• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
YUANXu, CAO Qi. Study on Safety Culture Management Mode[J]. Journal of Southwest Jiaotong University, 2000, 13(3): 323-326.
Citation: ZHANG Nan, ZHANG Jianhua, HE Weilin, YAN Chunyan. Integrated Trust Evaluation Model in Grid Environment[J]. Journal of Southwest Jiaotong University, 2009, 22(1): 32-35.

Integrated Trust Evaluation Model in Grid Environment

  • Received Date: 23 Oct 2007
  • Publish Date: 18 Feb 2009
  • To solve the security threaten due to in grid environment its instability and uncertainty,an integrated trust evaluation model was proposed to evaluate trust among grid nodes.In the model,a user describes trust with fuzzy logic,assigns weights to different attributes of a subject according to his concern degree,and considers historic communication record between him and concerned nodes as well as reputations of the nodes.Reputation of a node is dependent on a recommend coefficient that is determined according to the reliability of the recommender to avoid cheat from recommendation.An evaluation example was presented to show effectiveness of the model.

     

  • AZZEDIN F,MAHESWARAN M.Evolving and managing trust in grid computing system[C]//Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE'02).Washington:IEEE Computer Society,2002:1424-1429.[2] SONG S,HWANG K,MACWAN M.Fuzzy trust integration for security enforcement in grid computing[C]//Proceedings of Network and Parallel Computing,LNCS 3222.Berlin:Springer,2004:9-21.[3] BETH T,BORCHERD[NG M,KLEIN B.Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security (ESORICS).Berlin:Springer,1994:3-18.[4] JOSANG A,KNAPSKOG S J.A metric for trusted systems[M]//Global IT Security.Vienna:Austrian Computer Sociey,1998:541-549.[5] LEI Hui,SHOJA G C.A distributed trust model for e-commerce applications[C]//Proceedings of IEEE International Conference on E-Technology,E-Commerce and E-Service (EEE'05).Washington DC:IEEE Computer Society,2005:290-293.[6] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.TANG Wen,HU Jiaubin,CHEN Zhong.Research on a fuzzy logic-basod subjective trust management model[J].Journal of Computer Research and Development,2005,42(10):1654-1659[7] 王晓峰,张璟,王尚平,等.网格计算系统中的综合信任评估[J].计算机工程,2006,32(22):40-42.WANG Xiaofeng,ZHANG Jing,WANG Shangping,et al.Integration trust evaluation in grid computation system[J].Computer Engineering,2006,32 (22):40-42.[8] 桂劲松,陈志刚,邓晓衡,等.基于模糊集理论的网格服务行为信任模型[J].小型微型计算机系统,2007,28(10):1779-1783.GUI Jinsong,CHEN Zhigang,DENG Xiaoheng,et al.Behavior trust model for grid services based on fuzzy sets theory[J].Journal of Chinese Computer Systems,2007,28 (10):1779-1783.
  • Relative Articles

    [1]LIN Yongjun, QIU Xiujiao, GE Yudong. Fuzzy Comprehensive Evaluation Method for Masonry Structure Safety[J]. Journal of Southwest Jiaotong University, 2016, 29(6): 1214-1221. doi: 10.3969/j.issn.0258-2724.2016.06.023
    [2]LIU Yanhui, ZHAO Shichun, Manfred Keuser. Actions of Derailed Train on Structures in Eurocode:Impact Mechanism and Design Strategy[J]. Journal of Southwest Jiaotong University, 2014, 27(3): 444-449. doi: 10.3969/j.issn.0258-2724.2014.03.012
    [3]CHOU Wen-Ge, LI Jun-Song, HU Lan. WebGIS-Based Safety Risk Management System of Underground Engineering[J]. Journal of Southwest Jiaotong University, 2011, 24(6): 953-960. doi: 10.3969/j.issn.0258-2724.2011.06.011
    [4]YU Wangke, MA Wenping, CHEN Hefeng. Key Management Scheme for Clustered Wireless Sensor Networks[J]. Journal of Southwest Jiaotong University, 2011, 24(2): 310-314. doi: 10.3969/j.issn.0258-2724.2011.02.022
    [5]JI Xiaofeng, LIU Lan. Traffic Congestion Management Method Based on Case-Based Reasoning[J]. Journal of Southwest Jiaotong University, 2009, 22(3): 415-420.
    [6]YAO Yun, ZHU Jinfu. Early-Warning Model of Irregular Flight Management Based on Correlation Function in Extension Theory[J]. Journal of Southwest Jiaotong University, 2008, 21(1): 101-106.
    [7]LIU Gang, ZHU Jinfu. Grey Analysis of Airport Apron Safety[J]. Journal of Southwest Jiaotong University, 2008, 21(5): 600-604.
    [8]LI Bailin, HE Gang. Architecture of Collaborative Design System[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 80-83.
    [9]SHUAI Bin, DU Wen. DEA/PCA Evaluation of the Structures of Logistics Industry[J]. Journal of Southwest Jiaotong University, 2006, 19(5): 599-602.
    [10]YEXian-hui, YANG Yi-ren, LIUFei. Effects ofAsymmetricalParameters of Structure on StructuralFlutter Velocity[J]. Journal of Southwest Jiaotong University, 2005, 18(6): 779-783.
    [11]WANG Da-yong, MEIZhi-hong, JINWei-dong. Security Scheme forM obile Agent inM aliciousHosts[J]. Journal of Southwest Jiaotong University, 2005, 18(4): 505-509.
    [12]ZHANG Si-cai, ZHANG Fang-xiao. Application of Genetic Algorithms in Structural Optimization Design with Discrete Variables[J]. Journal of Southwest Jiaotong University, 2003, 16(2): 146-150.
    [13]YUANDing, FANPing-zhi. A Secure and Efficient Conference Key Distribution Scheme[J]. Journal of Southwest Jiaotong University, 2002, 15(4): 408-412.
    [14]FENG Jian, JINHong-yun. A Management Information System for Engineering Machinery[J]. Journal of Southwest Jiaotong University, 2002, 15(2): 158-162.
    [15]CHEN Guo, ZHAI Wan-ming, ZUO Hong-fu. Safety Management of Track Irregularities of 250 km/h High-Speed Railway[J]. Journal of Southwest Jiaotong University, 2001, 14(5): 495-499.
  • Created with Highcharts 5.0.7Amount of accessChart context menuAbstract Views, HTML Views, PDF Downloads StatisticsAbstract ViewsHTML ViewsPDF Downloads2024-042024-052024-062024-072024-082024-092024-102024-112024-122025-012025-022025-0302.557.51012.5
    Created with Highcharts 5.0.7Chart context menuAccess Class DistributionFULLTEXT: 30.2 %FULLTEXT: 30.2 %META: 69.8 %META: 69.8 %FULLTEXTMETA
    Created with Highcharts 5.0.7Chart context menuAccess Area Distribution其他: 3.7 %其他: 3.7 %上海: 0.8 %上海: 0.8 %兰州: 0.8 %兰州: 0.8 %北京: 3.3 %北京: 3.3 %台州: 0.4 %台州: 0.4 %张家口: 3.7 %张家口: 3.7 %成都: 0.4 %成都: 0.4 %扬州: 0.4 %扬州: 0.4 %武汉: 0.4 %武汉: 0.4 %池州: 0.8 %池州: 0.8 %漯河: 0.8 %漯河: 0.8 %芒廷维尤: 11.8 %芒廷维尤: 11.8 %西宁: 72.7 %西宁: 72.7 %其他上海兰州北京台州张家口成都扬州武汉池州漯河芒廷维尤西宁

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1539) PDF downloads(294) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return