|Table of Contents|

[1] Wang Shaojie, Zheng Xuefeng, Chu Lijun, Yu Zhen, et al. Trust model based on individual experience [J]. Journal of Southeast University (English Edition), 2007, 23 (3): 373-376. [doi:10.3969/j.issn.1003-7985.2007.03.013]
Copy

Trust model based on individual experience()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
23
Issue:
2007 3
Page:
373-376
Research Field:
Computer Science and Engineering
Publishing date:
2007-09-30

Info

Title:
Trust model based on individual experience
Author(s):
Wang Shaojie Zheng Xuefeng Chu Lijun Yu Zhen Xu Guangmei
School of Information Engineering, University of Science and Technology Beijing, Beijing 100083, China
Keywords:
trust model individual experience feedback trust value
PACS:
TP393
DOI:
10.3969/j.issn.1003-7985.2007.03.013
Abstract:
To improve the accuracy of node trust evaluation in a distributed network, a trust model based on the experience of individuals is proposed, which establishes a new trust assessment system by introducing the experience factor and the comparative experience factor.The new evaluation system considers the differences between individuals and interactive histories between nodes, which solves the problem that nodes have inaccurate assessments due to the asymmetry of nodes to a certain extent.The algorithm analysis indicates that the new model uses different deviating values of tolerance evaluation for different individuals and uses different updating values embodying node individuation when updating feedback credibility of individuals, which evaluates the trust value more reasonably and more accurately.In addition, the proposed algorithm can be used in various trust models and has a good scalability.

References:

[1] Beth T, Borcherding M, Klein B.Valuation of trust in open network [C]//Proceedings of the European Symposium on Research in Computer Security.Springer-Verlag, 1994:3-18.
[2] Abdul-Rahman A, Hailes S.A distributed trust model[C]//Proceeding of the 1997 New Security Paradigms Workshop.Cumbria:ACM Press, 1997:48-60.
[3] JØsang A.Prospectives of modeling trust in information security [C]//Proceedings of the 2nd Australasian Conf on Infor Security and Privacy.Sydney, 1997:2-13.
[4] JØsang A.A subjective metric of authentication [C]//Proceedings of 5th European Symposium on Research in Computer Security, Louvain-la-Neuve.Belgium, 1998:329-344.
[5] JØsang A.A logic for uncertain probabilities [J].Intl J Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3):279-311.
[6] Cornelli F, Damiani E, de Capitani S.Choosing reputable servants in a P2P network[C]//The 11th World Wide Web Conference.Honolulu, Hawaii, USA, 2002:376-386.
[7] Xiong L, Liu L.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities [J].IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):843-857.
[8] Srivatsa M, Xiong L, Liu L.Trust guard:countering vulnerabilities in reputation management for decentralized overlay networks [C]//Proceedings of the 14th World Wide Web Conference.Chiba, Japan, 2005:422-431.
[9] Chang Junsheng, Wang Huaimin, Yin Gang.DyTrust:a time-frame based dynamic trust model for P2P systems [J].Chinese Journal of Computer, 2006, 29(8):1301-1307.(in Chinese)

Memo

Memo:
Biographies: Wang Shaojie(1976—), male, graduate;Zheng Xuefeng(corresponding author), male, professor, zxfxue@263.net.
Last Update: 2007-09-20