Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2008, Volume 10, Issue 10

Research of trust valuation based on cloud model

Department of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China

Funding project:江苏省自然科学基金(BK200656) Received: 2007-07-26 Available online: 2008-10-13 12:44:11.000

Next Previous

Abstract

At present, the existing descriptions of trust by trust valuation models lack comprehensiveness. To solve this problem, this paper discusses the co-existence and integration of fuzziness and randomness of trust relation, analyzes the ways cloud models describe uncertain concepts and the algorithms cloud models transform between qualitative concepts and their quantitative expressions, and presents trust cloud, a trust evaluation model based on cloud theory. This model provides the algorithms of trust information transfer and combination described by digital characteristics. While describing accurate trust expectation, this model portrays the uncertainty through entropy and hyper entropy. Compared with traditional trust valuation models, trust values obtained in this model contains more semantic information, indicating that valuation results from the model are more suitable as evidence for decision-making on trust.

Figures

图1

图2

图3

图4

图5

图6

References

[ 1 ] Blaze M, Feigenbaum J, Lacy J.Decentralized trust management [ A] .Proceedings of the 17th Symposium on Security and Privacy [ C] .Oakland,CA:IEEE Computer Society Press,1996.164 -173 link1

[ 2 ] Abdul -Rahman A, Hailes S.A distributed trust model [ A] . Proceedings of the 1997 New Security Paradigms Workshop [ C] . Cumbria,ACM Press,1998.48 -60 link1

[ 3 ] Beth T, Borcherding M,Klein B.Valuation of Trust in open net- work [ A] .Proceedings of the European Symposium on Research in Computer Security ( ESORICS ) [ C ] .New York: Springer - Verlag,1994.3 -18 link1

[ 4 ] Jφsang A, Knapskog S J.A metric for trusted systems [ M ] . Global IT Security.Wien: Austrian Computer Society,1998.541 -549

[ 5 ] Gambetta D.Can we trust trust? [ M] .Gambetta D, ed.Trust: Making and Breaking Cooperative Relations.Basil Blackwell:Oxford Press, 1990.213 -237

[ 6 ] 李德毅,刘常昱,杜鹢,等.不确定性人工智能[J].软件学报,2004,15(11):1583-1594 link1

[ 7 ] 李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):16-21 link1

[ 8 ] Jøsang A, The right type of trust for distributed systems [ A ] . Meadows C,ed.Proceedings of the 1996 New Security Paradigms Workshop[ C] .Lake Arrowhead, CA:ACM Press,1996

[ 9 ] Jøsang A.A model for trust in security systems [ A] .Proceedings of the 2nd Nordic Workshop on Secure Computer Systems [ C ] , 1997

[10] Jøsang A.A Subjective Metric of Authentication [ A ] . Quisquater J,ed.Proceedings of the ESORICS’ 98 [ C] .Louvain - la-Neuve:Springer -Verlag,1998 link1

[11] 唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408 link1

[12] 刘常昱,冯芒,戴晓军,等.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2421 link1

[13] 宋远骏,杨孝宗,李德毅,等.多机多任务实时系统云调度策略[J].计算机学报,2000,23(10):1107-1113 link1

[14] 李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34 link1

[15] 徐锋,吕建,郑玮,等.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051 link1

Related Research