共查询到18条相似文献,搜索用时 203 毫秒
1.
P2P网络中基于云模型的主观信任评价 总被引:3,自引:0,他引:3
为了解决P2P网络交互的安全性问题,模拟人际交互网络,提出了基于云模型理论的主观信任评价模型.通过信任云及信任等级基准云的定义,实现了主观信任定性与定量的统一,客观地反映了信任的模糊性与随机性.通过逆向信任云算法、信任云合并算法及信任云相似度计算算法,实现了主观信任的综合评价和决策.仿真实验分析表明本方法是有效的和合理的.为开放式网络环境中的信任评估研究提供了一个有价值的新思路. 相似文献
2.
3.
基于隶属云理论的主观信任评估模型研究 总被引:21,自引:1,他引:20
根据主观信任的主观性、模糊性和随机性等特点,引入隶属云模型理论对信任进行建模,给出了信任云和信任等级云的定量描述,提出了信任评价云的计算、合成、综合运算和主体信任等级的评估.模拟实验结果表明该信任评估模型是有效的. 相似文献
4.
提出了一种基于企业行为证据的双滑动窗口的供应商信任量化评估机制,通过不断滑动的窗口,确定窗口更新和替换的内容以保证企业行为信任评估的可信性和可扩展性.仿真实验分析表明,该模型提供了云环境下供应商信任值计算的动态性,评估方法能够有效应用于云环境下供应商的评价中,评价结果客观有效. 相似文献
5.
6.
21世纪初,电子商务随着Internet的延伸而不断发展。在经历了互联网泡沫后,电子商务逐渐脱去了冲动、豪华的外衣,步入务实阶段。然而他仍没有摆脱网络本身虚拟的特性,使许多交易者在虚幻的网络世界中望而却步,信任问题逐渐制约了人们参与到电子商务中的积极性,尤其是在C2C电子商务市场逐渐发展兴旺的今天。本文通过引用前人的经典理论与对现实C2C市场的分析,认为,在法律、基础设旌等一定的条件下,更易于形成品牌的电子商务交易平台的提供者在人们的“信任”中有着至关重要的作用,可以通过技术的利用,通过认证方式的完备,通过信任评价体系的完善,通过有效的支付保证,促进诚信的互联网文化的形成。 相似文献
7.
云模型是定性定量不确定性转换模型,将其应用到房地产投资决策的风险评价上来,实现定性概念与定量数值之间的不确定性转换,可使风险评价更加客观。该文建立了房地产投资决策风险评价指标体系,并利用云模型对风险因素进行了评价,使风险评价更加客观,实现了云理论在工程领域的初步应用。 相似文献
8.
本文分析了C2C电子商务模式及电子商务信誉的基本概念,指出C2C电子商务信誉评价机制的现状及其存在的问题。提出了改进C2C电子商务模式信誉评价机制的对策和建议,对C2C电子商务模式的发展有着一定的现实指导意义。 相似文献
9.
10.
P2P电子商务环境下的动态安全信任管理模型 总被引:1,自引:0,他引:1
针对P2P电子商务中的信任评估问题,提出一种基于信任云的动态安全信任管理模型(TCDSTM).TCDSTM利用云理论来刻画信任及信任等级,然后给出具有抗攻击能力的全局信任度融合算法、节点的类型识别和拓扑重构机制.理论分析和仿真实验一致表明,TCDSTM小仅可以抵御共谋、振荡等恶意攻击,而且大大提高了交易成功率.此外,该模型具有较低的通信丌销. 相似文献
11.
Trust Management has been proved to be an effective method to detect malicious nodes and ensure security in Wireless Sensor Networks (WSNs). While, most existing trust management methods are not good at dealing with uncertainty of trust relationship such as randomness, fuzziness in WSNs, which leads to inaccurate trust metric. In this paper, a trust evaluation method for clustered wireless sensor networks based on cloud model is proposed and evaluated, which implements the conversion between qualitative and quantitative of sensor nodes’ trust metrics in order to achieve better trust evaluation. Firstly, the method considers multi-factors including communication factor, message factor and energy factor and builds mathematical model for each trust factor to get factor trust cloud. Secondly, immediate trust cloud is calculated by assigning adjustive weights for each factor trust cloud and combining them. Thirdly, recommendation trust cloud and immediate trust cloud are synthesized according to time sensitive factor in order to get final trust cloud. Furthermore, the final trust cloud of sensor node is converted to trust grade by trust cloud decision-making. Verification Experiments manifest that the proposed method has feasibility and accuracy in the aspect of evaluating sensor nodes’ trust. Moreover, comparison experiments under different attacks show that our method is sensitive to multiple attacks, it outperforms other trust evaluation methods not only in the accuracy of detecting malicious nodes, but also in the tolerance of abnormal conditions. 相似文献
12.
Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management. 相似文献
13.
14.
15.
16.
17.
18.
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 相似文献