期刊文献+

P2P电子商务信任评估机制研究 被引量:1

Study on Trust Evaluation Mechanism for P2P E-Commerce
原文传递
导出
摘要 近年电子商务发展迅猛,而点对点(P2P,Peer-to Peer)电子商务更是解决了传统电子商务的服务器瓶颈问题,但信任安全始终是无法绕过的难题。为了研究P2P电子商务中节点间的信任评估,借助模糊理论的知识,提出了一种基于模糊层次分析法的P2P电子商务信任模型。该模型考虑了影响P2P电子商务信任的几个因素,并用模糊层次分析法确定它们对信任度的影响权重,由综合决策计算得到节点的综合信任度。由仿真实例可以看出模型具有较好的抗欺骗能力。 In recent years,with the development of electronic commerce,P2P e-commerce solves the bottleneck of traditional e-commerce server,while the trust becomes a problem that could be bypassed.To study the trust evaluation mechanism between nodes in P2P e-commerce,a trust model based on FAHP for P2P e-commerce is proposed with the help of fuzzy theory.This model takes account of several factors which affect the trust relation in P2P e-commerce,and uses FAHP to confirm the weight of each factor's impact on trust,and then comprehensive trust value is provided by integrated evaluation.The simulation proves that the model is of a fairly strong anti-deceiving capability.
出处 《通信技术》 2011年第2期93-96,共4页 Communications Technology
关键词 P2P电子商务 信任模型 模糊层次分析法 P2P e-commerce trust model FAHP
  • 相关文献

参考文献3

二级参考文献21

  • 1赵宏,常显奇.导航定位卫星作战信息支援效能评估方法研究[J].指挥技术学院学报,2001,12(2):26-28. 被引量:14
  • 2安雪滢,赵勇,杨乐平,张为华.基于模糊理论的卫星系统效能评估仿真研究[J].系统仿真学报,2006,18(8):2334-2337. 被引量:27
  • 3Triantaphyllou E. A Sensitivity Analysis Approach for Some Deterministic Multi-criteria Decision Making Methods [J]. Decision Science, 1997,28(1):151-194. 被引量:1
  • 4Machacha L L, Bhaeeacharya P. A Fuzzy-logic-based Approach to Project Selection[J].IEEE Transaction on Engineering Management (S0018-9391),2000,47(1):65-73. 被引量:1
  • 5M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989. 被引量:1
  • 6R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164. 被引量:1
  • 7A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997. 被引量:1
  • 8T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18. 被引量:1
  • 9A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311. 被引量:1
  • 10E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998. 被引量:1

共引文献98

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部