The trust decision-making is very important to people in Electronic Commerce transactions. The approaches that assist people to finish trust decision-making become a basic issue that researcher must face and solve imminently in the field. A new quantificational subjective trust evaluation approach based on the cloud model is presented. The expected value and hyper entropy of subjective cloud is used to evaluate the reputation of trust objects, and a trust change cloud model is designed to depict the reputation change style of trust objects in order to provide additional evidence. The result of simulating experiments shows the validity and effectiveness of this approach.
[1] Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Proc. of the Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210. http://cs-www.cs.yale. edu/homes/jf/BFIK-SIP.pdf
[2] Khare R, Rifkin A. Trust management on World Wide Web. World Wide Web Journal (S1085-2298), 1997,2(3):77-112.
[3] Tang W, Chen Z. Research of subjective trust management model based on the fuzzy set theory. Journal of Software, 2003,14(8): 1401-1408 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1401.htm
[4] Tang W, Hu JB, Chen Z. Research on a fuzzy logic-based subjective trust management model. Computer Research and Development, 2005,42(10):1654-1659 (in Chinese with English abstract).
[5] Burrows M, Abadi M, Needham RM. A logic of authentication. Technical Report, The Royal Society of London, DEC Systems Research Center, 1989. 39.
[6] Blaze M, Ioannidis J, Keromytis AD. Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust. New York: Springer-Verlag, 2003. 284-300. http://www.springerlink.com/content/aq8v28ryxrhp4ykx/fulltext.pdf
[7] Blaze M, Feigenbaum J, Keromytis AD. KeyNote: Trust management for public-key infrastructures. In: Christianson B, Crispo B, William S, et al., eds. Proc. of the Cambridge’98 Security Protocols Int’l Workshop. 1998. 59-63.
[8] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proc. of the European Symp. on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3-18.
[9] Yahalom R, Klein B, Beth T. Trust relationships in secure systems—A distributed authentication perspective. In: Proc. of the 1993 IEEE Symp. on Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150-164. http://eprints.kfupm.edu.sa/73440/1/73440.pdf
[10] Liu SK, Liu XT, A new method of elevation of confidence level of large-scale perplexing simulation system. Journal of System Simulation, 2001,13(5):666-669 (in Chinese with English abstract).
[11] J?sang A. A logic for uncertain probabilities. Int’l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (S0218-4885), 2001,9(3):279-311.
[12] Yuan W, Li JS, Hong PL. Distributed peer-to-peer trust model and computer simulation. Journal of System Simulation, 2006,18(4): 938-942 (in Chinese with English abstract).
[13] Meng XY. Research and implement on trust model and trust evaluation system based on cloud model [MS. Thesis]. Beijing: BeiHang University, 2007 (in Chinese with English abstract).
[14] Meng XY, Zhang GW, Liu CY, Kang JC, Li HS. Research on subjective trust management model based on cloud model. Journal of System Simulation, 2007,19(14):3310-3317 (in Chinese with English abstract).
[15] Zhang GW, Li DY, Li P, Kang JC, Chen GS. A collaborative filtering recommendation algorithm based on cloud model. Journal of Software, 2007,18(10):2403-2411 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/2403.htm [doi: 10.1360/jos182403]
[16] Zhang GW, Kang JC, Li HS, Liu CY, Li DY. Context based collaborative filtering recommendation algorithm. Journal of System Simulation, 2006, 18(2):595-601 (in Chinese with English abstract).
[17] Zan H, Hsinchun C, Daniel Z. Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans. on Information Systems, 2004,22(1):116-142.
[18] Thiesson B, Meek C, Chickering DM, Heckerman D. Learning mixture of DAG models. Technical Report, MSR-TR-97-30, 1997. https://eprints.kfupm.edu.sa/48217/1/48217.pdf
[19] Sarwar B, Karypis G, Konstan J, Riedl J. Analysis of recommendation algorithms for E-commerce. In: Proc. of the 2nd ACM Conf. on Electronic Commerce. New York: ACM Press, 2001. 158-167. http://www.research.ibm.com/iac/ec00/
[20] Aggarwal CC, Wolf J, Wu KL, Yu PS. Horting hatches an egg: A new graph-theoretic approach to collaborative filtering. In: Proc. of the 5th ACM SIGKDD Int’l Conf. on Knowledge Discovery and Data Mining. New York: ACM Press, 1999. 201-212. https://eprints.kfupm.edu.sa/44183/1/44183.pdf
[21] Li DY, Liu CY, Du Y, Han X. Artificial intelligence with uncertainty. Journal of Software, 2004,15(9):1583-1594 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1583.htm
[22] Li DY, Du Y. Artificial Intelligence with Uncertainty. Chapman & Hall/CRC Taylor & Francis Group, 2008.
[23] Li DY, Liu CY. The universality of normal cloud model. Engineering Science, 2004,6(8):28-34 (in Chinese with English abstract).
[24] Zacharia G, Maes P. Trust management through reputation mechanisms. Applied Artificial lntelligence, 2000,14:881-907.
[25] Maximillen Em, Singh MP. Conceptual model of Web services reputation. ACM SIGMOD (Special Section on Semantic Web and Data Management), 2002,31(4):36-41.
[26] Montaner M, Lopez B, Lluis J, de la Rosa. Opinion-Based filtering through trust. In: Proc. of the 6th Int’l Workshop on Cooperative Information Agents, Vol.6. 2002. 164-178. http://eia.udg.es/~mmontane/montaner-cia02.pdf