期刊文献+

P2P网络中基于随时间推移的风险值评估的信任管理模型 被引量:2

Trust management model based on value-at-risk evaluation with changing time in P2P network
下载PDF
导出
摘要 针对现有的对等(P2P)网络信任管理模型中存在的问题:忽视短期交易时间与长期交易时间对信任值的不同影响以及缺少对交易对象资源的具体风险分析,在现有信任管理模型的基础之上,以不同用户对同一种类资源所提供的资源品质和风险作为关注点,引入风险值评估的概念,建立了基于随时间推移的风险值评估的信任管理模型。仿真结果表明,该模型使得恶意节点的行为得到有效控制,对交易资源的分析量化更加深入,进一步有效地帮助用户筛选出最优的交易者。 The trust management models in Peer-to-Peer (P2P) network mainly have two problems. For one thing, the different influences on value of trust between short-term trading and long-term trading are usually ignored. For another, the lack of the specific risk analysis on trading resources exists. Consequently, focusing on the quality of different nodes and its opposite risk value, this paper introduced the concept of risk factor with setting up its value and proposed a trust management model based on evaluation of value-at-risk with changing time. From the simulation results, a higher efficiency on resisting malicious actions in P2P network is achieved, and it has confirmed to select better traders effectively with a deeply quantitative analysis of trade resources through the model.
出处 《计算机应用》 CSCD 北大核心 2012年第9期2613-2616,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60973146) 北京邮电大学大学生创新研究基金资助项目
关键词 信息安全 对等网络 信任管理模型 风险因子 风险值评估 information security Peer-to-Peer (P2P) network trust management model risk factor value-at-risk evaluation
  • 相关文献

参考文献6

二级参考文献46

共引文献254

同被引文献22

  • 1于泠,陈波,肖军模.多策略的工作流管理系统访问控制模型[J].系统工程理论与实践,2009,29(2):151-158. 被引量:4
  • 2SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[ J]. IEEE Computer, 1996, 29(2) : 38 -47. 被引量:1
  • 3JOSHI J B D, BERTINO E, LATIF U, et al. A generalized tempo- ral role-based access control model [ J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17( 1): 4 -23. 被引量:1
  • 4BREWER D F C, NASH M. The Chinese wall security policy [ C]//Proceedings of the 1989 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 1989:206-214. 被引量:1
  • 5HOSMER H H. Using fuzzy logic to represent security policies in the muhipolicy paradigm [ J]. ACM SIGSAC Reviews, 1992,10(4) : 12 -21. 被引量:1
  • 6TAKABI H, AMINI M. Separation of duty in role-based access con- trol model through fuzzy relation[ C]// IAS 2007: Proceedings of the Third International Symposium on Information Assurance and Securi- ty. Piscataway: IEEE, 2007:125-130. 被引量:1
  • 7NAWARATHNA U H G R D, KODITHUWAKKU S R. A fuzzy role based access control model for database security[ C]// Proceedings of the 2005 International Conference on Information and Automation. Piscataway: IEEE, 2005:313 -318. 被引量:1
  • 8MARTINEZ-GARCfA C, NAVARRO-ARRIBAS G, BORRELL J. Fuzzy role-based access control[ J]. Information Processing Letters, 2011,111 (10) : 483 - 487. 被引量:1
  • 9CELIKEL E, KANTARCIOGLU M, THURAISINGHAN B, et al. Managing risks in RBAC employed distributed environments [ C]// On the Move to Meaningful Internet Systems 2007: CooplS, DOA, ODBASE, GADA, and IS, LNCS 4804. Berlin: Springer, 2007: 1548 - 1566. 被引量:1
  • 10CELIKEL E, KANTARCIOGLU M, THURAIINGHAM B M, et al. A risk management approach to RBAC[ J]. Risk and Decision Analysis, 2009, 1(2) : 21 -33. 被引量:1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部