共查询到19条相似文献,搜索用时 109 毫秒
1.
2.
3.
信任是建立社会关系的基础.也是建立社会秩序的基本工具。在电子商务领域.信任则是交易能够发生的前提,如何度量信任、计算信任则成为电子商务系统的重要组成部分。本文针对目前电子商务信任管理系统中信任计算模型存在的问题.提出一个综合考虑用户信任度影响因素的信任度计算模型,给出相应的计算公式和方法,并引入信任担保机制、信任奖惩机制等.以克服现行信任管理系统对新用户的不公平以及存在的“freerider现象“等。 相似文献
4.
DSm信任模型下的信任传递 总被引:3,自引:2,他引:1
将DSm(Dezert—Smarandache)任模型用于开放社区的信任管理。文章介绍了在该模型下信任传递中的有关概念,提出了信任的传递方法,设计仿真实验分析了一些参数对信任传递的影响。 相似文献
5.
6.
P2P网络中基于云模型的主观信任评价 总被引:3,自引:0,他引:3
为了解决P2P网络交互的安全性问题,模拟人际交互网络,提出了基于云模型理论的主观信任评价模型.通过信任云及信任等级基准云的定义,实现了主观信任定性与定量的统一,客观地反映了信任的模糊性与随机性.通过逆向信任云算法、信任云合并算法及信任云相似度计算算法,实现了主观信任的综合评价和决策.仿真实验分析表明本方法是有效的和合理的.为开放式网络环境中的信任评估研究提供了一个有价值的新思路. 相似文献
7.
面向分布式系统访问控制的信任度量化模型 总被引:4,自引:0,他引:4
通过引入社会学中信任的研究成果,定义了分布式系统访问控制中信任的具体语义、基本特性与上下文相关属性.针对信任的主观性、模糊性与不确定性,采用模糊数学与概率论相结合的方法,给出了信任的数学定义,建立了包括信任综合评价与信任计算的信任度量化模型.该模型综合了访问控制背景下信任相关的各种因素,符合推荐信任的衰减与增强规律. 相似文献
8.
信任建立的目标是确保数据的可信、真实、可靠和忠诚。在移动云计算中,由于数据存储和数据处理是在云端以远程方式进行的,因而信任是移动云计算安全中一个非常重要的参数。文章讨论移动云计算中的信任含义、特征、类型,研究弱信任链、控制和可视化缺失等信任相关问题,探讨服务级协议、审计、测量与评级、自评问卷、信任和声誉模型等5类信任建立方法,最后分析黑盒、由内向外以及由外向内等信任评价方法。 相似文献
9.
10.
信任链是实施可信系统的关键技术之一,本文从信任链理论和应用系统出发,介绍了研究信任链理论的典型模型及近年来的研究进展,包括基于无干扰理论的信任链传递模型和基于组合安全理论的信任链模型,详细阐述了这两种信任链理论模型的优势和不足.介绍了基于静态信任根和动态信任根的信任链应用系统的研究状况,介绍了信任链远程证明技术,介绍了云计算环境下的信任链应用系统,对信任链应用系统存在的安全缺陷以及一致性和安全性测评方法进行了分析论述,并展望了该领域未来的发展趋势. 相似文献
11.
ZHANG Shibin XIE Zhihai YIN Yifen CHANG Yan SHENG Zhiwei YAN Lili WANG Haichun HAN Guihua HUANG Yuanyuan WAN Guogen 《电子学报:英文版》2017,26(3)
Trust is the premise and foundation of se-cure communication, no matter in the quantum commu-nication or classical communication. In fact, the existing quantum secure communication protocols and technolo-gies are implicitly related to trust; or assume some trust premise in advance; or create or obtain a trust relationship. This paper studies on quantum trust model using node trust evaluation based on author's own research achieve-ments. We introduce the trust management into quantum communication network to build secure trusted quantum communication network based on evaluating the trust val-ues of nodes, which are used to evaluate the reliability of each user. We put forward a scheme of quantum trust model based on node trust evaluation, and describe the thought and process of trust evaluation in detail based on the principles of quantum entanglement and quantum teleportation. We analyze the feasibility and safety of this scheme, which provides a new thinking and method for es-tablishing a credible secure quantum communication net-work. 相似文献
12.
模糊自主信任建立策略的研究 总被引:3,自引:0,他引:3
该文首先从分析开放式网络环境中有关信任的问题和主观信任的模糊性入手,以模糊理论为基础,引入隶属度来描述信任的模糊性,解决了模糊信任模型的建模问题;以图论为基础,将网络环境模型化为一个无向图 ,定义了基于本地信息交互的信任评价规则;提出了基于开放式网络环境的模糊自主信任模型,具体研究了自主信任建立策略及建立完全可信网络的实现机制及条件;最后通过仿真实验讨论了网络拓扑结构对自主信任建立的影响,并以小世界网络模型(-model)为基础分析讨论了自主信任建立的速度问题,这为网络管理的研究提供了一个有价值的新思路。 相似文献
13.
针对现有证据信任模型中普遍存在的局部信任度计算对门限值敏感度高及信任主体不能准确理解推荐信任度的含义等引起的模型性能下降问题,该文提出一种基于模糊修正的证据信任模型,一方面,通过采用模糊成员函数对信任评价进行加权处理,使得局部信任度随着门限值的变化而渐变变化,可以有效避免实质性突变的发生;另一方面,该文提出了一种推荐信任度修正算法使得推荐信任度的实际意义能够被信任主体准确理解,提高了信任度量的准确性。仿真实验表明,与已有证据信任模型相比,该文模型具有较强的抗干扰和抗攻击能力,能适用于各种动态环境中,同时在度量的精准度方面也有较大提高。 相似文献
14.
In this paper we propose a distributed trust model for certificate revocation in ad hoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase. Furthermore, trust in a node is defined not only in terms of its potential for maliciousness, but also in terms of the quality of the service it provides. Trust in nodes where there is little or no history of interactions is determined by recommendations from other nodes. If the nodes in the network are selfish, trust is obtained by an exchange of portfolios. Bayesian networks form the underlying basis for this model. 相似文献
15.
FIRE模型改进了SPORAS模型,更适用于开放性的问题求解要求。联盟是多Agent之间一种重要的合作方法。文章将联盟机制引入FIRE模型,通过Agent之间形成联盟对问题求解,能够降低计算复杂度,提高问题求解效率。文章是对多Agent系统联盟的进一步研究,同时改进了Zacharia和Jennings等人关于多Agent系统的信任和名誉模型的研究工作。 相似文献
16.
Facial recognition payment (FRP) technology has been used as an innovative digital approach to payment services. This study develops a model to investigate how user trust—including trust in FRP service providers and FRP—affects users’ continuance intentions toward FRP services. We also propose that trust in FRP itself is affected by perceived vulnerability, perceived security, and perceived response efficacy from a privacy and security perspective. Our research model was empirically tested via a partial-least-squares analysis with survey data collected from 217 FRP users in China. The results show that trust in both FRP service providers and FRP itself positively affects users’ continuance intentions, and trust in service providers affects trust in FRP. Perceived security and response efficacy positively affect trust in FRP. This research contributes to the literature on FRP and trust, offering practical implications for FRP service providers on how to manage individual users’ FRP-related privacy concerns while enhancing user trust in FRP, which facilitates continuous FRP use. 相似文献
17.
18.
19.
We propose a lightweight trust system for the clustered wireless sensor networks based on the mutual evaluation between the cluster heads and sensor nodes. We evaluate the trust level of a cluster head in two aspects, namely, trust level as a service provider and a supervisor. We consider multidimensional trust attributes to compute the global trust value of a node. By means of the Petri net (PN), we illustrate the performance of an entity in our trust model. Theoretical analyses as well as simulations are done and the results showed that our model with linear computational complexity had less memory and communi-cation overhead when compared with the current state-of-art trust management scheme. In addition, our model can detect malicious and selfish entities (especially the mali-cious cluster head) and resist various attacks efficiently. 相似文献