高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

模糊自主信任建立策略的研究

张仕斌 何大可 遠藤誉

张仕斌, 何大可, 遠藤誉. 模糊自主信任建立策略的研究[J]. 电子与信息学报, 2006, 28(8): 1492-1496.
引用本文: 张仕斌, 何大可, 遠藤誉. 模糊自主信任建立策略的研究[J]. 电子与信息学报, 2006, 28(8): 1492-1496.
Zhang Shi-bin, He Da-ke, Homare Endo. Research of Fuzzy Autonomous Trust Establishment Strategy[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1492-1496.
Citation: Zhang Shi-bin, He Da-ke, Homare Endo. Research of Fuzzy Autonomous Trust Establishment Strategy[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1492-1496.

模糊自主信任建立策略的研究

Research of Fuzzy Autonomous Trust Establishment Strategy

  • 摘要: 该文首先从分析开放式网络环境中有关信任的问题和主观信任的模糊性入手,以模糊理论为基础,引入隶属度来描述信任的模糊性,解决了模糊信任模型的建模问题;以图论为基础,将网络环境模型化为一个无向图 ,定义了基于本地信息交互的信任评价规则;提出了基于开放式网络环境的模糊自主信任模型,具体研究了自主信任建立策略及建立完全可信网络的实现机制及条件;最后通过仿真实验讨论了网络拓扑结构对自主信任建立的影响,并以小世界网络模型(-model)为基础分析讨论了自主信任建立的速度问题,这为网络管理的研究提供了一个有价值的新思路。
  • Gambetta D. Can We Trust Trust [M] In D. Gambetta editor, Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford, 1990: 213-238.[2]Jsang A. Prospectives of modeling trust in information security [A]. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy [C]. Sydney, Australia, 1997: 219-231.[3]Jsang A. A logic for uncertain probabilities [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311.[4]Blaze M, Feigenbaum J, Keromytis A D. Keynote: Trust management for public-key infrastructures [A]. In: Christianson B, Crispo B, William S, et al.. eds. Cambridge 1998 Security Protocols International Workshop [C]. Cambridge, UK, April 15-17, 1998. Berlin: Springer-Verglag, 1999: 59-63.[5]Beth T, Borcherding M, Klein B. Valuation of trust in open networks [A]. In: Gollmann D. ed. Proceedings of the European Symposium on Research in Security (ESORICS) [C]. Brighton, United Kingdom, November 1994: 3-18.[6]Jsang A. Trust-Based decision making for electronic transactions [EB/OL]. In: Proceedings of the 4th Nordic Workshop on Secure Computer System(NORDSEC99) [C]. Stockholm, Sweden, Stockholm University Report 99-005, 1999.[7]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [A], In: Dale J, Dinolt G, eds. Proceedings of the Symposium on Security and Privacy [C]. Oakland: IEEE Computer Society Press, 1996: 164-173.[8][8] Pretty good privacy users guide [S]. Distributed with the PGP software. Version 8.0 .2003.[9][9] Housley R. Internet X.509 Public Key Infrastructure, Certificate and CRL Profiles[S]. RFC2459, 1999. [10] Sonja Buchegger, Jean-Yves Le Boudec. The effect of rumor spreading in reputation systems for mobile Ad-hoc networks [A]. In Proceedings of Modeling and Optimization in Mobile, Ad hoc and Wireless Networks (WiOpt) [C], Sophia-Antipolis, France, March 2003: 66-75.[10]Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks [A]. In Proceedings of the Twelfth International World Wide Web Conference [C]. Budapest, Hungary, 2003: 640-651.[11]Sergio Marti, Hector Garcia-Molina. Limited reputation sharing in p2p systems [A]. In Proceedings of the 5th ACM Conference on Electronic Commerce [C]. New York, NY, USA, 2004: 91-101.Tutte W T. Graph Theory [M]. Cambridge University Press, 2004.09: 78-97.[12]L.A .扎德著, 陈国权译. 模糊集合、语言变量及模糊逻辑 [M]. 北京: 科学出版社, 1982: 56-75.[13]谢季坚, 刘承平. 模糊数学方法及其应用[M]. 华中科技大学出版社, 2000: 16-20.[14]Chan Haowen, Perrig A, Song Dawn. Random key predistribution schemes for sensor networks [A]. In Proceedings of the 2003 IEEE Symposium on Security and Privacy [C]. IEEE Computer Society. 2003: 175-183.[15]Bremaud P, Chains M. Gibbs fields, Monte Carlo simulation, and queues [M]. Texts in Applied Mathematics; 31. Springer-Verlag New York, Inc., 1999: 234-266.[16]Watts D J, Strogatz S H. Collective dynamics of small-world networks [J].Nature.1998, 393:440-442[17]Watts D J. Small Worlds: the Dynamics of Networks Between Order and Randomness [M]. Princeton University Press, 2004: 124-147.
  • 加载中
计量
  • 文章访问数:  2265
  • HTML全文浏览量:  58
  • PDF下载量:  563
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-08-29
  • 修回日期:  2006-02-01
  • 刊出日期:  2006-08-19

目录

    /

    返回文章
    返回