一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

模糊自主信任建立策略的研究

張仕斌 何大可 遠(yuǎn)藤譽(yù)

張仕斌, 何大可, 遠(yuǎn)藤譽(yù). 模糊自主信任建立策略的研究[J]. 電子與信息學(xué)報(bào), 2006, 28(8): 1492-1496.
引用本文: 張仕斌, 何大可, 遠(yuǎn)藤譽(yù). 模糊自主信任建立策略的研究[J]. 電子與信息學(xué)報(bào), 2006, 28(8): 1492-1496.
Zhang Shi-bin, He Da-ke, Homare Endo. Research of Fuzzy Autonomous Trust Establishment Strategy[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1492-1496.
Citation: Zhang Shi-bin, He Da-ke, Homare Endo. Research of Fuzzy Autonomous Trust Establishment Strategy[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1492-1496.

模糊自主信任建立策略的研究

Research of Fuzzy Autonomous Trust Establishment Strategy

  • 摘要: 該文首先從分析開(kāi)放式網(wǎng)絡(luò)環(huán)境中有關(guān)信任的問(wèn)題和主觀信任的模糊性入手,以模糊理論為基礎(chǔ),引入隸屬度來(lái)描述信任的模糊性,解決了模糊信任模型的建模問(wèn)題;以圖論為基礎(chǔ),將網(wǎng)絡(luò)環(huán)境模型化為一個(gè)無(wú)向圖 ,定義了基于本地信息交互的信任評(píng)價(jià)規(guī)則;提出了基于開(kāi)放式網(wǎng)絡(luò)環(huán)境的模糊自主信任模型,具體研究了自主信任建立策略及建立完全可信網(wǎng)絡(luò)的實(shí)現(xiàn)機(jī)制及條件;最后通過(guò)仿真實(shí)驗(yàn)討論了網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu)對(duì)自主信任建立的影響,并以小世界網(wǎng)絡(luò)模型(-model)為基礎(chǔ)分析討論了自主信任建立的速度問(wèn)題,這為網(wǎng)絡(luò)管理的研究提供了一個(gè)有價(jià)值的新思路。
  • Gambetta D. Can We Trust Trust [M] In D. Gambetta editor, Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford, 1990: 213-238.[2]Jsang A. Prospectives of modeling trust in information security [A]. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy [C]. Sydney, Australia, 1997: 219-231.[3]Jsang A. A logic for uncertain probabilities [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311.[4]Blaze M, Feigenbaum J, Keromytis A D. Keynote: Trust management for public-key infrastructures [A]. In: Christianson B, Crispo B, William S, et al.. eds. Cambridge 1998 Security Protocols International Workshop [C]. Cambridge, UK, April 15-17, 1998. Berlin: Springer-Verglag, 1999: 59-63.[5]Beth T, Borcherding M, Klein B. Valuation of trust in open networks [A]. In: Gollmann D. ed. Proceedings of the European Symposium on Research in Security (ESORICS) [C]. Brighton, United Kingdom, November 1994: 3-18.[6]Jsang A. Trust-Based decision making for electronic transactions [EB/OL]. In: Proceedings of the 4th Nordic Workshop on Secure Computer System(NORDSEC99) [C]. Stockholm, Sweden, Stockholm University Report 99-005, 1999.[7]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [A], In: Dale J, Dinolt G, eds. Proceedings of the Symposium on Security and Privacy [C]. Oakland: IEEE Computer Society Press, 1996: 164-173.[8][8] Pretty good privacy users guide [S]. Distributed with the PGP software. Version 8.0 .2003.[9][9] Housley R. Internet X.509 Public Key Infrastructure, Certificate and CRL Profiles[S]. RFC2459, 1999. [10] Sonja Buchegger, Jean-Yves Le Boudec. The effect of rumor spreading in reputation systems for mobile Ad-hoc networks [A]. In Proceedings of Modeling and Optimization in Mobile, Ad hoc and Wireless Networks (WiOpt) [C], Sophia-Antipolis, France, March 2003: 66-75.[10]Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks [A]. In Proceedings of the Twelfth International World Wide Web Conference [C]. Budapest, Hungary, 2003: 640-651.[11]Sergio Marti, Hector Garcia-Molina. Limited reputation sharing in p2p systems [A]. In Proceedings of the 5th ACM Conference on Electronic Commerce [C]. New York, NY, USA, 2004: 91-101.Tutte W T. Graph Theory [M]. Cambridge University Press, 2004.09: 78-97.[12]L.A .扎德著, 陳國(guó)權(quán)譯. 模糊集合、語(yǔ)言變量及模糊邏輯 [M]. 北京: 科學(xué)出版社, 1982: 56-75.[13]謝季堅(jiān), 劉承平. 模糊數(shù)學(xué)方法及其應(yīng)用[M]. 華中科技大學(xué)出版社, 2000: 16-20.[14]Chan Haowen, Perrig A, Song Dawn. Random key predistribution schemes for sensor networks [A]. In Proceedings of the 2003 IEEE Symposium on Security and Privacy [C]. IEEE Computer Society. 2003: 175-183.[15]Bremaud P, Chains M. Gibbs fields, Monte Carlo simulation, and queues [M]. Texts in Applied Mathematics; 31. Springer-Verlag New York, Inc., 1999: 234-266.[16]Watts D J, Strogatz S H. Collective dynamics of small-world networks [J].Nature.1998, 393:440-442[17]Watts D J. Small Worlds: the Dynamics of Networks Between Order and Randomness [M]. Princeton University Press, 2004: 124-147.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  2312
  • HTML全文瀏覽量:  63
  • PDF下載量:  563
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2005-08-29
  • 修回日期:  2006-02-01
  • 刊出日期:  2006-08-19

目錄

    /

    返回文章
    返回