期刊文献+

开放分布系统安全中的Bayes信任模型 被引量:2

A Bayes Trust Model for Open Distributed System Security
下载PDF
导出
摘要 为了解决开放分布系统的安全问题,本文提出了一个Bayes信任模型。借鉴人类的信任概念,该模型根据直接经验和推荐信息可以计算出一个实体对其他实体的信任值。在该模型中,把实体间交互成功的概率作为信任的重要指标,选择Beta分布作为其先验分布,通过对实体间4种不同关系的分析,获得相应的成功交互概率的估计。最终可形成实体的相对稳定的交互系统,为是否和别的实体交互提供依据。该模型考虑了影响信任的主观因素和客观因素,且具有统计基础,为解决开放分布系统的安全问题提供了新方法。 This paper proposes a Bayes trust model that employs the human notion of trust to address security issues in open distributed systems. Firstly, the successful interaction probability between two entities is taken as an important index of one entity's trusting in another, and Beta distribution is selected to be its prior distribution. Then, the relationships between two entities are classified into 4 kinds according to what if there exist intermediate entity and/or direct interactions, and the estimators of the successful interaction probability are analyzed in 4 situations using Bayesian approach. Finally, one entity's relatively fixed cooperation system is obtained. This cooperation system consists of all of the potential partners of this entity. This model considers not only subjective factors but also objective factors, and is based on statistical theory. It provides a new valuable method for open distributed system security.
出处 《微电子学与计算机》 CSCD 北大核心 2005年第10期24-27,共4页 Microelectronics & Computer
基金 国家自然科学基金资助项目(60173059) 陕西省教育厅科研计划项目(04JK131)
关键词 开放分布系统 信任 先验分布 成功交互概率 Open distributed system, Trust, Prior distribution, Successful interaction probability
  • 相关文献

参考文献11

  • 1L Rasmusson, S Janssen. Simulated Social Control for Secure Internet Commerce. In Catherine Meadows, editor,Proceedings of the 1996 New Security Paradigms Workshop. ACM, 1996. 被引量:1
  • 2A Josang, R Ismail, C Boyd. A Survey of Trust and Reputation Systems for Online Service Provision(to appear). Decision Support Systems, 2005. 被引量:1
  • 3Beth T, Borcherding M, Klein B. Valuation of Trust in open Networks. IN Proceedings of the Europesn Symposium on Research in Computer Security, Brighton, 1994. 被引量:1
  • 4Manchala D W. Trust Metrics, Models and Protocols for Electronic Commerce Transactions. In The 18th Intemational Conference on Distributed Computing Systems,1998: 312. 被引量:1
  • 5Mui L, Mohtashemi M, Ang C, et al. Ratings in Distributed Systems: A Bayesian Approach. In Proceedings of the Workshop on Information Technologies and Systems(WITS), 2001. 被引量:1
  • 6Boon S D, Holmes J G. The Dynamics of Interpersonal Trust: Resolving Uncertainty in the Face of Risk. Cooperation and Prosocial Behaviour. Cambridge University Press.1991. 被引量:1
  • 7Buchegger S, Le Boudec J Y. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks. In Proceedings of the Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003. 被引量:1
  • 8Jurca R, Faltings B. An Incentive Compatible Reputation Mechanism. In Proceedings of the 6th Int. Workshop on Deception Fraud and Trust in Agent Societies (at AA-MAS'03). ACM, 2003. 被引量:1
  • 9Kamvar S D, Schlosser M T, Garcia Molina H. The Eigen-Trust Algorithm for Reputation Management in P2P Networks. In proceedings of the 12th International World Wide Web Conference, Budapest, May 2003. 被引量:1
  • 10Liau C Y, et al. Efficient Distributed Reputation Scheme for Peer-to-Peer Systems. In proceedings of the 2nd International Human.Society@Internet Conference(HSI), colume LNCS 2713. Springer, 2003: 54-63. 被引量:1

同被引文献10

  • 1林作铨,牟克典,韩庆.基于未知扰动的冲突证据合成方法[J].软件学报,2004,15(8):1150-1156. 被引量:27
  • 2Morris R T, Thompson K. Password security: a case history [J]. Communication of the ACM, 1979,22(11) :594-597. 被引量:1
  • 3Hailer N M. The S/KEY one- time password system [ C] // Proceedings of the Symposium on Network and Distributed System Security. San Diego, CA, 1994:151-157. 被引量:1
  • 4Bellovin S M, Merrit M. Encrpted key exchange: password-based protocols secure against dictionary attacks [C]//Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy,Oakland, CA, 1992: 72-84. 被引量:1
  • 5Zimmermann P R. The official PGP user's guide[ M]. Mit Press, Cambridge, Massachusetts, 1995. 被引量:1
  • 6Shamir A. Identity-based cryptosystems and signature schemes [ C ]// Proceedings of CRYPT' 84. SpringerVerlag, 1985, LNCS 196:48-53. 被引量:1
  • 7Altman J.PKI Security for JXTA overlay networks.TRI2-03-06[R].Palo Alto:Sun Microsystem,2003. 被引量:1
  • 8Alfarez A bdul2Rahman,Sterhen Hailes.A distributed trust model[C]//Proc.of the 1997 New Security Paradigms Workshop.ACM,UK,1997:48-60. 被引量:1
  • 9Kamvar S D,Schlosser M T.EigenRep:reputation management in P2P networks[C]//Proc.of the 12th Int'l World Wide Web Conf.Budapest:ACM Press,2003:123-134. 被引量:1
  • 10Jovanovic M A.Modeling large-scale peer-to-peer networks and a case study of gnutella[R].USA:University of Cincinnati,2001. 被引量:1

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部