Computer Science ›› 2013, Vol. 40 ›› Issue (10): 132-134.

Previous Articles     Next Articles

Similarity-based Trust Recommended Model

DONG Xiao-hua and ZHOU Yan-hui   

  • Online:2018-11-16 Published:2018-11-16

Abstract: It is difficult to distinguish the cheating and other malicious behaviours in the trust recommendation.A similarity-based trust recommended model was proposed.With social psychology research,two users are more likely to trust each other,when they have higher similarity in behaviours.Using similarity as trust recommendation weight,theoretical analyses and simulation results show that the model can effectively avoid malicious recommendation behaviour in trust recommendation.The model can reduce the calculation error of the trust remarkably compared with the existing model,and the preciseness of the trust evaluation model is enhanced greatly.

Key words: Trust recommended,Similarity,Trust model

[1] 甘早斌,曾灿,等.电子商务下的信任网络构造与优化[J].计算机学报,2012,5(1):27-37
[2] 马礼,郑纬民.网格环境下的信任机制研究综述[J].小型微型机系统,2008,9(5):825-830
[3] Artz D,Gil Y.A Survey of Trust in Computer Science and the Semantic Web[J].Journal of Web Semantics,2007,5(2):58-71 (下转第158页)(上接第134页)
[4] 曲向丽.网格环境下互信机制关键技术研究[D].长沙:国防科学技术大学计算机学院,2008
[5] Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[C]∥Dale J,Dinolt G,eds.Proceedings of the 17th Symposium on Security and Privacy.Oakland,CA:IEEE Computer Society Press,1996:164-173
[6] 朱艳春,刘鲁,张巍.在线声誉系统中的信任模型构建研究[J].控制与决策,2007,2(4):413-417
[7] Blaze M,Feigenbaum J,Keromytis A D.Keynote:Trust management for public-key infrastructures[C]∥Christianson B,Crispo B,William S,et al.,eds.Cambridge 1998Security Protocols International Workshop.Berlin:Springer-Verglag,1999:59-63
[8] Chu Y H,Feigenbaum J,Lamacchia B.REFEREE:trust mana-gement for Web applications[J].WordWideWeb Journal,1997,2(2):127-139
[9] Azzedin F,Maheswaran M.Evolving and Managing Trust inGrid Computing Systems[C]∥Proceedings of the IEEE CanadianConference on Electrical&Computer Engineering.2002:1424-1429
[10] Azzedin F,Maheswaran M.Towards Trust-Aware ResourceManagement in Grid Computing Systems[C]∥Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid.2002:452-452
[11] Azzedin F,Maheswaran M.A Trust Brokering System and Its Application to Resource Management in Pubic-Resource Grids[C]∥Proceedings of the 18th International Parallel and Distri-buted Processing Symposium.2004:289-298
[12] Beth T,Borcherding M,Klein B.Valuation of trust in open system[C]∥Collmann D,ed.Computer Security,ESORICS’94.volume 875of Lecture Notes in Computer Science,Berlin:Springer Verlag,1994:3-18
[13] Abdul-Rahman A,Hailers S.A distributed trust model[C]∥Proceeding of the 1997New Security Paradigms Workshop.Cumbia,UK:ACM Press,1997:48-60
[14] Kamvar S D,Schlosser M T.EigenRep:Reputation management in P2P networks[C]∥Lawrence S,ed.Proc.of the 12th Int’l World Wide Web Conf.Budapest:ACM Press,2003:123-134
[15] Zhang Q,Zhang X,Wen X Z,et al.Construction of peer-to-peer multiple-grain trust model[J].Journal of Software,2006,7(1):96-107
[16] Yuan L L,Zeng G S,Jiang L L,et al.Dynamic Level Scheduling Based on Trust Model in Grid Computing[J].Chinese Journal of Computers,2006(7):1217-1224
[17] Richardson M,Agrawal R,Domingos P.Trust management for the semantic web[C]∥Proceedings of the Second International Semantic Web Conference.2003:351-368
[18] Christian B,Radoslaw O.Using context-and content basedtrust policies on the semantic web[C]∥Proceedings of the 13th international World Wide Web Conference on Alternate track papers & Posters.2004:228-239
[19] 李海华,杜小勇,田萱.一种能力属性增强的Web服务信任评估模型[J].计算机学报,2008,31(8):1471-1477
[20] 董晓华,吴中福.网格服务信任的赔偿评估模型[J].重庆大学学报,2010,3(6):121-127
[21] 董晓华.网格服务的信任机制研究[D].重庆:重庆大学,2010
[22] Ziegler C N,Golbeck J.Investigating interactions of trust and interest similarity[J].Decision Support Systems,2007,43(2):460-475
[23] 李景涛,荆一楠,肖晓春,等.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,8(1):157-167
[24] 袁传思.基于用户信任的攻击检测防御模型[J].重庆理工大学学报:自然科学版,2010,24(6):72-77

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!