Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Computers》 2007-11
Add to Favorite Get Latest Update

A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network

TIAN Li-Qin LIN Chuang(Department of Computer Science and Technology,Tsinghua University,Beijing 100084)  
In recent years,the trustworthy network research has become a research focus.User trust study is one important branch of trustworthy network research field,and it includes not only user identity trust but also user behaviour trust.The traditional authorization and authentication security mechanism mainly solve user identity trust,it can′t deal with user behaviour trust.User behaviour trust strengthens the dynamic state processing of the user,providing the strategy foundation for implementation of intelligent adaptive network security.Because the behaviour trust is based on the evidence of past transaction,but what we need is the future user behaviour trust,therefore scientifically predicting user future behaviour trust is very necessary.This paper first discusses a mechanism that how to use Bayesian network to forecast user behaviour trust.The mechanism not only can predict behaviour trust grade under the single trust attribute conditions,but also can predict trust grade under the multi-trust-attribute conditions.As trust coexists with risk,decision-making that only relay on forecasted trust grade is very one-sided and dangerous.Therefore we must also analyze risk in the decision-making of control.The rest of this paper analyzes payoff matrix of Game-theory combining foregoing forecasts results,figures out mixed Nash equilibrium strategy based on user secure attribute,puts forward the decision-making conditions of controlling for the service provider.Lastly the authors give an example to illustrate how to use the result of the paper and analyze its advantage comparing existing user control strategy.The result of the paper not only has an important theoretical significance to quantitatively analyze user behavior trust,but also has a major guiding significance in the actual network application due to the authors consider the actual network application background of Providing of Digital Electronic Resources in the example and in all process of analysis.
【Fund】: 国家自然科学基金(60673184 60673187和90412012);; 国家“九七三”重点基础研究发展规划项目基金(2006CB708301);; 河北省科学技术研究与发展指导计划项目基金(07213570)资助.~~
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 CHEN Ya-rui1,TIAN Li-qin2,3,YANG Yang1(1.School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China;2.Department of Computer Science and Technology,North China Institute of Science and Technology,Beijing 101601,China;3.School of Computer Science and Technology,Qinghai Normal University,Xining,Qinghai 810008,China);Model and Analysis of User Behavior Based on Dynamic Game Theory in Cloud Computing[J];Acta Electronica Sinica;2011-08
2 Zhao Jie Xiao Nan-feng Zhong Jun-rui(School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,Guangdong,China);Behaviour Trust Control Based on Bayesian Networks and User Behavior Log Mining[J];Journal of South China University of Technology(Natural Science Edition);2009-05
3 WANG Jian1,2,LIU Yan-heng1,2,ZHANG Ying-ge1,2,MEI Fang1,2(1.College of Computer Science and Technology,Jilin University,Changchun 130012,China;2.Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education,Jilin University,Changchun 130012,China);New model and realization of trusted remediation network[J];Journal of PLA University of Science and Technology(Natural Science Edition);2008-05
4 Lin Chuang1, Tian Liqin1,2, and Wang Yuanzhuo11(Department of Computer Science and Technology, Tsinghua University, Beijing 100084)2(School of Information Engineering, University of Science and Technology Beijing, Beijing 100083);Research on User Behavior Trust in Trustworthy Network[J];Journal of Computer Research and Development;2008-12
5 TIAN Li-qin1,3,LIN Chuang2,YANG Yang1 1.Information Engineering School,University of Science and Technology Beijing,Beijing 100083,China 2.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China 3.North China Institute of Science and Technology,Beijing 101601,China;Behavior trust computation in distributed network[J];Computer Engineering and Applications;2008-17
6 LIN Ji-yan,WU Zhen-qiang,GU Dan-dan School of Computer Science,Shaanxi Normal University,Xi'an 710062,China;Monitoring solution aiming at inside users' behavior[J];Computer Engineering and Applications;2010-32
7 WANG Zhi-wen LU Ke WANG Xiao-fei(School of Electronics and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,China);Approach on Promoting Survivability for Information System Based on Game-theory[J];Computer Science;2010-09
8 ZHAO Jie1,2,XIAO Nan-feng1,ZHONG Jun-rui3 (1.School of Computer Science & Engineering,South China University of Technology,Guangzhou 510640;2.School of Management,Guangdong University of Technology,Guangzhou 510520;3.Computer Center,The First Affiliated Hospital of Jinan University,Guangzhou 510630);Application of Web Usage Mining in Trust Management[J];Computer Engineering;2009-24
9 ZHANG Run-Lian1),2) WU Xiao-Nian2),3) ZHOU Sheng-Yuan2),3) DONG Xiao-She1)1)(School of Electronic & Information Engineering,Xi'an Jiaotong University,Xi'an 710049) 2)(School of Information and Communication,Guilin University of Electronic Technology,Guilin,Guangxi 541004) 3)(National Laboratory for Modern Communications,Chengdu 610041);A Trust Model Based on Behaviors Risk Evaluation[J];Chinese Journal of Computers;2009-04
10 ZHANG Huan-Guo1),2) CHEN Lu1) ZHANG Li-Qiang3)1)(School of Computer,Wuhan University,Wuhan 430072)2)(Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education,Wuhan University,Wuhan 430072)3)(State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072);Research on Trusted Network Connection[J];Chinese Journal of Computers;2010-04
China Proceedings of conference Full-text Database 4 Hits
1 Mei Fang,Liu Yanheng,Wang Jian,and Zhu Jianqi (College of Computer Science and Technology,Jilin University,Changchun 130012) (Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education,Jilin University, Changchun 130012);Modeling and Realization of Remediation Based on Trusted Network[A];[C];2009
2 ZHU Guo-cui (China Mobile Grou PZhejiang Co.Ltd.,Hangzhou,Zhejiang 310006,China);The information security management of the integrated telecommunications services operation[A];[C];2009
3 Zhibing Wang, Changyun Li and Junfeng Man School of Computer and Communication Hunan University of Technology Zhuzhou 412008, China;A Bayes-Based Method for Trust Valuation in Electronic Commerce[A];[C];2010
4 Long Dong-yun College of Computer Science and Technology Changchun University Changchun,Jilin Province, China;A Kind of Grade Division Policy for Trusted Network[A];[C];2010
【Citations】
Chinese Journal Full-text Database 1 Hits
1 LIN Chuang PENG Xue-Hai (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Research on Trustworthy Networks[J];Chinese Journal of Computers;2005-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 MA Zhuo,MA Jian-feng,YANG Chao,YANG Li (School of Computer Science & Technology,Xidian University,Xi'an 710071,China);Trusted Network Connect Protocol for Wireless Environment[J];Journal of Beijing University of Technology;2010-05
2 MA Chun-min,KANG Cun-feng,HUANG Xu-dong,ZHENG Xue-ke,YANG Jian-wu,FEI Ren-yuan(College of Mechanical Engineering and Applied Electronics Technology,Beijing University of Technology,Beijing 100124,China);Shaftless Printing Machine Control System[J];Journal of Beijing University of Technology;2010-06
3 CHEN Hongsong,WANG Zhaoshun,NING Shurong Department of Computer Science,School of Information Engineering,University of Science and Technology Beijing,Beijing 100083,China;Agent-based security protocol against DoS attack in Ad Hoc network[J];Journal of University of Science and Technology Beijing;2007-S2
4 YUAN Ben-wen1,ZHAO Kuo2,SUN Ming-di2,HU Liang2 (1. Jilin Radio and TV University,Changchun 130022,China; 2. College of Computer Science and Technology,Jilin University,Changchun 130012,China);Design and Implementation of Trusted Communication Protocol for Intrusion Prevention System[J];Journal of Jilin University(Information Science Edition);2010-01
5 HAN Yong1, CHEN Qiang2, WANG Jian-xin2 (1.College of Electronic Science and Engineering,National University of Defense Technology,Changsha410073,China;2.Institute of China Electronic System Engineering Corporation, Beijing 100039,China);Survey on Airborne Network Technology[J];Telecommunication Engineering;2008-08
6 Gao Peng (China Mobile Group Design Institute Co.,Ltd.,Beijing 100080);Research on the Key Issues in Trusted Networks[J];Telecom Engineering Technics and Standardization;2009-07
7 ZHOU Ming-tian~1 TAN Liang~2 (1.School of Computer Science and Engineering,Univ.of Electron.Sci.& Tech.of China Chengdu 610054; 2.Software Key Lab.of Sichuan Province,Sichuan Normal University Chengdu 610066);Progress in Trusted Computing[J];Journal of University of Electronic Science and Technology of China;2006-S1
8 ZHANG Min,LUO Guang-chun (Information Center, University of Electronic Science and Technology of China Chengdu 610054);Research on a New Infrastructure of Trustworthy Networks[J];Journal of University of Electronic Science and Technology of China;2007-S3
9 ;A Text Category Method based on the Analysis of the Characters of Words in Illegal Texts[J];Computer Development & Applications;2006-10
10 YU Zhi-liang(Shaanxi University of Technology,Hanzhong 721300,China);Study and Design of Security Embedded System Based on TPM[J];Computer Knowledge and Technology;2010-21
China Proceedings of conference Full-text Database 8 Hits
1 ZHANG Lin WANG Ru-chuan WANG Hai-yan WANG Yang (College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China);Research of the Trusted Mechanism Based on Subjectivity and Objectivity in Grid Environment[A];[C];2008
2 HE Ming~(1,2) QIU Hang Ping~1 YANG Fei~1 LIU Yong~1 1 PLA Science and Technology University,Institute of Command Automation,Nanjing 210007 2 Information Science and Engineering Institute,Southeast University,Nanjing 210096;Research on Trustworthy Authentication Techniques Based on the Trustworthy Distributed System[A];[C];2008
3 AN Hong-zhang , CHEN Hao , XIANG Hong-quan , XIE Yong-chun (State Key Laboratory for Modern Communications, Chengdu Sichuan 610041, China);An Implementation of Trusted Network[A];[C];2007
4 WU Xiao-nian①②,ZHOU Sheng-yuan①② (①School of Information and Communication,Guilin University of Electronic Technology,Guilin Guangxi 541004,China; ②State Key Laboratory for Modern Communications,Chengdu Sichuan 610041,China);Application of Data Mining in Behavior Trust Research[A];[C];2009
5 ZHU Guo-cui (China Mobile Grou PZhejiang Co.Ltd.,Hangzhou,Zhejiang 310006,China);The information security management of the integrated telecommunications services operation[A];[C];2009
6 Zuo Zhang1,3, Danya Yao2,3, Yi Zhang1,3, Jianming Hu1,3 (1. Department of Automation, Tsinghua University, Beijing 100084, China; 2. Research Institute of Information Technology, Beijing 100084, China; 3. Tsinghua National Laboratory for Information Science and Technology (TNList); Beijing 100084, China );Mixed Urban Traffic Data Collection and Processing With Advanced Information Technologies[A];[C];2007
7 Sun XiuJuan 1.2 Zhao Huiqun2 Sun Jing2 Wang Ka2 1.Beijing Polytechnic College 2.School of Information and Engine,North China University of Technology;Study of Trustworth Technology of EPC Network[A];[C];2011
8 Zhao Bo~(1,2) Yuan Wei~1 Chen Lu~1 CHEN Shouming~1 Xiao Jinyu~1 Gong Fengjiao~1 (1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China; 2.Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education, Wuhan 430072,Hubei,China);Solving the Judgment Matrixes Compatible With the Environment Based on Genetic Algorithm[A];[C];2010
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 FENG Yaodong, HUANG Gang, MEI HongSchool of Electronics Engineering and Computer Science, Peking University, Beijing 100871;;A Method for Modeling and Realizing Self-Adaptive Software Architecture[J];Acta Scientiarum Naturalium Universitatis Pekinensis;2008-01
2 Yuan Man Hu Jianping He Rui (School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China) Ma Jian (Nokia R&D China, Beijing 100013, China);QoS management model based on policy for grid application service[J];Journal of Beijing University of Aeronautics and Astronautics;2005-06
3 LIU Yu-long~1,CAO Yuan-da~2 (1.Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China; 2.School of Computer Software, Beijing Institute of Technology, Beijing100081, China);Subjective Trust Model in Distributed Network[J];Journal of Beijing Institute of Technology;2005-06
4 WU Ping~(1,2),SONG Han-tao~1,NIU Zhen-dong~1,ZHANG Li-ping~1, ZHANG Ju-li~2(1.School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China;2.College of Computer and Communication,Lanzhou University of Technology,Lanzhou,Gansu 730050,China);SS/OSF for High-Dimensional Sparse Data Object Clustering[J];Transactions of Beijing Institute of Technology;2006-03
5 WANG Yong1,LI Ming2,CUI Ling-guo3,HU Jing-jing1,ZHANG Long-fei1(1.School of Computer Software,Beijing Institute of Technology,Beijing 100081,China;2.Information Classified Security Protection Evaluation Center,Ministry of Public Security,Beijing 100037,China;3.Department of Automatic Control,School of Information Science and Technology,Beijing Institute of Technology,Beijing 100081,China);A Context-Aware Trust Management System[J];Transactions of Beijing Institute of Technology;2008-02
6 WANG Yong1,LI Ming2,CUI Ling-guo3,HU Jing-jing1,ZHANG Long-fei1(1.School of Computer Software,Beijing Institute of Technology,Beijing 100081,China;2.Information Classified Security Protection Evaluation Center,Ministry of Public Security,Beijing 100037,China;3.Department of Automatic Control,School of Information Science and Technology,Beijing Institute of Technology,Beijing 100081,China);Context-Aware Trust Management for Open Network Environment[J];Transactions of Beijing Institute of Technology;2008-03
7 ZHANG Zi-jian1,LI Hong2,ZHU Lie-huang1,LIAO Le-jian1(1.School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China;2.Archives of Aerospace Science and Technology,Beijing 100830,China);A New Distributed Network Environment Trust Evaluation Model[J];Transactions of Beijing Institute of Technology;2008-09
8 ZHU Chun-mei1,2,XU Xiao-li1,2,ZHANG Jian-min1(1.School of Mechanical and Vehicular Engineering,Beijing Institute of Technology,Beijing 100081,China; 2.Beijing Information Science and Technology University,Beijing 100192,China);Electromechanical Equipment Fault Forecasting Research Based on Chaos-Neural Networks Theory[J];Transactions of Beijing Institute of Technology;2009-06
9 XU Xiao-yu,ZHANG Hui-min (Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);A New Policy-Based Framework for End-to-End Mobile QoS[J];Journal of Beijing University of Posts and Telecommunications;2004-06
10 GUO Shi-ze1,NIU Guan-jie2,ZHENG Kang-feng2(1.54 Research Institute of the General Staff,Beijing 100083,China;2.School of Information Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China);An Intrusion Tolerance Model and Quantizing Analysis[J];Journal of Beijing University of Posts and Telecommunications;2007-01
China Proceedings of conference Full-text Database 2 Hits
1 WU Xiao-nian①②,ZHOU Sheng-yuan①② (①School of Information and Communication,Guilin University of Electronic Technology,Guilin Guangxi 541004,China; ②State Key Laboratory for Modern Communications,Chengdu Sichuan 610041,China);Application of Data Mining in Behavior Trust Research[A];[C];2009
2 Silu Chen Miao Zhang Guoai Xu Yixian Yang(Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876);The Application of Trusted Network Connect[A];[C];2007
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 SUN Yan1,2 JIN Shuyuan2 YANG Zhi2,3 YIN Lihua2(1.School of Computer Science and Technology,Beijing University of Posts and Telecommunication,Beijing 100876;2.Institute of Computing Technology,Chinese Academy of Science Beijing 100190;3.School of Electronic Technology,PLA Information Engineering University Zhengzhou 450004);Multi-level inter-domain trusted network interconnection oriented on classified protection[J];Information Security and Technology;2010-06
2 Zhang jing 1 Hu huaping1,2 Liu bo1 Xiao fengtao1 Chen xin1 Chen lin1 (1 the School of Computer, National University of Defense and Technology, Changsha 410073 2 The Army of 61070, Fuzhou 350003);Defense Technology of DDoS Attacks[J];Information Security and Technology;2010-07
3 ZHA Zhi-qin1 GAO Bo2(1.School of Computer & Information Engineering,Changzhou Institute of Technology,Changzhou 213002;2.Yanling School,Changzhou Institute of Technology,Changzhou 213002);Implementation and Research for the System of Data Mining Based on Web Searching[J];Journal of Changzhou Institute of Technology;2011-01
4 Zhou Yi,Zheng Xuefeng,Yu Yike(Computer College,Beijing University of Science&Technology,Beijing 100083,China);Implementation to Layered Model Based on Evolutionary Theory in Trusted Computing Environment[J];Telecommunications Science;2010-06
5 Xu Chuan1,Du Cheng1,Tang Hong2(1.College of Communication,Chongqing University of Posts and Telecommunications,Chongqing 400065,China; 2.Department of Computer Science,Chongqing University of Posts and Telecommunications,Chongqing 400065,China);A Survey of Detection Research on DDoS Attack[J];Telecommunications Science;2011-03
6 WU Qiang (Modern Education Technology Center Jiangsu Radio & TV University,Nanjing 210036,China);How to Ensure Network Available in Trusted Network[J];Computer Knowledge and Technology;2011-13
7 CHEN Ya-rui1,TIAN Li-qin2,3,YANG Yang1(1.School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China;2.Department of Computer Science and Technology,North China Institute of Science and Technology,Beijing 101601,China;3.School of Computer Science and Technology,Qinghai Normal University,Xining,Qinghai 810008,China);Model and Analysis of User Behavior Based on Dynamic Game Theory in Cloud Computing[J];Acta Electronica Sinica;2011-08
8 TONG Xiaoyang (Southwest Jiaotong University,Chengdu 610031,China);Proactive Defense Strategies for Wide-area Protection and Substation Communication Based on Trusted Computing[J];Automation of Electric Power Systems;2011-20
9 LIU Zhi-du,JIA Song-hao,YANG Cai (College of Computer and Information Technology,Nanyang Normal Univ.,Nanyang 473061,China);An improved trustworthy network model[J];Journal of Naval University of Engineering;2010-04
10 YAN You-ri;Analysis and Prevention of The Mechanism Based on The DDOS Attack[J];Journal of Langfang Teachers College(Natural Science Edition);2009-06
China Proceedings of conference Full-text Database 4 Hits
1 WU Xiao-nian①②,ZHOU Sheng-yuan①② (①School of Information and Communication,Guilin University of Electronic Technology,Guilin Guangxi 541004,China; ②State Key Laboratory for Modern Communications,Chengdu Sichuan 610041,China);Application of Data Mining in Behavior Trust Research[A];[C];2009
2 TAN Ying WANG Dan (College of Computer,Beijing University of Technology,Beijing 100124);Design and Implementation of Network Behavior Analysis System Based on Network Flow[A];[C];2010
3 Wanfeng DOU1,Wei HE2,Yonghua QU1 1School of Computer Science and Technology,Nanjing Normal University,Jiangsu Engineering Center of Research on Information Security&Confidential Technology,Nanjing,China,210097 2Department of Mechanical Engineering,Nanjing Institute of Industry Technology,Nanjing,Jiangsu,China,210046;A New Trust Model Based on Risk Evaluation in Trusted Decision-Making Environments[A];[C];2010
4 Wenchao ZHAO~1,Xiao WANG~(2,3),Jinqiao SHI~2,Qingfeng TAN~2,Li GUO~2 1.Beijing University of Posts and Telecommunications,Beijing,China 2.Institute of Computing Technology,Chinese Academy of Sciences,Beijing,China 3.Graduate University of Chinese Academy of Sciences,Beijing,China;The Research on Users' Distinguishment of Anonymous Resources' Distribution Strategy[A];[C];2011
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 XING Xu Jia LIN Chuang JIANG Yi Xin (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);A Survey of Computer Vulnerability Assessment[J];Chinese Journal of Computers;2004-01
2 LIN Chuang+, REN Feng-Yuan (Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China);Controllable, Trustworthy and Scalable New Generation Internet[J];Journal of Software;2004-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved