Computer Science ›› 2016, Vol. 43 ›› Issue (5): 117-121.doi: 10.11896/j.issn.1002-137X.2016.05.022

Previous Articles     Next Articles

Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk

LI Dao-quan, WU Xing-cheng and GUO Rui-min   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In order to solve the security problem of electronic commerce in the environment of P2P,through the deep study of e-commerce trust model discussed by other scholars,and on the base of the possible objective transaction risk,this paper proposed a calculating method for comprehensive trust based on two layer nodes.In this model,various factors are considered,such as transaction amount and transaction time.The concept of transaction degree is also introduced,which is treated as the trade decision basis.Experiment results show that,the model effectively improves accuracy of the node trust value,and effectively improves the safety of transaction.

Key words: Electronic commerce,Trust model,Two layers nodes,Risk,Transaction degree,Trust degree

[1] Li Jun,Xue Wei,Gan Xu-yang.Improved Trust MechanismBased on EigenRep Trsut Model [J].Computer Science,2013,0(7):113-115(in Chinese) 李俊,薛伟,甘旭阳.基于EigenRep信任模型的一种改进信任机制[J].计算机科学,2013,0(7):113-115
[2] Tang Zhi-hai,Chen Shu-hong,Wang Guo-jun.Research OnGroup-based C2C E-commerce Trust Model[J].Computer Engi-neering,2012,8(23):146-149(in Chinese) 汤志海,陈淑红,王国军.基于群组的C2C电子商务信任模型研究[J].计算机工程,2012,8(23):146-149
[3] Shu Chang-jun,Xia Yang,Ding Huai,et al.Research of trustevaluation mechanism in P2P E-commerce [J].Computer Engineering and Design,2011,2(1):28-31(in Chinese) 束长军,夏阳,丁淮,等.P2P环境下电子商务信任评估机制研究[J].计算机工程与设计,2011,2(1):28-31
[4] Liu Bin,Zhang Ren-jin.Multi-context trust and reputation eva-luation system for server selection in online transaction[J].Journal of Computer Application,2012,2(8):2350-2355,9(in Chinese) 刘彬,张仁津.选择在线交易服务者的多情境信任和声誉评估系统[J].计算机应用,2012,2(8):2350-2355,9
[5] Li Cong,Liang Chang-yong.Multi-dimesionlity Reputation E-valuation Model for C2C E-commerce[J].Chinese Journal of Management,2012,9(2):204-211(in Chinese) 李聪,梁昌勇.面向C2C电子商务的多维信誉评价模型[J].管理学报,2012,9(2):204-211
[6] Jiang Si-wei,Zhang Jie,Ong Y S.An Evolutionary Model forConstructing Robust Trust Networks[C]∥Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems.America,2013
[7] Jiang Shou-xu,Li Jian-zhong.A Reputation_based Trust Me-chanism for P2P E-Commerce[J].Journal of Software,2007,8(10):2551-2563(in Chinese) 姜守旭,李建中.一种 P2P 电子商务系统中基于声誉的信任机制[J].软件学报,2007,8(10):2551-2563
[8] Wang Gang,Gui Xiao-lin,Wei Guang-fu.A recommendationTrust Model Based on Trade goods Domain Ontology Content Smilarity[J].Journal of Chinese Computer System,2012,33(11):2330-2334(in Chinese) 王刚,桂小林,魏广福.基于本体内容相似度的电子商务推荐信任模型[J].小型微型计算机系统,2012,33(11):2330-2334
[9] Tong Xiang-rong,Zhang Wei,Long Yu.Transitivity of Agent Subjective Trust[J].Journal of Software,2012,23(11):2862-2870(in Chinese) 童向荣,张伟,龙宇.Agent主观信任的传递性[J].软件学报,2012,23(11):2862-2870
[10] Jiang Dong-xing,Ye Zhen.Trust Model Based on Risk Evalua-tion [J].Microcomputer Information,2012,8(4):122-124(in Chinese) 姜东兴,叶震.一种基于风险评估的信任模型[J].微计算机信息,2012.28(4):122-124
[11] Xiong Jian-ying,Zhong Yuan-sheng.Fraud Against Model forSeller’s Reputation of C2C[J].Computer Science,2012,9(2):1-4(in Chinese) 熊建英,钟元生.一种抗欺诈的C2C卖方信誉计算模型研究[J].计算机科学,2012,9(2):1-4
[12] Wei Zhi-cheng.Analysis on Type of Risk and Research on Assessment Model Under Current E-commerce [D].Hefei:Hfei University of Technology,2012:19-36(in Chinese) 卫志诚.当前电子商务中风险类型分析及评估模型研究[D].合肥:合肥工业大学,2012:19-36
[13] Zhang Jie,Cohen R.A Framework for Trust Modeling in Multiagent Electronic Marketplaces with Buying Advisors to Consider Varying Seller Behavior and the Limiting of Seller Bids[J].ACM Transactions on Intelligent Systems and Technology(TIST),2013,4(2):55-73
[14] Liu Dao-qun,Liu Jun.Dynamic Trust Model for P2P Network Security[J].Journal of Chongqing Institute of Technology(Natural Science),2009,23(11):90-94(in Chinese) 刘道群,刘军.一种P2P网络安全动态信任模型[J].重庆工学院学报(自然科学),2009,23(11):90-94

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .