[1]郭玉翠,王励成,钮心忻.一个用于多个实体信任度评估的模糊数学模型[J].华侨大学学报(自然科学版),2009,30(6):637-641.[doi:10.11830/ISSN.1000-5013.2009.06.0637]
 GUO Yu-cui,WANG Li-cheng,NIU Xin-xin.A Fuzzy Mathematical Model for Trust Evaluation to More Entities[J].Journal of Huaqiao University(Natural Science),2009,30(6):637-641.[doi:10.11830/ISSN.1000-5013.2009.06.0637]
点击复制

一个用于多个实体信任度评估的模糊数学模型()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第30卷
期数:
2009年第6期
页码:
637-641
栏目:
出版日期:
2009-11-20

文章信息/Info

Title:
A Fuzzy Mathematical Model for Trust Evaluation to More Entities
文章编号:
1000-5013(2009)06-0637-05
作者:
郭玉翠王励成钮心忻
北京邮电大学理学院; 北京邮电大学网络与交换技术国家重点实验室
Author(s):
GUO Yu-cui1 WANG Li-cheng2 NIU Xin-xin2
1.School of Science, Beijing University of Posts and Telecommunications; 2.State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876
关键词:
信任管理 信任度评估 模糊综合评价 模糊数学
Keywords:
trust management trust evaluation fuzzy synthetic evaluation fuzzy mathematics
分类号:
O159
DOI:
10.11830/ISSN.1000-5013.2009.06.0637
文献标志码:
A
摘要:
以信任度评价指标的可用性、可靠性、完整性、安全防护性、可维护性、以及机密性等6个因素为出发点,建立信任评价指标体系.在此基础上,考虑到信任的主观性及主体对客体评价、判断所具有的模糊性,选用模糊综合评价方法,建立一种与数字系统信任管理相关的,可用于多个实体信任度评估的数学模型.对3个样本实体的信任状况进行实证研究,结果可为数字系统的信任管理提供依据.
Abstract:
Taking six factors,such as availability,reliability,integrity,safety,maintainability and confidentiality as the starting point of trust evaluation index,a trust assessment index system is built up.Base on this and considering the subjectivity of trust and fuzziness of opinion and estimation for subject to object,a fuzzy synthetic evaluation method is selected and a mathematical model associated trust management of digital system and used in more entities is established.The process of evaluation using the model is demonstrated for three examples.The result of evaluation can provide gist for trust management of digital systems.

参考文献/References:

[1] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management [A]. New York:IEEE Computer Society Press, 1996.164-173.
[2] BLAZE M, FEIGENBAUM J, IOANNIDIS J, ed al. RFC 2704:The KeyNote Trust Management System Version 2 [EB/OL]. http://www.cnpaf.net/Class/Rfcen/200502/3756_2.html, 2005.
[3] JSANG A, KNAP SKOG S J. A metric for trusted systems:Global IT security [M]. Wien:Austrian Computer Society, 1998.541-549.
[4] JSANG A. Trust-based decision making for electronic transactions [A]. Kista:Stockholm University Press, 1999.1-21.
[5] JSANG A. The right type of trust for distributed systems [A]. Lake Arrowhead:ACM Press, 1996.119-132.
[6] JSANG A. A model for trust in security systems [A]. Philadelphia:ACM Press, 1997.
[7] JSANG A. A subjective metric of authentication [A]. Brighton:Springer-Verlag, 1998.329-344.
[8] BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network [A]. Brighton:Springer-Verlag, 1994.3-18.
[9] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型 [J]. 软件学报, 2003(8):1401-1408.
[10] 袁禄来, 曾国荪, 王伟. 基于Dempster-Shafer证据理论的信任度评估模型 [J]. 武汉大学学报(理学版), 2006(5):627-630.doi:10.3321/j.issn:1671-8836.2006.05.026.
[11] 张艳群, 张辰. 基于模糊理论的信任度评估模型 [J]. 计算机工程与设计, 2007(3):532-534.doi:10.3969/j.issn.1000-7024.2007.03.013.
[12] 沈昌祥, 张焕国, 冯登国. 信息安全综述 [J]. 中国科学E辑, 2007(2):129-150.doi:10.3321/j.issn:1006-9275.2007.02.001.

备注/Memo

备注/Memo:
国家重点基础研究发展计划(973项目)资助(2007CB310704)
更新日期/Last Update: 2014-03-23