期刊文献+
共找到2,008篇文章
< 1 2 101 >
每页显示 20 50 100
Trust model based on individual experience
1
作者 王少杰 郑雪峰 +2 位作者 初俐君 于真 徐光美 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期373-376,共4页
To improve the accuracy of node trust evaluation in a distributed network, a trust model based on the experience of individuals is proposed, which establishes a new trust assessment system by introducing the experienc... To improve the accuracy of node trust evaluation in a distributed network, a trust model based on the experience of individuals is proposed, which establishes a new trust assessment system by introducing the experience factor and the comparative experience factor. The new evaluation system considers the differences between individuals and interactive histories between nodes, which solves the problem that nodes have inaccurate assessments due to the asymmetry of nodes to a certain extent. The algorithm analysis indicates that the new model uses different deviating values of tolerance evaluation for different individuals and uses different updating values embodying node individuation when updating feedback credibility of individuals, which evaluates the trust value more reasonably and more accurately. In addition, the proposed algorithm can be used in various trust models and has a good scalability. 展开更多
关键词 trust model individual experience feedback trust value
在线阅读 下载PDF
Research on Trust Model in Container-Based Cloud Service 被引量:2
2
作者 Xiaolan Xie Tianwei Yuan +1 位作者 Xiao Zhou Xiaochun Cheng 《Computers, Materials & Continua》 SCIE EI 2018年第8期273-283,共11页
Container virtual technology aims to provide program independence and resource sharing.The container enables flexible cloud service.Compared with traditional virtualization,traditional virtual machines have difficulty... Container virtual technology aims to provide program independence and resource sharing.The container enables flexible cloud service.Compared with traditional virtualization,traditional virtual machines have difficulty in resource and expense requirements.The container technology has the advantages of smaller size,faster migration,lower resource overhead,and higher utilization.Within container-based cloud environment,services can adopt multi-target nodes.This paper reports research results to improve the traditional trust model with consideration of cooperation effects.Cooperation trust means that in a container-based cloud environment,services can be divided into multiple containers for different container nodes.When multiple target nodes work for one service at the same time,these nodes are in a cooperation state.When multi-target nodes cooperate to complete the service,the target nodes evaluate each other.The calculation of cooperation trust evaluation is used to update the degree of comprehensive trust.Experimental simulation results show that the cooperation trust evaluation can help solving the trust problem in the container-based cloud environment and can improve the success rate of following cooperation. 展开更多
关键词 SECURITY cloud service trust model CONTAINER COOPERATION
在线阅读 下载PDF
Dynamic Trust Model Based on Service Recommendation in Big Data 被引量:2
3
作者 Gang Wang Mengjuan Liu 《Computers, Materials & Continua》 SCIE EI 2019年第3期845-857,共13页
In big data of business service or transaction,it is impossible to provide entire information to both of services from cyber system,so some service providers made use of maliciously services to get more interests.Trus... In big data of business service or transaction,it is impossible to provide entire information to both of services from cyber system,so some service providers made use of maliciously services to get more interests.Trust management is an effective solution to deal with these malicious actions.This paper gave a trust computing model based on service-recommendation in big data.This model takes into account difference of recommendation trust between familiar node and stranger node.Thus,to ensure accuracy of recommending trust computing,paper proposed a fine-granularity similarity computing method based on the similarity of service concept domain ontology.This model is more accurate in computing trust value of cyber service nodes and prevents better cheating and attacking of malicious service nodes.Experiment results illustrated our model is effective. 展开更多
关键词 trust model recommendation trust content similarity ONTOLOGY big data.
在线阅读 下载PDF
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:2
4
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 Peer-to-peer (P2P) network REPUTATION trust model mutual evaluation similarity risk
在线阅读 下载PDF
DDoS Detection for 6G Internet of Things: Spatial-Temporal Trust Model and New Architecture 被引量:2
5
作者 Yinglun Ma Xu Chen +1 位作者 Wei Feng Ning Ge 《China Communications》 SCIE CSCD 2022年第5期141-149,共9页
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin... With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originating from IoT devices.In this paper we propose an innovative trust model for IoT devices to prevent potential DDoS attacks by evaluating their trustworthiness,which can be deployed in the access network of 6G IoT.Based on historical communication behaviors,this model combines spatial trust and temporal trust values to comprehensively characterize the normal behavior patterns of IoT devices,thereby effectively distinguishing attack traffic.Experimental results show that the proposed method can efficiently distinguish normal traffic from DDoS traffic.Compared with the benchmark methods,our method has advantages in terms of both accuracy and efficiency in identifying attack flows. 展开更多
关键词 sixth generation(6G)network internet of things(IoT) trust model distributed denial of service(DDoS)
在线阅读 下载PDF
A Secure Trust Model for P2P Systems Based on Trusted Computing 被引量:1
6
作者 郝黎明 杨树堂 +1 位作者 陆松年 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期86-90,共5页
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworth... Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15. 展开更多
关键词 PEER-TO-PEER trust model trusted computing direct anonymous attestation pseudonym
在线阅读 下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
7
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
在线阅读 下载PDF
Collusion detector based on G-N algorithm for trust model
8
作者 Lin Zhang Na Yin +1 位作者 Jingwen Liu Ruchuan Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期926-935,共10页
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes. 展开更多
关键词 trust model collusion detector G-N algorithm
在线阅读 下载PDF
A New Kind of Subjective Trust Model 被引量:1
9
作者 ZHANG Guangwei KANG Jianchu +3 位作者 LUO Ziqiang MENG Xiangyi FANG Peici LI Deyi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1457-1461,共5页
Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we ... Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users' reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust. 展开更多
关键词 subjective trust REPUTATION opens network cloud model UNCERTAINTY FUZZINESS
在线阅读 下载PDF
Reputation-based Trust Model in Grid Security System 被引量:1
10
作者 Baolin Ma Jizhou Sun Ce Yu 《通讯和计算机(中英文版)》 2006年第8期41-46,共6页
在线阅读 下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
11
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 WIRELESS Sensor Networks BETA trust model trust ROUTING PROTOCOL Network Security trust Evaluation
在线阅读 下载PDF
PTMBG: A Novel Personalized Trust Model Based on Gravitation for Interacting P2P Entities
12
作者 Wu Liu Ping Ren +1 位作者 Haixin Duan Jianping Wu 《通讯和计算机(中英文版)》 2011年第12期1071-1078,共8页
关键词 信任模型 P2P 引力相互作用 模型基 个性化 实体 风险评估 互动空间
在线阅读 下载PDF
Blockchain-Based Trust Model for Inter-Domain Routing
13
作者 Qiong Yang Li Ma +3 位作者 Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 2025年第3期4821-4839,共19页
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks. 展开更多
关键词 Inter-domain routing BGP security blockchain trust model trust mechanisms trust evaluation
在线阅读 下载PDF
A multi-dimensional trust attestation solution in 5G-IoT
14
作者 Xiangrong Li Yu Zhang +2 位作者 Haotian Zhu Yubo Wang Junjia Huang 《Digital Communications and Networks》 2025年第1期225-233,共9页
The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important... The core missions of IoT are to sense data,transmit data and give feedback to the real world based on the calculation of the sensed data.The trust of sensing source data and transmission network is extremely important to IoT security.5G-IoT with its low latency,wide connectivity and high-speed transmission extends the business scenarios of IoT,yet it also brings new challenges to trust proof solutions of IoT.Currently,there is a lack of efficient and reliable trust proof solutions for massive dynamically connected nodes,while the existing solutions have high computational complexity and can't adapt to time-sensitive services in 5G-IoT scenarios.In order to solve the above problems,this paper proposes an adaptive multi-dimensional trust proof solution.Firstly,the static and dynamic attributes of sensing nodes are metricized,and the historical interaction as well as the recommendation information are combined with the comprehensive metric of sensing nodes,and a multi-dimensional fine-grained trusted metric model is established in this paper.Then,based on the comprehensive metrics,the sensing nodes are logically grouped and assigned with service levels to achieve the screening and isolation of malicious nodes.At the same time,the proposed solution reduces the energy consumption of the metric process and optimizes the impact of real-time metrics on the interaction latency.Simulation experiments show that the solution can accurately and efficiently identify malicious nodes and effectively guarantee the safe and trustworthy operation of 5G-IoT nodes,while having a small impact on the latency of the 5G network. 展开更多
关键词 5G-IoT trusted metrics trust model
在线阅读 下载PDF
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
15
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
在线阅读 下载PDF
Fuzzy Model for Trust Evaluation 被引量:7
16
作者 张仕斌 何大可 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期23-28,共6页
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks. 展开更多
关键词 trust model trust vector trust class Synthetic evaluation Fuzzy set theory
在线阅读 下载PDF
A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks 被引量:2
17
作者 李小勇 桂小林 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期868-882,共15页
Based on human psychological cognitive behavior, a Comprehensive and Adaptive Trust (CAT) model for largescale P2P networks is proposed. Firstly, an adaptive trusted decision-making method based on HEW (Historical ... Based on human psychological cognitive behavior, a Comprehensive and Adaptive Trust (CAT) model for largescale P2P networks is proposed. Firstly, an adaptive trusted decision-making method based on HEW (Historical Evidences Window) is proposed, which can not only reduce the risk and improve system efficiency, but also solve the trust forecasting problem when the direct evidences are insufficient. Then, direct trust computing method based on IOWA (Induced Ordered Weighted Averaging) operator and feedback trust converging mechanism based on DTT (Direct Trust Tree) are set up, which makes the model have a better scalability than previous studies. At the same time, two new parameters, confidence factor and feedback factor, are introduced to assign the weights to direct trust and feedback trust adaptively, which overcomes the shortage of traditional method, in which the weights are assigned by subjective ways. Simulation results show that, compared to the existing approaches, the proposed model has remarkable enhancements in the accuracy of trust decision-making and has a better dynamic adaptation capability in handling various dynamic behaviors of peers. 展开更多
关键词 P2P networks dynamic trust model IOWA operator ADAPTABILITY
原文传递
Improved Secure Trust-based Location-Aided Routing Model for MANETs 被引量:1
18
作者 王堃 吴蒙 《China Communications》 SCIE CSCD 2011年第3期154-162,共9页
In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed ... In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput. 展开更多
关键词 MANET(Ad Hoc) location-aided routing trust model trust-based routing network security
在线阅读 下载PDF
RCCtrust:A Combined Trust Model for Electronic Community
19
作者 张宇 陈华钧 +2 位作者 姜晓红 盛浩 吴朝晖 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期883-892,共10页
Previous trust models are mainly focused on reputational mechanism based on explicit trust ratings. However, the large amount of user-generated content and community context published on Web is often ignored. Without ... Previous trust models are mainly focused on reputational mechanism based on explicit trust ratings. However, the large amount of user-generated content and community context published on Web is often ignored. Without enough information, there are several problems with previous trust models: first, they cannot determine in which field one user trusts in another, so many models assume that trust exists in all fields. Second some models are not able to delineate the variation of trust scales, therefore they regard each user trusts all his friends to the same extent. Third, since these models only focus on explicit trust ratings, so the trust matrix is very sparse. To solve these problems, we present RCCtrust -a trust model which combines Reputation-, Content- and Context-based mechanisms to provide more accurate, fine-grained and efficient trust management for the electronic community. We extract trust-related information from user-generated content and community context from Web to extend reputation-based trust models. We introduce role-based and behavior-based reasoning functionalities to infer users' interests and category-specific trust relationships. Following the study in sociology, RCCtrust exploits similarities between pairs of users to depict differentiated trust scales. The experimental results show that RCCtrust outperforms pure user similarity method and linear decay trust-aware technique in both accuracy and coverage for a Recommender System. 展开更多
关键词 CONTENT-BASED context-based reputation-based trust model web of trust
原文传递
A Star-Style Trust Model with the Ability of Data Recovery for Trusted Computing Platform
20
作者 CHEN Lu ZHANG Huanguo +1 位作者 ZHOU Qing ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期115-120,共6页
Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG.The distinct advantage is that the compatibility with the existing computing pl... Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG.The distinct advantage is that the compatibility with the existing computing platform is preferable,while the shortcomings are obvious simultaneously.A new star-style trust model with the ability of data recovery is proposed in this paper.The model can enhance the hardware-based root of trust in platform measurement,reduce the loss of trust during transfer process,extend the border of trust flexibly,and have the ability of data backup and recovery.The security and reliability of system is much more improved.It is proved that the star-style trust model is much better than the liner-style trust model in trust transfer and boundary extending etc.using formal methods in this paper.We illuminate the design and implementation of a kind of trusted PDA acting on star-style trust model. 展开更多
关键词 information security trusted computing star-style trust model data recovery
原文传递
上一页 1 2 101 下一页 到第
使用帮助 返回顶部