期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:2
1
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 Peer-to-peer p2p network REPUTATION trust model mutual evaluation similarity risk
下载PDF
A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks 被引量:2
2
作者 李小勇 桂小林 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期868-882,共15页
Based on human psychological cognitive behavior, a Comprehensive and Adaptive Trust (CAT) model for largescale P2P networks is proposed. Firstly, an adaptive trusted decision-making method based on HEW (Historical ... Based on human psychological cognitive behavior, a Comprehensive and Adaptive Trust (CAT) model for largescale P2P networks is proposed. Firstly, an adaptive trusted decision-making method based on HEW (Historical Evidences Window) is proposed, which can not only reduce the risk and improve system efficiency, but also solve the trust forecasting problem when the direct evidences are insufficient. Then, direct trust computing method based on IOWA (Induced Ordered Weighted Averaging) operator and feedback trust converging mechanism based on DTT (Direct Trust Tree) are set up, which makes the model have a better scalability than previous studies. At the same time, two new parameters, confidence factor and feedback factor, are introduced to assign the weights to direct trust and feedback trust adaptively, which overcomes the shortage of traditional method, in which the weights are assigned by subjective ways. Simulation results show that, compared to the existing approaches, the proposed model has remarkable enhancements in the accuracy of trust decision-making and has a better dynamic adaptation capability in handling various dynamic behaviors of peers. 展开更多
关键词 p2p networks dynamic trust model IOWA operator ADAPTABILITY
原文传递
A Novel Approach to Improve the Security of P2P File-Sharing Systems
3
作者 Cuihua ZUO Ruixuan LI Zhengding LU 《International Journal of Communications, Network and System Sciences》 2009年第3期229-236,共8页
The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an impor-ta... The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an impor-tant research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P file-sharing systems where peers can transact with each other without prior experience. However, current P2P trust models almost take no consideration for the nature of trust, fuzzy, complex and dynamic, which results in low efficiency in resisting the attacks of malicious nodes. In this paper, a new trust model named NatureTrust that can alleviate the shortage brought by the nature of trust is proposed. In order to cope with the fuzzy characteristic of trust, linguistic terms are used to express trust. Additionally, fuzzy inference rules are employed to evaluate trust of each transaction so as to handle the complex characteristic of trust. Fur-thermore, risk factor is deployed into NatureTrust to represent and reason with the dynamic characteristic of trust. Both risk and trust factors are considered in evaluating the trustworthiness of each peer. Experimental results show that the trust model analyzed here thus stands against malicious act effectively. 展开更多
关键词 PEER-TO-PEER (p2p) FILE-SHARING SECURITY Risk trust model Fuzzy INFERENCE
下载PDF
Applying TAM in B2C E-Commerce Research: An Extended Model 被引量:4
4
作者 邱凌云 李东 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第3期265-272,共8页
As one of the most widely accepted adoption models in information systems research, the technology acceptance model (TAM) focuses exclusively on cognition-oriented constructs such as perceived usefulness and perceiv... As one of the most widely accepted adoption models in information systems research, the technology acceptance model (TAM) focuses exclusively on cognition-oriented constructs such as perceived usefulness and perceived ease of use. This perspective may have limited the explanatory power of TAM when it is utilized in studying consumers’ adoption intentions of online shopping. Based on the contrasts between e-commerce systems and traditional workplace information systems as well as empirical findings from a variety of recent e-commerce research works, this paper analyzes an extended model which integrates three additional constructs: trust, social presence, and perceived enjoyment. The interrelationship between these constructs is also explained. Empirical validations of this extended model are expected in future research. 展开更多
关键词 technology acceptance model (TAM) B2C electronic commerce online shopping social presence trust perceived enjoyment
原文传递
针对星载SAR法拉第旋转估计的NeQuick-2模型精度分析 被引量:1
5
作者 訾海峰 门志荣 +2 位作者 陈筠力 孙永岩 刘艳阳 《上海航天(中英文)》 CSCD 2020年第5期79-85,共7页
P波段星载合成孔径雷达(SAR)凭借其较强的穿透能力,在对森林、沙地等观测方面具有较强的优势,但易受法拉第旋转等电离层干扰的影响,其图像质量严重下降。本文针对现有电离层模型的精度开展分析,以基于GPS的CODE GIM全球电离层实测数据... P波段星载合成孔径雷达(SAR)凭借其较强的穿透能力,在对森林、沙地等观测方面具有较强的优势,但易受法拉第旋转等电离层干扰的影响,其图像质量严重下降。本文针对现有电离层模型的精度开展分析,以基于GPS的CODE GIM全球电离层实测数据为参考,对比评估NeQuick-2模型的电离层总电子量表征能力。在分析CODE GIM实测数据特点的基础上,讨论其在星载SAR领域的局限性;在解析NeQuick-2模型和方法的基础上,研究其表征精度的影响因素;通过对比该模型生成的电离层数据与CODE GIM数据,验证NeQuick-2模型的估计精度。结果表明:NeQuick-2模型可满足P波段星载SAR的法拉第旋转角估计和校正的需求。 展开更多
关键词 星载合成孔径雷达(SAR) P波段 CODE GIM数据 NeQuick-2模型 电离层TEC
下载PDF
One-Electron-Addition to Pentavalent Phosphorus with the Phosphorus-Chlorine Bond as Acceptor Introducing a Fundamental Distinction in Substitution Mechanism between S<sub>N</sub>2(P) and S<sub>N</sub>2(C)
6
作者 Henk M.Buck 《Open Journal of Physical Chemistry》 2019年第3期182-191,共10页
An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reacti... An electron-addition, under single-crystal conditions, to pentavalent phosphorus compounds as Cl-P (=O, S) Y, Z with the P-Cl bond as electron-accepting group, is selected as an additional model for SN2(P) like reactions. It is demonstrated that the geometric information stored in the tetrahedral configuration (substrate) can be transmitted in the corresponding trigonal bipyramidal (TBP) state for nucleophilic substitution. In this article, we focus on these specific mechanistic aspects of carbon and phosphorus. We consider our study as a contribution to the significance of these (bio)chemical intermediates. 展开更多
关键词 Pentavalent PHOSPHORUS and Carbon Compounds σ*-Electron-Addition Single-Crystal Electron Spin Resonance (ESR) model and Ab Initio Calculations Differences in SN2(C) vs. SN2(P) MECHANISM
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部