Journal of Hebei University (Natural Science Edition) ›› 2011, Vol. 31 ›› Issue (5): 555-560.DOI: 10.3969/j.issn.1000-1565.2011.05.020
TIAN Jun-feng,CAI Hong-yun
Online:
2011-09-25
Published:
2011-09-25
CLC Number:
TIAN Jun-feng,CAI Hong-yun. Actuality and Development of Trust Model[J]. Journal of Hebei University (Natural Science Edition), 2011, 31(5): 555-560.
Add to citation manager EndNote|Ris|BibTeX
URL: //xbzrb.hbu.edu.cn/EN/10.3969/j.issn.1000-1565.2011.05.020
[1] 农毅, 古天龙, NONG Yi, GU Tian-Long. 基于网格环境中的量化评估信任模型 [J]. 计算机科学 2007.doi:10.3969/j.issn.1002-137X.2007.06.024 [2] 李小勇, 桂小林, LI Xiao-Yong, GUI Xiao-Lin. 可信网络中基于多维决策属性的信任量化模型 [J]. 计算机学报 2009.doi:10.3724/SP.J.1016.2009.00405 [3] 姜守旭, 李建中, JIANG Shou-Xu, LI Jian-Zhong. 一种P2P电子商务系统中基于声誉的信任机制 [J]. 软件学报 2007. [4] 张琳, 王汝传, 张永平, ZHANG Lin, WANG Ru-chuan, ZHANG Yong-ping. 一种基于模糊集合的可用于网格环境的信任评估模型 [J]. 电子学报 2008.doi:10.3321/j.issn:0372-2112.2008.05.006 [5] 吴鹏, 吴国新, 方群, Wu Peng, Wu Guoxin, Fang Qun. 一种基于概率统计方法的P2P系统信任评价模型 [J]. 计算机研究与发展 2008. [6] 郭成, 李明楚, 姚红岩, 胡红钢, GUO Cheng, LI Ming-chu, YAO Hong-yan, HU Hong-gang. P2P网络下基于推荐的信任模型 [J]. 计算机工程 2008.doi:10.3969/j.issn.1000-3428.2008.24.054 [7] 周林, 刘仲英, ZHOU Lin, LIU Zhong-ying. 基于beta密度函数的信任模型 [J]. 数学的实践与认识 2007.doi:10.3969/j.issn.1000-0984.2007.23.002 [8] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型研究 [J]. 软件学报 2003. [9] 网格环境中动态信任模型研究 [J]. 计算机工程与设计 2009. [10] 徐兰芳, 胡怀飞, 桑子夏, 徐凤鸣, 邹德清, XU Lan-Fang, HU Huai-Fei, SANG Zi-Xia, XU Feng-Ming, ZOU De-Qing. 基于灰色系统理论的信誉报告机制 [J]. 软件学报 2007. [11] 徐兰芳, 胡怀飞, 王爱民, 吕操, Xu Lan fang, Hu Huaifei, Wang Aimin, Lu Cao. 基于灰色理论的主观信任计算方法 [J]. 华中科技大学学报(自然科学版) 2007.doi:10.3321/j.issn:1671-4512.2007.11.026 [12] 赵铁柱, 杨秋鸿, 梅登华, ZHAO Tie-zhu, YANG Qiu-hong, MEI Deng-hua. 基于模糊集和灰色关联的P2P信任模型 [J]. 计算机工程 2009.doi:10.3969/j.issn.1000-3428.2009.06.060 [13] 王守信, 张莉, 李鹤松, WANG Shou-Xin, ZHANG Li, LI He-Song. 一种基于云模型的主观信任评价方法 [J]. 软件学报 2010.doi:10.3724/SP.J.1001.2010.03501 [14] 黄海生, 王汝传, HUANG Hai-sheng, WANG Ru-chuan. 基于隶属云理论的主观信任评估模型研究 [J]. 通信学报 2008.doi:10.3321/j.issn:1000-436X.2008.04.003 [15] 窦文, 王怀民, 贾焰, 邹鹏. 构造基于推荐的Peer-to-Peer环境下的Trust模型 [J]. 软件学报 2004. [16] 李景涛, 荆一楠, 肖晓春, 王雪平, 张根度, LI Jing-Tao, JING Yi-Nan, XIAO Xiao-Chun, WANG Xue-Ping, ZHANG Gen-Du. 基于相似度加权推荐的P2P环境下的信任模型 [J]. 软件学报 2007. [17] 于真, 郑雪峰, 王少杰, 刘海燕, 王颖, YU Zhen, ZHENG Xue-feng, WANG Shao-jie, LIU Hai-yan, WANG Ying. P2P信任模型研究 [J]. 小型微型计算机系统 2009. [18] 张骞, 张霞, 文学志, 刘积仁, Ting Shan, ZHANG Qian, ZHANG Xia, WEN Xue-Zhi, LIU Ji-Ren, Ting Shan. Peer-to-Peer环境下多粒度Trust模型构造 [J]. 软件学报 2006. [19] 胡建理, 吴泉源, 周斌, 刘家红, HU Jian-Li, WU Quan-Yuan, ZHOU Bin, LIU Jia-Hong. 一种基于反馈可信度的分布式P2P信任模型 [J]. 软件学报 2009.doi:10.3724/SP.J.1001.2009.03554 [20] 田春岐, 邹仕洪, 王文东, 程时端, TIAN Chun-Qi, ZOU Shi-Hong, WANG Wen-Dong, CHENG Shi-Duan. 一种基于推荐证据的有效抗攻击P2P网络信任模型 [J]. 计算机学报 2008.doi:10.3321/j.issn:0254-4164.2008.02.011 [21] 一种基于近期表现的P2P网络信任模型 [J]. 计算机工程与应用 2009.doi:10.3778/j.issn.1002-8331.2009.30.032 [22] 常俊胜, 王怀民, 尹刚, CHANG Jun-Sheng, WANG Huai-Min, YIN Gang. DyTrust:一种P2P系统中基于时间帧的动态信任模型 [J]. 计算机学报 2006.doi:10.3321/j.issn:0254-4164.2006.08.007 [23] 苗光胜, 冯登国, 苏璞睿, MIAO Guang-sheng, FENG Deng-guo, SU Pu-rui. P2P信任模型中基于行为相似度的共谋团体识别模型 [J]. 通信学报 2009.doi:10.3321/j.issn:1000-436X.2009.08.002 [24] 杨宏宇, 李勇, 陈创希, YANG Hong-yu, LI Yong, CHEN Chuang-xi. 基于模糊理论的信息系统风险计算 [J]. 计算机工程 2007.doi:10.3969/j.issn.1000-3428.2007.16.015 [25] 张润莲, 武小年, 周胜源, 董小社, ZHANG Run-Lian, WU Xiao-Nian, ZHOU Sheng-Yuan, DONG Xiao-She. 一种基于实体行为风险评估的信任模型 [J]. 计算机学报 2009.doi:10.3724/SP.J.1016.2009.00688 [26] BLAZE M, FEIGENBAUM J. Decentralized trust management [A]. Okaland 1996. [27] CHANG E, THOMSON P, DILION T. The fuzzy and dynamic nature of trust [A]. Beilin:Springer-Verlag 2005. [28] 赵波, 严飞, 余发江. 可信计算 [M]. 北京:机械工业出版社 2009. [29] TIAN Junfeng, LU Yuzhen, YUAN Peng. A weighted closeness-based trust combination model [A]. Seoul, Korea 2009. [30] ABDUL-RAHMAN A, HAILES S. Supporting trust in virtual communities [A]. Los Alamitos 2000. [31] Cahill V., Gray E., Seigneur J.-M., Jensen C.D., Yong Chen, Shand B., Dimmock N., Twigg A., Bacon J., English C., Wagealla W., Terzis S., Nixon P., Di Marzo Serugendo G., Bryce C., Carbone M., Krukow K., Nielson M.. Using trust for secure collaboration in uncertain environments [J]. IEEE pervasive computing 2003, 3(3). [32] Stefan Schmidt, Robert Steele, Tharam S. Dillon, Elizabeth Chang. Fuzzy trust evaluation and credibility development in multi-agent systems [J]. Applied Soft Computing 2007, 1/4(1/4). [33] Roberto Aringhieri, Ernesto Damiani, Sabine De Capitani Di Vimercati, Stefano Paraboschi, Pierangelo Samarati. Fuzzy Techniques for Trust and Reputation Management in Anonymous Peer-to-Peer Systems [J]. Journal of the American Society for Information Science and Technology 2006, 4(4). [34] GRIFFITHS N. A fuzzy approach to reasoning with trust.distrust and insufficient trust [A]. Edinburgh 2006. [35] 路峰, 吴慧中, LU Feng, WU Hui-zhong. 网格环境下基于云模型的信任评估与决策方法研究 [J]. 系统仿真学报 2009. [36] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks [A]. Budapest, Hungary 2003. [37] YU BIN, SINGH M P, SYCARA K. Developing trust in large-scale peer-to-peer systems [A]. Piscataway 2004. [38] 田俊峰, 孙冬冬, 杜瑞忠. 基于节点能力和品质的P2P网络信任模型 [J]. 通信学报 2009, 30(10A). [39] 张洪, 段海新, 刘武. RRM:一种具有激励机制的信誉模型 [J]. 2008. [40] MANCHALA D W. Trust metrics.models and protocols for electronic commerce transactions [A]. Amsterdam 1998. [41] JφSANG A, PRESTI S. Analysing the relationship between risk and trust [A]. Oxford 2004. [42] BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network [A]. Brighton 1994. [43] LIANG Z Q, SHI W S. Analysis of ratings on trust inference in open environments [J]. Performance Evaluation 2008, 65(02). [44] CONNER WILLIAM, IYENGAR ARUN, MIKALSEN THOMAS. A trust management framework for service-oriented environments [A]. Madrid, Spain 2009. |
[1] | WEI Zihui, LI Xiaoyang, WANG Le, CAI Daxin, YE Xingyue, DING Zhenjun. Improved TDOA 3d positioning algorithm based on adaptive Levy flight [J]. Journal of Hebei University(Natural Science Edition), 2023, 43(2): 207-215. |
[2] | YANG Xiaohui, WANG Weibin. Spammer detection model based on hierarchical attention mechanism [J]. Journal of Hebei University(Natural Science Edition), 2023, 43(1): 95-102. |
[3] | WEI Mingjun, ZHANG Xinnan, LIU Yazhi, ZHOU Taiyu. A network intrusion detection method based on SSA-BRF [J]. Journal of Hebei University(Natural Science Edition), 2022, 42(5): 552-560. |
[4] | CHANG Tieyuan, LIU Weina, ZHANG Yan, LI Huiya. Optimized LEACH protocol based on distance and energy of cluster head [J]. Journal of Hebei University (Natural Science Edition), 2019, 39(2): 194-200. |
[5] | TIAN Junfeng, CAI Hongyun. Shilling attacks and security of recommender systems [J]. Journal of Hebei University (Natural Science Edition), 2018, 38(6): 640-647. |
[6] | HE Zhiqiang, LIN Yongjun. A LARS scheduling algorithm based on classification improvement and its dynamic parameter performance analysis [J]. Journal of Hebei University (Natural Science Edition), 2017, 37(5): 537-544. |
[7] | MA Guofu,WANG Zixian,MA Shengli. Analysis of the effectiveness of machine learning model in predicting the risk of inmates [J]. Journal of Hebei University (Natural Science Edition), 2017, 37(4): 426-433. |
[8] | GAO Ni, HE Yiyue, CHANG Yanshuo, WANG Mengyang. A dynamic and comprehensive quantitative scoring method of vulnerability severity [J]. Journal of Hebei University (Natural Science Edition), 2017, 37(4): 405-410. |
[9] | ZHANG Xizhong,XU Jianmin. Research on document similarity based on terms synonymous relationship [J]. Journal of Hebei University (Natural Science Edition), 2017, 37(1): 108-112. |
[10] | MA Guofu,WANG Zixian,MA Shengli. Prediction of the risk of offenders based on big data [J]. Journal of Hebei University (Natural Science Edition), 2016, 36(6): 657-666. |
[11] | MA Guofu,MA Shengli,WANG Zixian,LI Shuangyin,CHENG Yusi. Application of data recovery in the electronic data forensics and judicial identification [J]. Journal of Hebei University (Natural Science Edition), 2015, 35(5): 538-545. |
[12] | LIU Haiqin. Research on resource search mechanism in hybrid P2P network [J]. Journal of Hebei University (Natural Science Edition), 2015, 35(3): 311-315. |
[13] | XIAO Xianqian,ZHU Junping,JING Xu,MA Qiaoe. One-class intrusion detection technique based on Bayesian approach [J]. Journal of Hebei University (Natural Science Edition), 2014, 34(1): 7-13. |
[14] | MA Guofu,WANG Zixian,WANG Kuipeng. On electronic judicial identification model based on evidence chain [J]. Journal of Hebei University (Natural Science Edition), 2013, 33(3): 317-323. |
[15] | WANG Jianling,LI Renling,WANG Hengcao,WANG Tiezhu. Multi-layer intrusion tolerant mechanism for Web services [J]. Journal of Hebei University (Natural Science Edition), 2012, 32(5): 545-549. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||