Evaluation approach of subjective trust based on cloud model

被引:25
作者
Wang S.-X. [1 ]
Zhang L. [1 ]
Li H.-S. [2 ]
机构
[1] Software Engineering Institute, BeiHang University
[2] State Key Laboratory of Software Development Environment, BeiHang University
来源
Ruan Jian Xue Bao/Journal of Software | 2010年 / 21卷 / 06期
关键词
Cloud model; Subjective trust; Trust change; Trust decision-making;
D O I
10.3724/SP.J.1001.2010.03501
中图分类号
学科分类号
摘要
The trust decision-making is very important to people in Electronic Commerce transactions. The approaches that assist people to finish trust decision-making become a basic issue that researcher must face and solve imminently in the field. A new quantificational subjective trust evaluation approach based on the cloud model is presented. The expected value and hyper entropy of subjective cloud is used to evaluate the reputation of trust objects, and a trust change cloud model is designed to depict the reputation change style of trust objects in order to provide additional evidence. The result of simulating experiments shows the validity and effectiveness of this approach. © by Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1341 / 1352
页数:11
相关论文
共 26 条
[1]  
Blaze M., Feigenbaum J., Ioannidis J., Keromytis A.D., The role of trust management in distributed systems security, Proc. of the Secure Internet Programming: Issues for Mobile and Distributed Objects, pp. 185-210, (1999)
[2]  
Khare R., Rifkin A., Trust management on World Wide Web, World Wide Web Journal (S1085-2298), 2, 3, pp. 77-112, (1997)
[3]  
Tang W., Chen Z., Research of subjective trust management model based on the fuzzy set theory, Journal of Software, 14, 8, pp. 1401-1408, (2003)
[4]  
Tang W., Hu J.B., Chen Z., Research on a fuzzy logic-based subjective trust management model, Computer Research and Development, 42, 10, pp. 1654-1659, (2005)
[5]  
Burrows M., Abadi M., Needham R.M., A logic of authentication, (1989)
[6]  
Blaze M., Ioannidis J., Keromytis A.D., Experience with the KeyNote Trust Management System: Applications and Future Directions, pp. 284-300, (2003)
[7]  
Blaze M., Feigenbaum J., Keromytis A.D., KeyNote: Trust management for public-key infrastructures, Proc. of the Cambridge'98 Security Protocols Int'l Workshop, pp. 59-63, (1998)
[8]  
Beth T., Borcherding M., Klein B., Valuation of trust in open networks, Proc. of the European Symp. on Research in Security (ESORICS), pp. 3-18, (1994)
[9]  
Yahalom R., Klein B., Beth T., Trust relationships in secure systems-A distributed authentication perspective, Proc. of the 1993 IEEE Symp. on Research in Security and Privacy, pp. 150-164, (1993)
[10]  
Liu S.K., Liu X.T., A new method of elevation of confidence level of large-scale perplexing simulation system, Journal of System Simulation, 13, 5, pp. 666-669, (2001)