School of Computer & Information, Hefei University of Technology, Hefei 230009, China;Postal Savings Bank of China Anhui Branch, Department of Science and Technology, Hefei 230031, China 在期刊界中查找 在百度中查找 在本站中查找
On the basis of a continuous process, the recommendation trust model is built for depicting indirect trust, the most complicated trust relationship. The model is also significant for the security and reliability of an open environment and open systems. After the factors influencing indirect trust are quantified, the filtrated recommendations are regarded as samples from the normal process, and the Bayesian estimation value of posteriori distribution expectation is obtained from calculation. Next, after an elaborate discussion of the trust evolution and the relationship between trust value and trustworthiness along with some propositions and proofs are proposed. Experimental data show that with the capacity of resisting malicious attacks improved, the model gives a more effective and precise result, which is also consistent with mathematical deduction.
[1] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale J, Dinolt G, eds. Proc. of the 17th Symp. on Security andPrivacy. Oakland: IEEE Computer Society Press, 1996. 164-173. [doi: 10.1109/SECPRI.1996.502679]
[2] Blaze M, Feigenbaum J, Keromytis AD. Keynote: Trust management for public-key infrastructures. In: Christianson B, Crispo B,William S, et al., eds. Proc. of the Cambridge 1998 Security Protocols Int'l Workshop. Berlin: Springer-Verglag, 1999. 59-63. [doi:10.1007/3-540-49135-X_9]
[3] Almenárez F, Andrés A, Campo C, García RC. PTM: A pervasive trust management model for dynamic open environments. In:Proc. of the 1st Workshop on Pervasive Security, Privacy and Trust. 2004. [doi: 10.1.1.99.7607]
[4] Almenárez F, Marín A, Díaz D, Sanchéz J. Developing a model for trust management in pervasive devices. In: Werner B, ed. Proc.of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security (PerSec 2006). Washington: IEEE ComputerSociety Press, 2006. 267-272. [doi: 10.1109/PERCOMW.2006.41]
[5] Almenárez F, Marín A, Campo C, García RC. TrustAC: Trust-Based access control for pervasive devices. LNCS 450, Berlin:Springer-Verlag, 2005. 225-238. [doi: 10.1007/11414360_22]
[6] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Gollmann D, ed. Proc. of the European Symp. onResearch in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18. [doi: 10.1007/3-540-58618-0_53]
[7] Jameel H, Hung LX, Kalim U, Sjjad A, Lee SY, Lee YK. A trust model for ubiquitous systems based on vectors of trust values. In:Proc. of the 7th IEEE Int'l Symp. on Multimedia. Washington: IEEE Computer Society Press, 2005. 674-679. [doi: 10.1109/ISM.2005.22]
[8] Jøsang A, Ismail R. The beta reputation system. In: Proc. of the 15th Bled Electronic Commerce Conf. 2002. [doi: 10.1.1.60. 5461]
[10] Theodorakopoulos G, Baras JS. On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areasin Communications, 2006,24(2):318-328. [doi: 10.1109/JSAC.2005.861390]
[11] Theodorakopoulos G. Distributed trust evaluation in ad-hoc networks [MS. Thesis]. Maryland: University of Maryland, 2004.
[12] Sun Y, Yu W, Han Z, Liu KJR. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEEJournal on Selected Areas in Communications, 2006,249(2):305-319. [doi: 10.1109/JSAC.2005.861389]
[13] Sun Y, Yu W, Han Z, Liu KJR. Trust modeling and evaluation in ad hoc networks. In: Proc. of the Global TelecommunicationsConf. (Globecom 2005). Washington: IEEE Computer Society Press, 2005. 1-10. [doi: 10.1109/GLOCOM.2005.1577971]
[14] He R, Niu JW, Zhang GW. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing. LNCS3758. Berlin: Springer-Verlag, 2005. 541-552. [doi: 10.1007/11576235_56]
[15] Li DY, Meng HJ, Shi XM. Membership clouds and membership clouds generator. Journal of Computer Research and Development,1995,32(6):15-20 (in Chinese with English abstract). [doi: CNKI:SUN:JFYZ.0.1995-06-002]
[16] Song SS, Hwang K, Macwan M. Fuzzy trust integration for security enforcement in grid computing. In: Proc. of the Int'l Symp. onNetwork and Parallel Computing (NPC 2004). LNCS 3222, Berlin: Springer-Verlag, 2005. 9-21. [doi: 10.1007/978-3-540-30141-7_6]
[17] Li XY, Gui XL. Cognitive model of dynamic trust forecasting. Journal of Software, 2010,21(1):163-176 (in Chinese with Englishabstract). http://www.jos.org.cn/1000-9825/3558.htm [doi: 10.3724/SP.J.1001.2010.03558]
[18] Sun YX, Huang SH, Chen LJ, Xie L. Bayesian decision-making based recommendation trust revision model in ad hoc networks.Journal of Software, 2009,20(9):2574-2586. http://www.jos.org.cn/1000-9825/579.htm [doi: 10.3724/SP.J.1001.2009.00579]
[19] Liang ZQ, Shi WS. Analysis of ratings on trust inference in open environment. Journal of Performance Evaluation, 2008,65(2):99-128. [doi: 10.1016/j.peva.2007.04.001]
[20] Carbone M, Nielsen M, Sassone V. A formal model for trust in dynamic networks. In: Proc. of the Int'l Conf. on SoftwareEngineering and Formal Methods (SEFM 2003). IEEE, 2003. [doi: 10.1109/SEFM.2003.1236207]
[21] Hung NQ, Shehzad A, Liaquat S, Riaz M, Lee SY. Developing context-aware ubiquitous computing systems with a unifiedmiddleware framework. In: Proc. of the 2004 Int'l Conf. on Embedded and Ubiquitous Computing. Springer-Verlag, 2004.672-681. [doi: 10.1007/978-3-540-30121-9_64]
[22] Ashri R, Ramchurn SD, Sabater J, Luck M, Jennings NR. Trust evaluation through relationship analysis. In: Proc. of the 4th Int'lJoint Conf. on Autonomous Agents and Multi-Agent Systems. 2005. 1005-1011. [doi: 10.1145/1082473.1082625]
[23] Ren K, Li T, Wan Z, Bao F, Deng R, Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks,2004,45:687-699. [doi: 10.1016/j.comnet.2004.01.008]
[24] Li XY, Gui XL. Research on dynamic trust model for large scale distributed environment. Journal of Software, 2007,18(6):1510-1521 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/1510.htm [doi: 10.1360/jos181510]
[25] Xu F, Lü J. Research and development of trust management in Web security. Journal of Software, 2002,13(11):2057-2064 (inChinese with English abstract). http://www.jos.org.cn/ch/reader/view_abstract.aspx?flag=1&file_no=20021101&journal_id=jos
[26] Wang Y, Lü J, Xu F, Zhang L. A trust measurement and evolution model for internetware. Journal of Software, 2006,17(4):628-690 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/682.htm [doi: 10.1360/jos170682]
[27] Xu F, Lü J, Zheng W, Cao C. Design of a trust valuation model in software service coordination. Journal of Software, 2003,14(6):1043-1051 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1043.htm
[28] Yang FQ, Mei H, Lü J, Jin Z. Some discussion on the development of software technology. ACTA ELECTRONICA SINICA,2003,26(9):1104-1115 (in Chinese with English abstract). [doi: CNKI:ISSN:0372-2112.0.2002-S1-000]