Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Software》 2003-08
Add to Favorite Get Latest Update

Research of Subjective Trust Management Model Based on the Fuzzy Set Theory

TANG Wen, CHEN Zhong (Department of Computer Science and Technology, Peking University, Beijing 100871, China)  
Trust management model is fundamental for information security in open networks. The fuzzy nature of subjective trust is considered, and the fuzzy set theory has been used to model the issues of trust management. The formalized valuation of subjective trust is given, the definition of trust class and the evaluation of trust are discussed, derivation rules of trust relationships are presented and a subjective trust management model is provided. The formal model proposed in this paper provides a new valuable way for studying trust management in open networks.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 LIU Yu-long~1,CAO Yuan-da~2 (1.Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China; 2.School of Computer Software, Beijing Institute of Technology, Beijing100081, China);Subjective Trust Model in Distributed Network[J];Journal of Beijing Institute of Technology;2005-06
2 LI Jia-lun,GU Li-ze,YANG Yi-xian(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);A New Trust Management Model for P2P Networks[J];Journal of Beijing University of Posts and Telecommunications;2009-02
3 Liu Shuangxi,Wang Cuiru(School of Computer Science and Technology,North China Electric Power University,Baoding 071003,China);Study on the Trust-based RBAC Assignment Model[J];Electric Power Science and Engineering;2009-03
4 CHEN Jian-gang1,WANG Ru-chuan1,2,WANG Hai-yan1(1.Institute of Computer Science,Nanjing University of Post and Telecommunications,Nanjing,Jiangsu 210003,China;2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China);A Subjective Trust Mechanism of Resource Access in Grid[J];Acta Electronica Sinica;2006-05
5 ZHANG Lin1,WANG Ru-chuan1,2,ZHANG Yong-ping3(1.College of Computer,Nanjing University of Post and Telecommunications,Nanjing,Jiangsu 210003,China;2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China;3.College of Computer,China University of Mining and Technology,Xuzhou,Jiangsu 221008,China);A Trust Evaluation Model Based on Fuzzy Set for Grid Environment[J];Acta Electronica Sinica;2008-05
6 Lu Feng,Wu Huizhong(Department of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094,china);Research of trust valuation based on cloud model[J];Engineering Sciences;2008-10
7 YANG Yuan-ting (Department of Electronic Engineering,Fujian Polytechnic of Information Technology,Fuzhou 350003,China);A mobile agent's dynamic programming scheme based on D-S theory in grid[J];Journal of Guilin University of Electronic Technology;2009-05
8 LI Lin,LI Tao-shen,GE Zhi-hui,LIAO Qi-yao(School of Computer,Electronics and Information,Guangxi University,Nanning,Guangxi,530004,China);The Trust Feature and Management Means of Manu-facturing Grid[J];Journal of Guangxi Academy of Sciences;2009-04
9 LI Lin,LI Tao-shen,GE Zhi-hui,LIAO Qi-yao(School of Computer,Electronics and Information,Guangxi University,Nanning 530004,China);Research on a Domain-Based Trust Management Model of Manufacturing Grid[J];Equipment Manufacturing Technology;2010-02
10 ZHANG Shu-qin,YANG Yong-tian(School of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China);A fuzzy set-based trust and reputation model for P2P networks[J];Journal of Harbin Engineering University;2005-06
China Proceedings of conference Full-text Database 3 Hits
1 YANG Jun-feng~1 SONG Jian~1 LI Dan-ning~2 LI Dan~2 (School of Electronic Science & Information Technology,Guizhou University,Guiyang 550003,China) 1 (Guizhou Academy of Science,Guiyang 550001,China) 2;Grey Relational Analysis's Practical Study in Evaluation of the Software Credibility[A];[C];2008
2 PEN Lin~1 FENG Jun-huan~2 Southwest Jiaotong University Chengdu.Sichuan 610031;A Security Mechanism Based on Fuzzy Trust in Manet[A];[C];2008
3 LI Lin, Li Taoshen, GE Zhihui, LIAO Qiyao;Study on Trust Mechanism of Manufacturing Grid[A];[C];2009
【Citations】
Chinese Journal Full-text Database 1 Hits
1 XU Feng, L?Jian (State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China); (Institute of Computer Software, Nanjing University, Nanjing 210093, China) E-mail: xf@softlab.nju.edu.cn http://moon.nju.edu.cn;Research and Development of Trust Management in Web Security[J];Journal of Software;2002-11
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHAO Ming1,SUN Lei2,ZHAO Hong3 (1.Department of Building Engineering,Tongji University,Shanghai 200092,China;2.East China Architecture Design & Research Institute Co.,Ltd.,Shanghai 200002,China;3.Shanghai City Real Estate Science Research Institute,Shanghai 200031,China);Fuzzy comprehensive evaluation method for structural safety performance of existed glass curtain wall(Ⅱ)[J];Sichuan Building Science;2008-06
2 HE Ru-hai~1,YE Yi-guang~2(1.Academic Administration Office,Anhui Agricultural University,Hefei 230036;2.School of Public Administration,Nanjing Agricultural University,Nanjing 210095);Synthetic evaluation of urban traffic eco-environment based on fuzzy theory[J];Journal of Anhui Agricultural University;2006-03
3 ZHANG Xue?dong 1,ZHONG Xue?jun 2 JIANG Hong?zhou 3,KOU Xiao?jun 4p (1.Dept. of Electric Engineering,Anshan Institute of I. & S. Technology,Anshan 114002,Chian;2.Anshan Machinery & Electron Environmental Protection Group,Anshan 114031,China;3.Inf;Fuzzy Compensation on Nonlinear Gray of Image[J];JOURNAL OF ANSHAN INSTITUTE OF IRON AND STEEL TECHNOLOGY;1999-06
4 WANG Ping1,WANG Xue-feng2,WU Gu-feng1(1.Guangdong Institute of Textile Technology,Foshan 528041,China;2.Normal School,Shihezi University,Shihezi 832003,China);Evaluation of synthetic qualtiy of vocational college graduate based on variable weights and fuzzy comprehensive variable weights[J];Journal of Anshan University of Science and Technology;2007-06
5 LIU Shu-dong, GUAN Qun (School of Computer Science, Sichuan University, Chengdu 610065, China; Staff Room of Campaign-Commanding, Mechanization Infantry Academy, Shijiazhuang 050083, China);Assignments Strategy of Artillery Firepower Based on Genetic Algorithms[J];Ordnance Industry Automation;2005-05
6 ZHANG Yi (Dept. of Control Engineering, Naval Aeronautical Engineering Academy, Yantai 264001, China);Maintenance Manner Decision-Making for Equipment Based on Partitioning Importance[J];Ordnance Industry Automation;2005-06
7 Li Ganxiang; Yang Chengwu (Nanjing University of Science & Technology, Nanjing, 210094);A FUZZY NEURAL PETRI NET MODEL FOR MULTISENSOR DATA FUSION[J];ACTA ARMAMENTARII;1998-03
8 Huang Jingde Wang Xinggui Wang Zuguang (Ordnance Engineering College);A STUDY OF EQUIPMENT FAULT FORECASTING MODEL BASED ON FUZZY JUDGING[J];Acta Armamentarii;2001-04
9 Lu Guangshan (College of Automation Engineering, University of Aeronautics & Astronautics, Beijing ,100083) Jiang Changsheng Geng Yanluo (College of Automation Engineering, Nanjing University of Aeronautics & Astronautics);ADAPTIVE FUZZY CONTROL OF HIGH ACCURACY AIRBORNE OPTICAL-ELECTRONIC TRACKING SYSTEM[J];Acta Armamentarii;2002-04
10 L Xu-liang, LIN Wei, XU Wei-dong, PAN Yu-long, SUN Wen-yan(Engineering Institute of Engineering Corps, PLA University of Science and Technology, Nanjing, Jiangsu 210007, China);Applying the Fuzzy Clustering Analysis of ISODATA to the Classification of Camouflage Effectiveness[J];Acta Armamentarii;2005-05
China Proceedings of conference Full-text Database 10 Hits
1 Xue-yong Zhang~(1,2) Ji-ru Meng~(1,2) De-qing Li~3 1 School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China 2 Shijiazhuang Mechanized Academy,Sijiazhuang 050083,China 3 Dept.of Basic Courses,Ordnance Engineering College,Shijiazhuang 050003,China;Improvement of the Interval Number Multiple Attribute Decision Making Model[A];[C];2008
2 HUANG Jing-li WANG Chang ming WANG Gang-cheng ZHANG Cheng-jie (College of Construction Engineering,Jilin University,Changchun 130026,China));APPLICATION OF FUZZY COMPREHENSIVE EVALUATION METHOD IN RISK DEGREE DETERMINATION FOR ICE-LAKE OUTBURST—AN EXAMPLE OF LUOZHA COUNTY IN TIBET[A];[C];2005
3 Wang Fulin Wang Jiquan Wu changyou Yang hui (Northeast Agricultural University);The Improved Research on Real-Coded Genetic Algorithms[A];Chinese Society of Agricultural Engineering[C];2005
4 Zhang Liyi Kang Yanqi Li Qiang Teng Jianfu School of Electronic Information Engineering,Tianjin University,Tianjin,China,300072 Colleget of Information Engineering,Taiyuan University of Technology,Taiyuan,Shanxi,030024;Research of Forward Neural Network Blind Equalization Algorithm Based on Variable Step-Size Unlinearly Controlled by Mean Square Error[A];[C];2006
5 Tian Chi~1,Lu Peiyin~2 (1 Engineering Quality Superintendence Department of Jinzhou City,Jinzhou 12000 China)(2 Dalian University of Technology,Dalian 116024 China);DECISION STUDY OF MULTIOBJECTIVE FUZZY OPTIMUM CHOICE ON DEEP FOUNDATION BRACING PROGRAM[A];[C];2000
6 Zhou Keping (Changsha Institute of Mining Research,Changsha 410012 China);SELF-ADAPTIVE SIMULATED ANNEALING MODEL OF CLUSTERING ANALYSIS FOR THE STABILIZATION CLASSIFICATION OF UNDERGROUND WORKS[A];[C];2000
7 MI Chuan-jun LI Zhi-xiang (School of Management and Economics,Beijing Institute of Technology,Beijing 100081,China);Performance Appraisal inside an Enterprise Group Based on Fuzzy Comprehensive Evaluation[A];[C];2005
8 Yang Xiaoli (Xidian University, Computer College ,710071, Ma Yuxiang (Xidian University, Computer college, 710071,;Representation of Fuzzy Knowledge and Its Application in Machine Learning[A];[C];1998
9 Zhu Wenbiao Sun Zengqi Chang Ji Department of Computer Science and Technology, Tsinghua University; State Key Laboratory of Intelligent Technology and Systems, Beijing 100084 Department of Electrical Engineering, Inner Mongolia Polytechnic University, Huhhot 010062;Fuzzy Inference and Complex Process Modeling[A];[C];1999
10 Hai-jing WANG College of Aerospace Engineering,Nanjing University of Aeronautics & Astronautics, 29 Yudao Street,Nanjing,Jiangsu 210016,China Shi-feng XUE College of Architecture & Storage Engineering,China University of Petroleum, 271 Beier Street,Dongying,Shandong 257061,China;PREDICTION OF EFFECT OF STEAM STIMULATION BASED ON A FUZZY COMPREHENSIVE EVALUATION MODEL[A];[C];2008
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 DENG Zhihong TANG Shiwei ZHANG Ming YANG Dongqing CHEN Jie (Department of Computer Science and Technology,National Laboratory on Machine Perception,Peking University,Beijing,100871);Overview of Ontology[J];Acta Scicentiarum Naturalum Universitis Pekinesis;2002-05
2 Liu Yuntong; Hu Jiangbi (College of Architecture and Civil Engineering, Beijing Polytechnic University, Beijing 100022 );A Methematical Model and 'Its Parameters Estimation for Fuzzy Evaluation[J];Journal of Beijing Polytechnic University;2001-01
3 Liu Hailong Zhang Qishan Wu Jinpei(Dept. of Electronic Engineering,Beijing University of Aeronautics and Astronautics);Trust Issues in PGP and Solutions[J];Journal of Beijing University of Aeronautics and Astronautics;2003-03
4 He Rui Niu Jianwei Hu Jianping(School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China);Modeling trust with uncertainty for open networks[J];Journal of Beijing University of Aeronautics and Astronautics;2004-11
5 Zhang Rongqing Li Jianxin Huai Jinpeng(School of Computer Science and Technology,Beijing University of Aeronautics and Astronautics,Beijing 100083,China);Secure trust negotiation system for grid computing[J];Journal of Beijing University of Aeronautics and Astronautics;2006-03
6 LIU Yu-long~1,CAO Yuan-da~2 (1.Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China; 2.School of Computer Software, Beijing Institute of Technology, Beijing100081, China);Subjective Trust Model in Distributed Network[J];Journal of Beijing Institute of Technology;2005-06
7 LIU Jie, WANG Chun-meng, FAN Chun-xiao (Electronic Engineering School,Beijing University of Posts and Telecommunications,Beijing 100876, China);Mobile E-commerce and WPKI Technology[J];Journal of Beijing University of Posts and Telecommunications;2002-02
8 TIAN Chun-qi,ZOU Shi-hong,WANG Wen-dong,CHENG Shi-duan (State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);Building an Attack Resistant Trust Management Model for Distributed P2P Systems[J];Journal of Beijing University of Posts and Telecommunications;2007-03
9 WANG Huan,GUO Yujin(School of Humanities,Law & Economics ,BUPT ,Beijing 100876,China);Community in cyberspace and its features in intercourse[J];Journal of Beijing University of Posts Telecommunications;2003-04
10 ZHAO Yue,MU Zhi-chun(School of Information Engineering,University of Science and Technology Beijing,Beijing 100083,China);A TELECOM CLIENTS' CREDIT SCORING MODEL BASED ON MBBC ALGORITHM[J];Journal of Beijing Technology and Business University(Natural Science Edition);2006-03
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Shaomin1,2, LI Peiying2, WANG Baoyi2(1.School of Computer, Xidian University, Xi’an 710071 China;2.Department of Computer, North China Electric Power University, Baoding Hebei 071003,China);Trustworthiness-Based Matchmaking Tradeoff Model Minimizing Risk[J];Journal of Beijing Jiaotong University;2008-06
2 GENG Xiuhua1,HAN Zhen1,JIN Li2,PENG Shuanghe1(1.School of Computer and Information Technology,Beijing Jiaotong University, Beijing 100044,China;2.Department of Computer,Taiyuan Normal University,Taiyuan 030012,China);Application of Trusted Computing Platform in Trust Management[J];Journal of Beijing Jiaotong University;2009-02
3 ZHANG Xing-lan~1 NIE Rong~2 (1.College of Computer Science and Technology,Beijing University of Technology Department of Compter Science,Beijing 100022,China; 2.Zhengzhou Institute of Aeronautical Industry Management,Zhengzhou 450015,China);A Self-government Model for Peer-to-peer Trust Management[J];Journal of Beijing University of Technology;2008-02
4 YANG Dong-hao,JIANG Wen-bao(School of Information Management,Beijing Information Science and Technology University,Beijing 100192,China);Research of trust management model for distributing condition[J];Journal of Beijing Institute of Machinery;2008-02
5 WANG Shaojie,CHEN Hongsong,ZHENG Xuefeng,CHU Lijun,YU Zhen,WANG XiongbinSchool of Information Engineering,University of Science and Technology Beijing, Beijing 100083,China;An improved DyTrust trust model[J];Journal of University of Science and Technology Beijing;2008-06
6 LIU Ming-hui1,XIN Yang1,YANG Yi-xian1,LI Zhong-xian1,2(1.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Beijing Research and Development Center,Tianjin National Cybernet Security Limited,Beijing 100088,China);A Card-not-Present Payment System Using Direct Anonymous Attestation Mechanism[J];Journal of Beijing University of Posts and Telecommunications;2008-04
7 LUO Xin1-3,YANG Yi-xian1-3,HU Zheng-ming1-3,SU Zhi-yuan4(1.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Key Laboratory of Network and Information Attack and Defence Technology,Ministry of Education,Beijing University of Posts and Telecommunications,Beijing 100876,China;3.National Engineering Laboratory for Disaster Backup and Recovery,Beijing University of Posts and Telecommunications,Beijing 100876,China;4.School of Automation,Beijing University of Posts and Telecommunications,Beijing 100876,China);Trust-Management Framework in Open Network[J];Journal of Beijing University of Posts and Telecommunications;2009-01
8 HAN Feng-ying1,2,ZHU Cong-xu2,3(1.Changsha Aeronautical Vocational and Technical College,ChangshaHunan410124;2.School of Information Science and Engineering,Central South University,ChangshaHunan410083;3.Guangdong Province Key Lab of Electronic Commerce Market Application Technology,GuangzhouGuangdong510320);Overview on Digital Watermarking Technology[J];Journal of Changsha Aeronautical Vocational and Technical College;2008-02
9 YIN Ye-qing(The Business School,Guangxi University for Nationalities,Nanning 530006,China);A Novel Trust Model for Peer-to-Peer Network[J];Computer Knowledge and Technology;2006-08
10 TIAN Ying1,2 (1.Suzhou University,Suzhou 215006,China;2,Suzhou Institute of Trade and Commerce,Suzhou 215009,China);Research of P2P Security Based on Recommend Trust[J];Computer Knowledge and Technology(Academic Exchange);2007-18
China Proceedings of conference Full-text Database 6 Hits
1 ZHANG Lin WANG Ru-chuan WANG Hai-yan WANG Yang (College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China);Research of the Trusted Mechanism Based on Subjectivity and Objectivity in Grid Environment[A];[C];2008
2 ZUO Chao-shu, QING Yu (State Key Laboratory for Modern Communications, Chengdu Sichuan 610041, China);Trusted Computing Architecture in Information System[A];[C];2007
3 YUAN Feng-shou YUAN Jia-bin College of Information Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China;The Study on the Trust Model in Grid Computing Security[A];[C];2008
4 OUYANG Zhi-you~(1,2),SHEN Su-bin~1 (1.The Institute of Information Network Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China; 2.Laboratory and Equipment Division,Nanjing University of Posts and Telecommunications,Nanjing 210003,China);The Design of P2P-Based Mobile Ad Hoc Internet Application Platform[A];[C];2009
5 HUANG Wen-ming,LAN Jing,ZHANG Yang (School of Computer and Control,Guilin University of Electronic Technology,Guilin 541004,China);Research on Grid Resource Scheduling Based on Improved Ant Colony Algorithm[A];[C];2009
6 HE Ming~(1,2) QIU Hang Ping~1 YANG Fei~1 LIU Yong~1 1 PLA Science and Technology University,Institute of Command Automation,Nanjing 210007 2 Information Science and Engineering Institute,Southeast University,Nanjing 210096;Research on Trustworthy Authentication Techniques Based on the Trustworthy Distributed System[A];[C];2008
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved