Computer Science ›› 2017, Vol. 44 ›› Issue (8): 100-106.doi: 10.11896/j.issn.1002-137X.2017.08.019

Previous Articles     Next Articles

Personalized Trust Model in Network Environment

LIAO Xin-kao, WANG Li-sheng, LIU Xiao-jian and XU Xiao-jie   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Trust is the foundation of human society,and plays an important role in the fields of science,technology,busi-ness,daily life and so on.A healthy society cannot keep well without trust.On the basis of studying the defects of the existing trust models and combining with all kinds of trust situations in the real life,a personalized trust model in network environment was proposed.This trust model can identify different trust meanings for various entities,and can re-commend all trust paths for users which meet the whole conditions in specific context environment.Because of the better dynamic adaptability and context correlation,the model can effectively improve the accuracy of trust model,which is demonstrated by the experimental results.

Key words: Personalized,Trust model,Dynamic adaptability

[1] STEPHEN M.Formalising trust as a computational concept[D].Scotland:University of Stirling,1994.
[2] ABDUL-RAHMAN A,HAILES S.Supporting trust in virtual communities[C]∥Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.IEEE,2002:6007.
[3] GAN Z B,DING Q,LI K,et al.Reputation-based Multi-Dimensional Trust Algorithm[J].Journal of Software,2011,2(10),2401-2411.(in Chinese) 甘早斌,丁倩,李开,等.基于声誉的多维度信任计算算法[J].软件学报,2011,22(10):2401-2411.
[4] DONG H T,JENNINGS N R,S HADBOLT N.Developing an integrated trust and reputation model for open multiagent systems[C]∥Proceedings of the 7th International Workshop on Trust in Agent Societies.2004:65-74.
[5] ZHOU R F,KAI H.Gossip-based reputation aggregation for unstructured peer-to-peer networks[C]∥International Parallel and Distributed Processing Symposium.2007:1-10.
[6] TANG W,HU J B,CHEN Z.Research on a Fuzzy Logic-based Subjective Trust Management Model[J].Journal of Computer Research and Development,2005,2(10):1654-1659.(in Chinese) 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
[7] LI D Q,WU X C,GUO R M.Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk[J].Computer Science,2016,3(5):117-121.(in Chinese) 李道全,吴兴成,郭瑞敏.一种基于二层节点和客观风险的电子商务交易信任模型[J].计算机科学,2016,43(5):117-121.
[8] TEACY W T L,LUCK M,ROGERS A,et al.An efficient and versatile approach to trust and reputation using hierarchical bayesian modeling[J].Artificial Intelligence,2012,193:149-185.
[9] ZHANG S W,LIN H F,LIU X X,et al.Trust Propagation Based on Probability[J].Computer Science,2014,1(8):90-93.(in Chinese) 张绍武,林鸿飞,刘晓霞,等.基于概率的信任传播模型[J].计算机科学,2014,41(8):90-93.
[10] KAWSER W N ,TONNY S K,AMJAD H ,et al.A fuzzy and probabilistic logic based representational model of certain trust model[C]∥International Conference on Informatics,Electronics & Vision.2012:1000-1005.
[11] CERUTTI F,KAPLAN L M,NORMAN T J,et al.Subjective logic operators in trust assessment:an empirical study[J].Information Systems Frontiers,2015,17(4):743-762.
[12] SU Z Y,LI M C,FAN X X,et al.LT Trust:a trust management model based on hybrid strategy[J].Journal of Chinese Compu-ter System,2014,35(7):1464-1469.
[13] XU J,ZHONG Y S,WAN S P.Incentive Adaptive Trust Model Based on Integrated Intuitionistic Fuzzy Information[J].Journal of Electronics and Information Technology,2016,8(4):803-810.(in Chinese) 徐军,钟元生,万树平.一种集成直觉模糊信息的激励自适应信任模型[J].电子与信息学报,2016,38(4):803-810.
[14] XIE Y H,HE Y J,XIANG Y.A Secure Grid Trust Model Based on Trust and Reputation[J].Journal of Xi’an University of Posts and Telecommunications,2016,1(3):69-73.(in Chinese) 解云虹,何永健,向阳.一种基于信任和信誉的安全网格信任模型[J].西安邮电大学学报,2016,21(3):69-73.
[15] XIA L,LI W,LU Y,et al.A Trust Model for the Inter-Domain Routing System[J].Journal of Computer Research and Development,2016,3(4):845-860.(in Chinese) 夏怒,李伟,陆悠,等.一种面向域间路由系统的信任模型[J].计算机研究与发展,2016,53(4):845-860.
[16] HOOGENDOORN M,JAFFRY S W,VAN MAANEN P P,et al.Design and validation of a relative trust model[J].Know-ledge-Based Systems,2014,57:81-94.
[17] WILENSKY U.Netlogo.http://ccl.northwestern.edu/net-logo.
[18] XIONG L,LIU L.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge Data Engineering,2004,16(7):843-857.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .