Computer Science ›› 2015, Vol. 42 ›› Issue (12): 157-161.

Previous Articles     Next Articles

Research on Fusion Trust Model for Decision-making

XU Pei, LIAN Bin, SHAO Kun, CHEN Jun and AN Ning   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The trust relationship model is one of the most complex social relation models either in real life or in the open networks.It is an abstract cognitive psychology with difficult measure,because it involves assumptions,expectations,behavior and environment,and other factors.Drawing on previous research experience,considering the variety of trust factor,this paper proposed a new trust fusion model for decision-making.This model is based on the evolution of direct trust,indirect trust and reputation,and is on the basis of trust fusion to obtain the decision trust.In order to prove the validity of the trust fusion model,we assumed object makes class A activity in the expectations of the probability P.Experimental verification shows that the difference of decision trust and credibility of the object is significantly less than the difference of decision trust,indirect trust or reputation and credibility of the object.

Key words: Trust management,Trust model

[1] Abdul-Rahman A,Hailes S.A distributed trust model[C]∥Proceedings of the 1997 Workshop on New Security Paradigms.ACM,1998:48-60
[2] Zacharia G,Maes P.Trust management through reputationmechanisms[J].Applied Artificial Intelligence,2000,14(9):881-907
[3] Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[C]∥Proceedings of IEEE Symposium on Security and Privacy,1996.IEEE,1996:164-173
[4] Blaze M,Feigenbaum J,Keromytis A D.KeyNote:Trust mana-gement for public-key infrastructures[M]∥Security Protocols:6th International Workshop Cambridge,UK,April 15-17,1998 Proceedings.Springer Berlin Heidelberg,1999:59-63
[5] Li Ning-hui,Winsborough W H,Mitchell J C.Distributed credential chain discovery in trust management[J].Journal of Computer Security,2003,11(1):35-86
[6] 朱曼玲,金芝.一种服务 Agent 的可信性评估方法[J].软件学报,2011,22(11):2593-2609 Zhu Man-ling,Jin Zhi.Approach for evaluating the trustworthiness of service agent[J].Journal of Software,2011,22(11):2593-2609
[7] Abdul-Rahman A,Hailes S.Supporting trust in virtual communities[C]∥Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000.IEEE,2000:9
[8] Gambetta D.Can we trust trust[M]∥Trust:Making and brea-king cooperative relations.2000:213-237
[9] Sun Yu-xing,Huang Song-hua,Chen Li-jun,et al.Bayesian Decision-Making Based Recommendation Trust Revision Model in AdHoc Networks[J].Journal of Software,2009,20(9):2574-2586
[10] Liang Z,Shi W.Analysis of ratings on trust inference in open environments[J].Performance Evaluation,2008,65(2):99-128
[11] 徐锋,吕建,郑玮,等.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051 Xu Feng,Lv Jian,Zheng Wei,et al.Design of a trust valuation model in software service coordination[J].Journal of Software,2003,14(6):1043-1051
[12] 王远,吕建,徐锋,等.一个适用于网构软件的信任度量及演化模型[J].软件学报,2006,17(4):682-690 Wang Yuan,Lv Jian,Xu Feng,et al.A trust measurement and evolution model for internetware[J].Journal of Software,2006,17(4):682-690

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .