• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 22 Issue 1
Feb.  2009
Turn off MathJax
Article Contents
ZHANG Nan, ZHANG Jianhua, HE Weilin, YAN Chunyan. Integrated Trust Evaluation Model in Grid Environment[J]. Journal of Southwest Jiaotong University, 2009, 22(1): 32-35.
Citation: ZHANG Nan, ZHANG Jianhua, HE Weilin, YAN Chunyan. Integrated Trust Evaluation Model in Grid Environment[J]. Journal of Southwest Jiaotong University, 2009, 22(1): 32-35.

Integrated Trust Evaluation Model in Grid Environment

  • Received Date: 23 Oct 2007
  • Publish Date: 18 Feb 2009
  • To solve the security threaten due to in grid environment its instability and uncertainty,an integrated trust evaluation model was proposed to evaluate trust among grid nodes.In the model,a user describes trust with fuzzy logic,assigns weights to different attributes of a subject according to his concern degree,and considers historic communication record between him and concerned nodes as well as reputations of the nodes.Reputation of a node is dependent on a recommend coefficient that is determined according to the reliability of the recommender to avoid cheat from recommendation.An evaluation example was presented to show effectiveness of the model.

     

  • loading
  • AZZEDIN F,MAHESWARAN M.Evolving and managing trust in grid computing system[C]//Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE'02).Washington:IEEE Computer Society,2002:1424-1429.[2] SONG S,HWANG K,MACWAN M.Fuzzy trust integration for security enforcement in grid computing[C]//Proceedings of Network and Parallel Computing,LNCS 3222.Berlin:Springer,2004:9-21.[3] BETH T,BORCHERD[NG M,KLEIN B.Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security (ESORICS).Berlin:Springer,1994:3-18.[4] JOSANG A,KNAPSKOG S J.A metric for trusted systems[M]//Global IT Security.Vienna:Austrian Computer Sociey,1998:541-549.[5] LEI Hui,SHOJA G C.A distributed trust model for e-commerce applications[C]//Proceedings of IEEE International Conference on E-Technology,E-Commerce and E-Service (EEE'05).Washington DC:IEEE Computer Society,2005:290-293.[6] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.TANG Wen,HU Jiaubin,CHEN Zhong.Research on a fuzzy logic-basod subjective trust management model[J].Journal of Computer Research and Development,2005,42(10):1654-1659[7] 王晓峰,张璟,王尚平,等.网格计算系统中的综合信任评估[J].计算机工程,2006,32(22):40-42.WANG Xiaofeng,ZHANG Jing,WANG Shangping,et al.Integration trust evaluation in grid computation system[J].Computer Engineering,2006,32 (22):40-42.[8] 桂劲松,陈志刚,邓晓衡,等.基于模糊集理论的网格服务行为信任模型[J].小型微型计算机系统,2007,28(10):1779-1783.GUI Jinsong,CHEN Zhigang,DENG Xiaoheng,et al.Behavior trust model for grid services based on fuzzy sets theory[J].Journal of Chinese Computer Systems,2007,28 (10):1779-1783.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1514) PDF downloads(294) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return