Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 385-389.doi: 10.11896/j.issn.1002-137X.2017.6A.087

Previous Articles     Next Articles

TrustedMarket:A Trusted Software Market Model Based on Trust Measurement Theory for Smart Terminal

PING Liu-qiong   

  • Online:2017-12-01 Published:2018-12-01

Abstract: Aiming at the problem that the applications in the software market are not strictly examined,and the third party software market includes a large number of legitimate repackaged software,TrustedMarket,a trusted application software market model based on trust measurement mechanism was designed.As the characteristics of smart terminal’sown computing power,electricity power and network traffic are limited and the operating environment is complicated,the concept of relationship maturity,loyalty and recommended service quality was proposed to describe the recommended trust value provided by the smart terminal.A new feature description function was proposed to calculate the weight of historical loyalty evaluation value.The problem of trust value calculation in specific trust metric model is solved by all the above technologies.Through the implemented TrustedMarket model on Android platform,it is proved that the mo-del can solve the problem that the current application software market is untrustworthy.

Key words: Smart terminal,Software market,Trust measurement,Android

[1] BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]∥Proceedings of the European Symposium on Research in Security (ESORICS).Brighton:Springer-Verlag,1994.
[2] RD T,KNAPSKOG S J.A metric for trusted systems.Global IT Security[C]∥Proceedings of the 21st Nationed Security Confe-rence.NSA,1998:87-91.
[3] ABDUL-RAHMAN A,HAILES S.A distributed trust model[C]∥Proceedings of the 1997 workshop on New Security Paradigm.NSPW,1997.
[4] MUI L,MOHTASHEMI M,HALBERSTADT A.A Computational Model of Trust and Reputation[C]∥ Proc.35th Hawaii International Conference on System Sciences.2002.
[5] ABERER K,DESPOTOVIC Z.Managing Trust in a Peer-2-Peer Information System[C]∥Proceedings of the Ninth International Conference on Information and Knowledge Management.2001.
[6] XIONG L,LIU L.Peer Trust:Supporting Reputation-BasedTrust for Peer-to-Peer Electronic Communities[C]∥Procee-dings of 2003 IEEE Conference on E-Commerce.2003.
[7] 郭晶晶,马建峰,李琦,等.基于博弈论的移动自组织网络的信任管理方法[J].通信学报,2014,5(11):50-58.
[8] 林伟,郑相涵.基于私有云信任度量的对等网络节点安全互联模型[J].电信科学,2015,31(1):1-6.
[9] 蒋黎明,刘志明,张琨,等.基于动态分组的开放分布系统信任度量与管理研究[J].通信学报,2015,6(1):1-7.
[10] 李建,何永忠,徐开勇.基于信任度量的软件下载服务框架[J].武汉大学学报(自然科学版),2008,3(10):1062-1066.
[11] ZHENG Y,PENG Z,ATHANASIOS V.Vasilakos.A survey on trust management for Internet of Things[J].Journal of Network and Computer Applications,2014,2(3):124-134.
[12] 龚洁中,陈恭亮,李建华.智能移动终端的信任管理技术研究[J].中国电子科学研究院学报,2011,6(6):567-570.
[13] 林庆国,刘宴兵.一种基于信任的动态访问控制策略[J].重庆邮电大学学报(自然科学版), 2010,22(4):478-482.
[14] VIRENDRA M,JADLIWALA M,CHANDRASEKARAN M,et al.Quantifying trust in mobile ad-hoc networks[C]∥Proc.IEEE International Conf.on Integration Knowledge Intensive Multi-Agent Syst.Waltham,USA,Apr.2005.
[15] VELLOSO P B,LAUFER R P,CUNHA D D O.et al.Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model[J].IEEE Transactions on Network and Service Management,2010,7(3):172-185.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!