF
导出
摘要 互联网已经成为人们生活不可或缺的一部分,但是网络安全问题仍然影响着互联网发展,可信评估逐渐成为保障网络安全的核心,而网络用户又是可信评估的重点评估对象。当前网络可信评估模型没有充分考虑用户所处的情境以及用户的欺诈行为,影响网络用户可信评估的精确性,导致恶意用户的漏判和误判。针对该问题,提出了一种情境感知的网络用户可信评估模型(CAMETNU)。该模型通过对用户访问时所处的情境计算恶意行为的惩罚力度,而又依据用户累计恶意行为加大惩罚力度。实验结果证明了所述方法的有效性。 The Internet has become an indispensable part of people's life,but the network security problem still affects the development of the Internet.Trusted evaluation gradually becomes the core of network security,and network users are the important target of evaluation in trusted evaluation.The current network trusted evaluation model does not give full consideration to users' situation and their fraud behavior,which affects the accuracy of network user trusted evaluation,leading to the false judgment and misjudgment of malicious users.To solve this problem,a context-aware network user trusted evaluation model(CAMETNU) is proposed.The model calculates the punishment of malicious behavior through the situation the user is in,and increases the punishment according to the accumulated malicious behaviors of the user.Experimental results demonstrate the effectiveness of the proposed method.
出处 《无线电通信技术》 2018年第1期34-38,共5页 Radio Communications Technology
基金 国家自然科学基金项目(61571066)
关键词 可信评估 情境感知 用户行为 信任值 trusted evaluation context awareness user behavior trust value
  • 相关文献

参考文献8

二级参考文献65

  • 1SUJin-dian GUOHe-qing GAOYin.An Adaptive Trust Model of Web Services[J].Wuhan University Journal of Natural Sciences,2005,10(1):21-25. 被引量:6
  • 2张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 3W E Burr. Public Key Infrastructure (PKI) Technical Specifications Part A: Technical Concept of Options, [EB/OL], http://csrc/nist.gov/pki/twg,/baseline/pkicon20b, pdf, 1998.
  • 4Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[A]. Dale J, Dinoh G. Proceedings of the Symposium on ,Security and Privacy[C]. Oakland: IEEE Computer Society Press, 1996. 164-173.
  • 5Jφsang A. A Logic for Uncertain Probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2001,9(3):279-311.
  • 6Blaze M, Feigenbaum J, Ioannidis J, et al. The Role of Trust Management in Distributed Systems Security [A]. Secure Internet Programming: Issues for Mobile and Distributed Objects [C]. Berlin:Springer-Verlag, 1999. 185-210.
  • 7Blaze M, Feigenbaum J, Keromytis A D. Keynote: Trust Management for Public-key Infrastructures [A]. Christianson B, Crispo B,William S, et al. Cambridge 1998 Security Protocols International Workshop[G]. Berlin: Springer-Verglag, 1999.59-63.
  • 8Chu Y H, Feigenbaum J, LaMacchia B, et al. Referee: Trust Management for Web Applications [J]. World Wide Web Journal,1997,2(2):127-139.
  • 9Abdul-Rahman A, Hailes S, A Distributed Trust Model[A]. Proceedings of the 1997 New Security Paradigms Workshop [C]. Cumbria: ACM Press, 1998.48-60.
  • 10Abdul-Rahman A, Hailes S. Using Recommendations for Managing Trust in Distributed Systems [A]. Proceedings of the IEEE Malaysia International Conference on Communication' 97 (MICC' 97) [C].Kuala Lumpur: IEEE Press, 1997.

共引文献65

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部