期刊文献+

A Trust Model Based on the Multinomial Subjective Logic for P2P Network 被引量:1

A Trust Model Based on the Multinomial Subjective Logic for P2P Network
下载PDF
导出
摘要 In order to deal with the problems in P2P systems such as unreliability of the Service, security risk and attacks caused by malicious peers, a novel trust model MSL-TM based on the Multinomial Subjective Logic is proposed. The model uses multinomial ratings and Dirichlet distribution to compute the expectation of the subjective opinion and accordingly draws the peer’s reputation value and risk value, and finally gets the trust value. The decay of time, rating credibility and the risk value are introduced to reflect the recent behaviors of the peers and make the system more sensitive to malicious acts. Finally, the effectiveness and feasibility of the model is illustrated by the simulation experiment designed with peersim. In order to deal with the problems in P2P systems such as unreliability of the Service, security risk and attacks caused by malicious peers, a novel trust model MSL-TM based on the Multinomial Subjective Logic is proposed. The model uses multinomial ratings and Dirichlet distribution to compute the expectation of the subjective opinion and accordingly draws the peer’s reputation value and risk value, and finally gets the trust value. The decay of time, rating credibility and the risk value are introduced to reflect the recent behaviors of the peers and make the system more sensitive to malicious acts. Finally, the effectiveness and feasibility of the model is illustrated by the simulation experiment designed with peersim.
机构地区 不详
出处 《International Journal of Communications, Network and System Sciences》 2009年第6期546-554,共9页 通讯、网络与系统学国际期刊(英文)
关键词 TRUST MULTINOMIAL SUBJECTIVE Logic REPUTATION Risk DIRICHLET Distribution Trust Multinomial Subjective Logic Reputation Risk Dirichlet Distribution
  • 相关文献

参考文献5

二级参考文献52

  • 1林作铨,牟克典,韩庆.基于未知扰动的冲突证据合成方法[J].软件学报,2004,15(8):1150-1156. 被引量:27
  • 2林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 3李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1227
  • 4.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 5Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 6Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 7Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 8International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 9Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 10Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743

共引文献454

同被引文献22

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:137
  • 3田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938. 被引量:70
  • 4R. F. Hurley.The decision to trust. Harvard Business . 2006
  • 5A. Jφsang,S. Presti.Analysing the relationship between risk and trust. Proceedings of the Trust’’04 . 2004
  • 6A. Jφsang.Probabilistic logic under uncertainty. Proceedings of Computing: The Australian Theory Symposium (CATS’’2007) . 2007
  • 7A. Jφsang.Conditional Reasoning with Subjective Logic. Journal of Multiple-Valued Logic and Soft Computing . 2008
  • 8A. Jφsang.Cumulative and averaging unfusion of be- liefs. Proceedings of the International Conference on Information Processing and Management of Uncer- tainty (IPMU’’2008) . 2008
  • 9BISON. http://www.cs.unibo.it/bison/ .
  • 10PeerSim. http://peersim.sourceforge.net/ .

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部