一种基于云模型的主观信任评价方法
作者:
基金项目:

Supported by the National Basic Research Program of China under Grant No.2007CB310803 (国家重点基础研究发展计划(973))


Evaluation Approach of Subjective Trust Based on Cloud Model
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [34]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    如何通过直观、简单和有效的评价方法,辅助消费者完成网上交易中的信任决策,已成为该领域需要面对和解决的一个基本问题.在信任云的基础上,提出一种基于云模型的主观信任量化评价方法.使用主观信任云的期望和超熵对信任客体信用度进行定量评价,进而设计一种信任变化云刻画信任客体信用度的变化情况,为进一步的信任决策提供依据.对实验数据的分析表明,该方法能够有效地支持信任主体的主观信任决策过程,对主观信任评价研究进行了有益的探索和尝试.

    Abstract:

    The trust decision-making is very important to people in Electronic Commerce transactions. The approaches that assist people to finish trust decision-making become a basic issue that researcher must face and solve imminently in the field. A new quantificational subjective trust evaluation approach based on the cloud model is presented. The expected value and hyper entropy of subjective cloud is used to evaluate the reputation of trust objects, and a trust change cloud model is designed to depict the reputation change style of trust objects in order to provide additional evidence. The result of simulating experiments shows the validity and effectiveness of this approach.

    参考文献
    [1] Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Proc. of the Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210. http://cs-www.cs.yale. edu/homes/jf/BFIK-SIP.pdf
    [2] Khare R, Rifkin A. Trust management on World Wide Web. World Wide Web Journal (S1085-2298), 1997,2(3):77-112.
    [3] Tang W, Chen Z. Research of subjective trust management model based on the fuzzy set theory. Journal of Software, 2003,14(8): 1401-1408 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1401.htm
    [4] Tang W, Hu JB, Chen Z. Research on a fuzzy logic-based subjective trust management model. Computer Research and Development, 2005,42(10):1654-1659 (in Chinese with English abstract).
    [5] Burrows M, Abadi M, Needham RM. A logic of authentication. Technical Report, The Royal Society of London, DEC Systems Research Center, 1989. 39.
    [6] Blaze M, Ioannidis J, Keromytis AD. Experience with the KeyNote Trust Management System: Applications and Future Directions. iTrust. New York: Springer-Verlag, 2003. 284-300. http://www.springerlink.com/content/aq8v28ryxrhp4ykx/fulltext.pdf
    [7] Blaze M, Feigenbaum J, Keromytis AD. KeyNote: Trust management for public-key infrastructures. In: Christianson B, Crispo B, William S, et al., eds. Proc. of the Cambridge’98 Security Protocols Int’l Workshop. 1998. 59-63.
    [8] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proc. of the European Symp. on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3-18.
    [9] Yahalom R, Klein B, Beth T. Trust relationships in secure systems—A distributed authentication perspective. In: Proc. of the 1993 IEEE Symp. on Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150-164. http://eprints.kfupm.edu.sa/73440/1/73440.pdf
    [10] Liu SK, Liu XT, A new method of elevation of confidence level of large-scale perplexing simulation system. Journal of System Simulation, 2001,13(5):666-669 (in Chinese with English abstract).
    [11] J?sang A. A logic for uncertain probabilities. Int’l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (S0218-4885), 2001,9(3):279-311.
    [12] Yuan W, Li JS, Hong PL. Distributed peer-to-peer trust model and computer simulation. Journal of System Simulation, 2006,18(4): 938-942 (in Chinese with English abstract).
    [13] Meng XY. Research and implement on trust model and trust evaluation system based on cloud model [MS. Thesis]. Beijing: BeiHang University, 2007 (in Chinese with English abstract).
    [14] Meng XY, Zhang GW, Liu CY, Kang JC, Li HS. Research on subjective trust management model based on cloud model. Journal of System Simulation, 2007,19(14):3310-3317 (in Chinese with English abstract).
    [15] Zhang GW, Li DY, Li P, Kang JC, Chen GS. A collaborative filtering recommendation algorithm based on cloud model. Journal of Software, 2007,18(10):2403-2411 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/2403.htm [doi: 10.1360/jos182403]
    [16] Zhang GW, Kang JC, Li HS, Liu CY, Li DY. Context based collaborative filtering recommendation algorithm. Journal of System Simulation, 2006, 18(2):595-601 (in Chinese with English abstract).
    [17] Zan H, Hsinchun C, Daniel Z. Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans. on Information Systems, 2004,22(1):116-142.
    [18] Thiesson B, Meek C, Chickering DM, Heckerman D. Learning mixture of DAG models. Technical Report, MSR-TR-97-30, 1997. https://eprints.kfupm.edu.sa/48217/1/48217.pdf
    [19] Sarwar B, Karypis G, Konstan J, Riedl J. Analysis of recommendation algorithms for E-commerce. In: Proc. of the 2nd ACM Conf. on Electronic Commerce. New York: ACM Press, 2001. 158-167. http://www.research.ibm.com/iac/ec00/
    [20] Aggarwal CC, Wolf J, Wu KL, Yu PS. Horting hatches an egg: A new graph-theoretic approach to collaborative filtering. In: Proc. of the 5th ACM SIGKDD Int’l Conf. on Knowledge Discovery and Data Mining. New York: ACM Press, 1999. 201-212. https://eprints.kfupm.edu.sa/44183/1/44183.pdf
    [21] Li DY, Liu CY, Du Y, Han X. Artificial intelligence with uncertainty. Journal of Software, 2004,15(9):1583-1594 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1583.htm
    [22] Li DY, Du Y. Artificial Intelligence with Uncertainty. Chapman & Hall/CRC Taylor & Francis Group, 2008.
    [23] Li DY, Liu CY. The universality of normal cloud model. Engineering Science, 2004,6(8):28-34 (in Chinese with English abstract).
    [24] Zacharia G, Maes P. Trust management through reputation mechanisms. Applied Artificial lntelligence, 2000,14:881-907.
    [25] Maximillen Em, Singh MP. Conceptual model of Web services reputation. ACM SIGMOD (Special Section on Semantic Web and Data Management), 2002,31(4):36-41.
    [26] Montaner M, Lopez B, Lluis J, de la Rosa. Opinion-Based filtering through trust. In: Proc. of the 6th Int’l Workshop on Cooperative Information Agents, Vol.6. 2002. 164-178. http://eia.udg.es/~mmontane/montaner-cia02.pdf
    附中文参考文献: [3] 唐文,陈钟.基于模糊集合理论的主观信任管理模型研究.软件学报,2003,14(8):1401-1408. http://www.jos.org.cn/1000-9825/14/ 1401.htm [4] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信息管理模型研究.计算机研究与发展,2005,42(10):1654-1659. [10] 柳世考,刘兴堂.一种有效评估大型复杂仿真系统可信度的新方法.系统仿真学报,2001,13(5):666-669.
    [12] 袁巍,李津生,洪佩琳.一种P2P网络分布式信任模型及仿真.系统仿真学报,2006,18(4):938-942.
    [13] 孟祥怡.基于云模型的信任模型及信任评估系统的研究与实现[硕士学位论文].北京航空航天大学,2007.
    [14] 孟祥怡,张光卫,康建初,李鹤松.基于云模型的主观信任管理模型研究.系统仿真学报,2007,19(14):3310-3317.
    [15] 张光卫,李德毅,李鹏,康建初,李鹤松.基于云模型的协同过滤推荐算法.软件学报,2007,18(10):2403-2411.http://www.jos.org.cn/ 1000-9825/18/2403.htm [doi: 10.1360/jos182403]
    [16] 张光卫,康建初,李鹤松,刘常昱,李德毅.面向场景的协同过滤推荐算法.系统仿真学报,2006,18(2):595-601.
    [21] 李德毅,刘常煜,杜鹢,韩旭.不确定性人工智能.软件学报,2004,15(9):1583-1594. http://www.jos.org.cn/1000-9825/15/1583.htm
    [23] 李德毅,刘常昱.论正态云模型的普适性.中国工程科学,2004,6(8):28-34.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

王守信,张 莉,李鹤松.一种基于云模型的主观信任评价方法.软件学报,2010,21(6):1341-1352

复制
分享
文章指标
  • 点击次数:8697
  • 下载次数: 12350
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2008-04-07
  • 最后修改日期:2008-11-13
文章二维码
您是第19796114位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号