期刊文献+

开放式计算环境中一个新的声誉建立方法

New method of building reputation in open computational environment
下载PDF
导出
摘要 归纳了目前信任管理领域中声誉建立的方法,分析其不足之处并提出了一种新的声誉建立方法。该方法综合利用了拓扑信息和反馈信息,用于开放式计算环境中声誉的建立。将该方法与当前的方法进行了分析和对比。该方法可以有效地处理开放式计算环境中反馈信息少和动态性的问题,与当前方法相比,该方法更为有效。 The present methods of building reputation in trust management are summarized,whose drawbacks are analyzed and a new method of building reputation is proposed.This method uses both topology information and feedback information and it applies to building reputation in open computational environment.The method is analyzed and compared with present methods.The method can handle the problems of little feedback information and dynamic in the open computational environment.This method is more effective compared with the present methods.
作者 王进 孙怀江
出处 《计算机工程与应用》 CSCD 北大核心 2009年第11期238-240,244,共4页 Computer Engineering and Applications
基金 南京理工大学青年学者基金(No.NJUST200304)。
关键词 信任管理 声誉 智能系统 trust management reputation intelligent systems
  • 相关文献

参考文献14

  • 1Blaze M, Feigenbaum J, Lacy J.Decentralized trust management[C]// Dale J,Dinoh G.Proceedings of the Symposium on,Security and Privacy.Oakland: IEEE Computer Society Press, 1996:164-173. 被引量:1
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3王东安,秦刚,南凯,阎保平.网格计算中信任管理模型的研究[J].计算机工程,2006,32(7):32-34. 被引量:10
  • 4Jφsang A,lsmail R,Boyd C.A survey of trust and reputation systems for online service provision[J].Decision Support Systems,2007,43 (2):618-644. 被引量:1
  • 5Pujol J M,Sangaesa R,Delgado J.Extracting reputation in multi agent systems by means of social network topology[C]//Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems.New York : ACM Press, 2002 : 467-474. 被引量:1
  • 6Yu B,Venkatraman M,Singh M P.An adaptive social network for information access:theoretical and experimental resuhs[J].Journal of the Applied Artificial Intelligence,2003,17(1):21-38. 被引量:1
  • 7Jφsang A,Ismail R.The beta reputation system[C]//Proceedings of the 15th Bled Conference on Electronic Commerce,Bled,Slovenia,2002 : 708-721. 被引量:1
  • 8Aime M D,Lioy A.Incremental trust:building trust from past experience[C]//WOWMOM, 2005 : 603-608. 被引量:1
  • 9Cvrcek D,Jr V M,Patel A.Evidence processing and privacy issuesin evidence-based reputation systems[J].Computer Standards & Interfaces, 2005,27 (5) : 533-545. 被引量:1
  • 10汪小帆,李翔,陈关荣编著..复杂网络理论及其应用[M].北京:清华大学出版社,2006:260.

二级参考文献28

  • 1王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 2高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20
  • 3M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989. 被引量:1
  • 4R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164. 被引量:1
  • 5A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997. 被引量:1
  • 6T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18. 被引量:1
  • 7A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311. 被引量:1
  • 8E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998. 被引量:1
  • 9D. Gambetta. Can we trust trust? In: Trust: Making and Breaking Cooperative Relations (Electronic edition), Department of Sociology, University of Oxford, Chapter 13. http: ∥www. sociology. ox. ac. uk/papers/gambetta 213 ~ 237. pdf, 2000.213~237. 被引量:1
  • 10LA扎德.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982.63-84. 被引量:1

共引文献208

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部