Research of Subjective Trust Management Model Based on the Fuzzy Set Theory
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [14]
  • |
  • Related
  • |
  • Cited by [140]
  • | |
  • Comments
    Abstract:

    Trust management model is fundamental for information security in open networks. The fuzzy nature of subjective trust is considered, and the fuzzy set theory has been used to model the issues of trust management. The formalized valuation of subjective trust is given, the definition of trust class and the evaluation of trust are discussed, derivation rules of trust relationships are presented and a subjective trust management model is provided. The formal model proposed in this paper provides a new valuable way for studying trust management in open networks.

    Reference
    [1]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale J, Dinolt G, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996. 164~173.
    [2]Blaze M, Feigenbaum J, Keromytis AD. Keynote: Trust management for public-key infrastructures. In: Christianson B, Crispo B, William S, et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
    [3]Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Gollmann D, ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
    [4]Jφsang A. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001,9(3):279~311.
    [5]Jφsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541~549.
    [6]Jφsang A. Trust-Based decision making for electronic transactions. In: Proceedings of the 4th Nordic Workshop on Secure Computer Systems (NORDSEC'99). 1999. Http://security.dstc.edu.au/staff/ajosang/paper.html.
    [7]Xu F, Lü J. Research and development of trust management in Web security. Journal of Software, 2002,11(13):2057~2064 (in Chinese with English abstract).
    [8]Zadeh LA. The Concept of a Linguistic Variable and Its Application to Approximate Reasoning. Beijing: Science Press, 1982. 23~33 (in Chinese).
    [9]Zhu JY. Non-Classical Mathematics for Intelligent Systems. Wuhan: Huazhong University Press, 2001. 146~157 (in Chinese).
    [10]Wang PZ, Li HX. Fuzzy System Theory and Fuzzy Computer. Beijing: Science Press, 1996. 219~243 (in Chinese).
    [7]徐锋,吕建.Web安全中的信任管理研究与进展.软件学报,2002,11(13):2057~2064.
    [8]L.A.扎德著,陈国权译.模糊集合、语言变量及模糊逻辑.北京:科学出版社,1982.23~33.
    [9]朱剑英.智能系统非经典数学方法.武汉:华中科技大学出版社,2001.146~157.
    [10]汪培庄,李洪兴.模糊系统理论与模糊计算机.北京:科学出版社,1996.219~243.
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

唐文,陈钟.基于模糊集合理论的主观信任管理模型研究.软件学报,2003,14(8):1401-1408

Copy
Share
Article Metrics
  • Abstract:8560
  • PDF: 10159
  • HTML: 0
  • Cited by: 0
History
  • Received:January 18,2003
  • Revised:January 18,2003
You are the first2045219Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063