期刊文献+

开放分布系统中局部信任度计算方法研究

New local trust degree computation method for open distributed systems
下载PDF
导出
摘要 针对现有的局部信任度计算方法忽视了交互经验的时效性及充分性等问题,提出一种证据理论框架下的局部信任度计算方法,该方法采用了时效因子计算函数来区分不同时间内的交互经验在局部信任度计算中的重要性;同时,采用了半梯形函数来区分基于不同交互经验计算得到的局部信任度的有效性。实验分析表明,该方法对实体行为改变有较强的敏感性,能有效地降低对各种恶意实体的局部信任度。 This paper proposed a new computation method for local trust value based on D-S theory of evidence, while the ex- istent methods for local trust value were based on count of success and failure times of interaction and ignored the effect on the local trust degree of adequacy and timeliness of interaction experience. In the method, introduced a normalized sigmoid func- tion to distinguish the importance of interactive experiences occurred in different time and used a semi-trapezoidal function to distinguish the adequacy of interactive experiences. Analysis and experiment show that it is sensitive to entity behavior altering and effective in reducing the local trust degree placed on malicious entity.
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期290-292,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(90718021) 自主科研专项计划资助项目(2010ZYTS035) 高等学校博士学科点专项科研基金资助项目(20093219120024)
关键词 开放分布系统 信任 证据理论 安全性 open distributed systems trust D-S theory of evidence security
  • 相关文献

参考文献2

二级参考文献11

  • 1..BRITE[EB/OL]..http://www.cs.bu.edu/brite/,,2007-05-10.. 被引量:2
  • 2K.ahney L. Cheaters bow to peer pressure. 2001. http://www.wired.com/news/technology/0, 1282,41838,00.html 被引量:1
  • 3Liang J, Kumar R, Xi Y, Ross KW. Pollution in file sharing systems. In: Makki K, Knightly E, eds. Proc. of the IEEE Infocom 2005, INFOCOM. New York: IEEE Press, 2005.1174-1185. 被引量:1
  • 4Page L, Brin S, Motwani R, Winograd T. The PageRank citation ranking: Bringing order to the Web. Technical Report, SIDL-WP-1999-0120, Stanford University, 1999. 被引量:1
  • 5Lian Q, Peng Y, Yang M, Zhang Z, Dai YF, Li XM. Robust incentives via multi-level tit-for-tat. In: Proc. of the 5th Int'l Workshop on Peer-to-Peer Systems (IPTPS). Santa Barbara, 2006. http://iptps06.cs.ucsb.edu/ 被引量:1
  • 6Kamvar SD, Schlosser MT, Garcia-Molina H. The EigenTrust algorithm for reputation management in P2P networks. In: Bakonyi P, Hencsey G, eds. Proc. of the 12th Int'l Conf. on World Wide Web. Budapest: ACM Press, 2003. 640-651. 被引量:1
  • 7Guha R, Kumar R, Raghavan. P, Tomkins A. Propagation of trust and distrust. In: Feldman SI, Uretsky M, Najork M, Wills CE, eds. Proc. of the 13th Int'l Conf. on World Wide Web. New York: ACM Press, 2004.403-412. 被引量:1
  • 8Song S, Hwang K, Zhou R. Kwok YK. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 2005, 9(6):24-34. 被引量:1
  • 9Aberer K, Despotovic Z. Managing trust in a peer-to-peer information system. In: Paques H, Liu L, Grossman D, eds. Proc. of the 10th Int'l Conf. on Information and Knowledge Management (CIKM 2001). Atlanta: ACM Press, 2001.310-317. 被引量:1
  • 10Swamynathan G, Zhao BY, Almeroth KC. Exploring the feasibility of proactive reputations. In: Proc. of the 5th Int'l Workshop on Peer-to-Peer Systems (IPTPS). Santa Barbara, 2006. http://iptps06.cs.ucsb.edu/ 被引量:1

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部