首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An integrated trust and reputation model for open multi-agent systems   总被引:12,自引:1,他引:12  
Trust and reputation are central to effective interactions in open multi-agent systems (MAS) in which agents, that are owned by a variety of stakeholders, continuously enter and leave the system. This openness means existing trust and reputation models cannot readily be used since their performance suffers when there are various (unforseen) changes in the environment. To this end, this paper presents FIRE, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent’s likely performance in open systems. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation to provide trust metrics in most circumstances. FIRE is empirically evaluated and is shown to help agents gain better utility (by effectively selecting appropriate interaction partners) than our benchmarks in a variety of agent populations. It is also shown that FIRE is able to effectively respond to changes that occur in an agent’s environment.  相似文献   

2.
Recent advances in pervasive video surveillance systems pave the way for a comprehensive surveillance of every aspect of our lives, hence, leading us to a state of dataveillance. Computerized and interconnected systems of cameras could be used to profile, track and monitor individuals for the sake of security. Notwithstanding, these systems clearly interfere with the fundamental right of the individuals to privacy. Most literature on privacy in video surveillance systems concentrates on the goal of detecting faces and other regions of interest and in proposing different methods to protect them. However, the trustworthiness of those systems and, by extension, of the privacy they provide are mostly neglected. In this article, we define the concept of trustworthy privacy-aware video surveillance system. Moreover, we assess the techniques proposed in the literature according to their suitability for such a video surveillance system. Finally, we describe the properties that a deployment of a trustworthy video surveillance system must fulfill.  相似文献   

3.
New trust, reputation and recommendation (TRR) models are continuously proposed. However, the existing models lack shared bases and goals. For this reason, in this work we define an innovative meta model to facilitate the definition and standardization of a generic TRR model. Following the meta model, researchers in the field will be able to define standard models, compare them with other models and reuse parts of them. A standardization is also needed to determine which properties should be present in a TRR model.In accordance with the objectives we were seeking, following our meta model, we have defined a pre-standardized TRR model for e-commerce, identified the fundamental concepts and the main features that contribute to form trust and reputation in that domain, respected the dependence on the context/role of trust and reputation, aggregated only homogeneous trust information; listed and shown how to defend from the main malicious attacks.  相似文献   

4.
In the recent past, a considerable research has been devoted to trust and reputation mechanisms to simplify complex transactions for open environments in social networking, e-commerce, and recommender systems (RS). In real life, we come to know about others through our social circle according to their reputation which is a public view. However, it is not always adequate to depend solely on the public view and therefore a trust measure is required to give a personalized view of the future encounters with a specific partner. In this paper, we propose fuzzy computational models for both trust and reputation concepts. Reciprocity and experience are used for trust modeling while the proposed reputation model is a fuzzy extension of beta reputation model. A two-level filtering methodology is proposed to benefit to a large extent from both the concepts separately. In order to justify the proposed models, we compared them with the existing reputation models for movie RS. The experimental results show that the incorporation of trust and reputation concepts into RS indeed improves the recommendation accuracy and establish that our models are better than beta and the popular eBay reputation models.  相似文献   

5.
In open environments, agents depend on reputation and trust mechanisms to evaluate the behavior of potential partners. The scientific research in this field has considerably increased, and in fact, reputation and trust mechanisms have been already considered a key elements in the design of multi-agent systems. In this paper we provide a survey that, far from being exhaustive, intends to show the most representative models that currently exist in the literature. For this enterprise we consider several dimensions of analysis that appeared in three existing surveys, and provide new dimensions that can be complementary to the existing ones and that have not been treated directly. Moreover, besides showing the original classification that each one of the surveys provide, we also classify models that where not taken into account by the original surveys. The paper illustrates the proliferation in the past few years of models that follow a more cognitive approach, in which trust and reputation representation as mental attitudes is as important as the final values of trust and reputation. Furthermore, we provide an objective definition of trust, based on Castelfranchi’s idea that trust implies a decision to rely on someone.  相似文献   

6.
汪灏  张玉清 《计算机应用》2015,35(4):985-990
通过将网络节点推荐行为分析和网络恶意节点密度的自适应机制纳入信誉度评价过程,提出了基于蚁群算法的加强型可抵御攻击信任管理模型--EAraTRM,以解决传统信任模型因较少考虑节点的推荐欺骗行为而导致容易在恶意节点的合谋攻击影响下失准的问题。在对比研究中发现,EAraTRM可以在网络中恶意节点密度达到90%,其他传统信任模型已经失效的情况下,仍保持较高的正确性。实验结果表明,EAraTRM能提高节点评价其他节点信誉度时的精度,并降低整个网络中恶意节点间进行合谋攻击的成功率。  相似文献   

7.
8.
Trust and reputation management over distributed systems has been proposed in the last few years as a novel and accurate way of dealing with some security deficiencies which are inherent to those environments. Thus, many models and theories have been developed in order to effective and accurately manage trust and reputation in those communities. Nevertheless, very few of them take into consideration all the possible security threats that can compromise the system. In this paper, we present some of the most important and critical security threats that could be applied in a trust and reputation scheme. We will describe and analyze each of those threats and propose some recommendations to face them when developing a new trust and reputation mechanism. We will also study how some trust and reputation models solve them. This work expects to be a reference guide when designing secure trust and reputation models.  相似文献   

9.
Decentralized Reputation Systems have recently emerged as a prominent method of establishing trust among self-interested agents in online environments. A key issue is the efficient aggregation of data in the system; several approaches have been proposed, but they are plagued by major shortcomings. We put forward a novel, decentralized data management scheme grounded in gossip-based algorithms. Rumor mongering is known to possess algorithmic advantages, and indeed, our framework inherits many of their salient features: scalability, robustness, a global perspective, and simplicity. We demonstrate that our scheme motivates agents to maintain a very high reputation, by showing that the higher an agent’s reputation is above the threshold set by its peers, the more transactions it would be able to complete within a certain time unit. We analyze the relation between the amount by which an agent’s average reputation exceeds the threshold and the time required to close a deal. This analysis is carried out both theoretically, and empirically through a simulation system called GossipTrustSim. Finally, we show that our approach is inherently impervious to certain kinds of attacks. A preliminary version of this article appeared in the proceedings of IJCAI 2007.  相似文献   

10.
安全多方计算为保护各方的私有信息,采用安全协议来保证合作计算的顺利进行。但恶意攻击的存在,使得安全协议的复杂性较高,协议的可操作性较低。鉴于此,提出一种基于声誉的评分累积信任模型,根据参与节点的历史行为评估其声誉,辨别恶意节点,采用惩罚机制鼓励可信的参与节点、隔离不可信节点,从而降低恶意攻击带来的风险。实验表明,该模型可以在一定程度上抵制自私的恶意攻击。  相似文献   

11.
基于信誉的peer-to-peer推荐信任模型   总被引:1,自引:2,他引:1  
随着对等网络p2p技术的不断发展,如何在p2p各个对等点之间建立起信任关系,已成为当今p2p技术研究的一个重要课题。在研究一些现有信任模型的基础上,分析其存在的问题,提出一种基于信誉的对等网信任模型,给出了信任度计算的算法.并设计了一种信任查询协议,最后,通过实验验证和分析了模型的可行性和安全性.  相似文献   

12.
Different trust and/or reputation models have arisen in the last few years. All of them have certain key processes in common such as scoring, ranking, rewarding, punishing or gathering behavioral information. However, there is not a standardization effort for these kinds of models. Such effort would be beneficial for distributed systems such as P2P, ad-hoc networks, multi-agent systems or Wireless Sensor Networks. In this paper we present a pre-standardization approach for trust and/or reputation models in distributed systems. A wide review of them has been carried out, extracting common properties and providing some pre-standardization recommendations. A global comparison has been done for the most relevant models against these conditions, and an interface proposal for trust and/or reputation models has been proposed.  相似文献   

13.
Partial identities as a foundation for trust and reputation   总被引:1,自引:0,他引:1  
This paper explores the relationships between the hard security concepts of identity and privacy on the one hand, and the soft security concepts of trust and reputation on the other hand. We specifically focus on two vulnerabilities that current trust and reputation systems have: the change of identity and multiple identities problems. As a result, we provide a privacy preserving solution to these vulnerabilities which integrates the explored relationships among identity, privacy, trust and reputation. We also provide a prototype of our solution to these vulnerabilities and an application scenario.  相似文献   

14.
根据交易者在交易环境中的角色划分设立商家名声与消费者名声,提出了基于评价时间顺序、交易金额和消费者信任值权重的信任模型;通过金额和消费者信任值加权计算商家加权平均分,在判断消费者评价可信度基础上,考虑时间衰减因子计算商家信任值。实验证明,该信任模型能够准确地判断诋毁消费者和不诚信商家,提高了信任模型的抗攻击能力和可用性,可有效帮助消费者识别商家的信任值变化趋势。  相似文献   

15.
在线信誉系统中的信任模型构建研究   总被引:9,自引:0,他引:9  
朱艳春  刘鲁  张巍 《控制与决策》2007,22(4):413-417
针对现有在线信誉系统中信任模型的缺陷,基于在线拍卖的特点,并结合已有信任研究成果,构建了基于多影响因素的信任模型.本模型适用于在线拍卖环境下对用户信誉状况的全面、准确的评估.仿真实验表明,与现有信任模型相比,本模型的信任度计算精确度较高,具有较好的可行性.  相似文献   

16.
In recent years, peer-to-peer systems have attracted significant interest by offering diverse and easily accessible sharing environments to users. However, this flexibility of P2P systems introduces security vulnerabilities. Peers often interact with unknown or unfamiliar peers and become vulnerable to a wide variety of attacks. Therefore, having a robust trust management model is critical for such open environments in order to exclude unreliable peers from the system. In this study, a new trust model for peer-to-peer networks called GenTrust is proposed. GenTrust has evolved by using genetic programming. In this model, a peer calculates the trustworthiness of another peer based on the features extracted from past interactions and the recommendations. Since the proposed model does not rely on any central authority or global trust values, it suits the decentralized nature of P2P networks. Moreover, the experimental results show that the model is very effective against various attackers, namely individual, collaborative, and pseudospoofing attackers. An analysis on features is also carried out in order to explore their effects on the results. This is the first study which investigates the use of genetic programming on trust management.  相似文献   

17.
周茜  于炯 《计算机应用研究》2010,27(11):4211-4214
针对可信网络不能有效处理恶意节点攻击的问题,综合考虑信任度评估的动态性和风险性,提出一种新的基于信誉和风险评估的动态信任模型。该模型引入惩罚机制、风险机制和推荐实体信任度更新机制,以评估信任关系的复杂性,通过构建直接信任树以存储节点的交互关系,并采用改进的回溯法寻找最佳推荐路径。仿真结果表明,该模型在有效抑制恶意节点上较已有模型有一定的改进。  相似文献   

18.
Vehicular ad hoc networks (VANETs) have drawn the attention of a number of researchers due to their several advantages and benefits. It is a very promising area of knowledge where investing new funds and effort is surely a wise move. Nevertheless, despite their multiple capabilities, new unresolved risks arise, and it is not always easy, or even feasible to cope with them. Recently, trust and reputation management has been proposed as a novel and accurate way to deal with some of these deficiencies. A considerable amount of works have been developed so far in this field concerning P2P networks, wireless sensor networks, ad hoc networks, etc. However, the application of behavioral-based trust and reputation management to VANETs is still at a preliminary stage. In this paper we survey the sate of the art, proving the current lack of proposals in this specific environment. We also suggest a set of design requirements for trust and reputation models specifically applicable to VANETs. Furthermore, we present our original proposal, TRIP, aimed to quickly and accurately distinguish malicious or selfish nodes spreading false or bogus messages throughout the network. We have also studied the level of fulfillment of each of the surveyed models with regard to each design requirement suggestion, comparing them with our approach. Finally, some preliminary experiments demonstrate the accurate performance of our trust and reputation mechanism under several different conditions.  相似文献   

19.
Interoperability in Identity and Identity Management Systems is a mounting concern for European policymakers, governments and administrators. Plans are being discussed, for example, with respect to European eIDs. However, interoperability seems to be too focused on technical aspects at a time when privacy concerns are emerging as a major stumbling block. How can Europe achieve a more balanced approach? This article discusses the results of the current FIDIS research in the area of interoperability.  相似文献   

20.
Improving quality of services (QoS) through applying trust and reputation management technology is increasingly popular in the literature and industry. Most existing trust and reputation systems calculate a general trust value or vector based on the gathered feedback without regard to trust's locality and subjectivity; therefore, they cannot effectively support a personal selection with consumer preferences. Our goal is to build a trust and reputation mechanism for facilitating a trustworthy and personal service selection in a service‐oriented Web, where service peers can act as a service provider and/or a service consumer. A user‐centric trust and reputation mechanism distinguishing the different trust context and content to enable a personal service selection with regard to trust preference in a service‐oriented Web is represented in detail. It is widely recognized that reputation‐based trust methods must face the challenge of malicious behaviors. To deal with the malicious feedback behaviors, we introduce a “bidirectional'' feedback mechanism based on QoS experience similarity in our trust and reputation framework. The test run demonstrates that our method can significantly increase the success rate of service transactions and is effective in resisting various malicious behaviors of service peers, when it is compared to other similar methods. © 2011 Wiley Periodicals, Inc.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号