Trust Model of Users' behavior in Trustworthy Internet

被引:9
作者
Li Wen [1 ]
Ping Lingdi [1 ]
Lu Kuijun [1 ]
Chen Xiaoping [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310003, Zhejiang, Peoples R China
来源
2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I | 2009年
关键词
network security; trust evaluation; recommender; credibility; trust model;
D O I
10.1109/ICIE.2009.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As traditional network security cannot meet the security requirements, the international research shows that network security is on the way to Trustworthy Internet and that the trustworthy issue becomes a hot topic in the future Internet. Trust evaluation of users' behavior is an important part of Trustworthy Internet and a rational trust model plays a key role in the evaluation. This paper concludes many principles of the trust model by analyzing existing trust models and proposes a novel trust model including both the direct and indirect trust. In our model, the direct trust is more trustworthy and is weighted more with the more and more interactions and the indirect evaluation becomes less and less important. The subjective factor is considered to make the direct trust obey the principle of "rise-lowly, decline-quickly". Furthermore, recommenders' credibility is taken into account in the indirect trust evaluation, which can avoid the denigration and make indirect trust more objective. We also consider the process of referral of the credibility to gain more information to evaluate the indirect trust effectively. Credibility evaluation is the basis of the filtering of low credibility and the improvement of trust evaluation. Finally, several experiments are shown to illustrate the properties of the model.
引用
收藏
页码:403 / 406
页数:4
相关论文
共 6 条
[1]  
Chung Tien Nguyen, 2007, 2007 IEEE International Conference on Research, Innovation and Vision for the Future, P144
[2]  
Lin Chuang, 2005, Chinese Journal of Computers, V28, P751
[3]  
TIAN LQ, 2006, P INT C COMM TECHN I, P5, DOI DOI 10.1109/ICCT.2006.342023
[4]  
TIAN LQ, 2006, P INT C COMM TECHN N, P1, DOI DOI 10.1109/ICCT.2006.342024
[5]  
Wang Y, 2003, IEEE/WIC INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, P372
[6]  
YAN W, 2005, P IEEE INT C SERV CO, P24, DOI DOI 10.1109/SCC.2005.104