An Indirect Security Trust Method Based on Credibility Evaluation
نویسندگان
چکیده
In existing trust models, the recommending services often provide a single trust value (computed by them during their interaction with the unknown entity in question) as a recommendation. However, a single trust value recommended by a recommender represents its subjective opinion about the unknown entity and cannot depict the real trust level very well under certain circumstances. To solve this problem, a fuzzy based credibility evaluation method for indirect trust computation is proposed. The calculation method cannot just incorporate a mechanism to determine the weight each valid recommendation should carry on aggregation process, but also distinguish between honest and dishonest recommendations in the meantime. Subject Categories and Descriptors: K.6.5 [Security and Protection]; H.5 [Information Interfaces and Presentation] ; Evaluation General Terms: Trust, Security, Security Evaluation
منابع مشابه
A security authentication method based on trust evaluation in VANETs
Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes...
متن کاملOnline Trust and Health Information Websites
This study develops and tests a model of online trust of a health care website. The model showed a statistically strong fit to the data (N=176). Trust was significantly explained by perceptions of credibility, ease of use, and risk. Perceived ease of use was a direct predictor of trust and an indirect predictor through credibility. Credibility was both a direct predictor of trust and an indirec...
متن کاملAHP Techniques for Trust Evaluation in Semantic Web
The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...
متن کاملTrust Evaluation Method for the Perceptive Credibility of Tenants in the Cloud Platform
The malicious usage of the cloud platform, untrusted providers, and untrusted perception from the users all contribute to the difficult application of the cloud services. In order to solve these issues, a trust evaluation method of the cloud service based on user perception is proposed. Based on fuzzy set theory, the behaviors of nodes in the cloud platform are quantitated, and the trust values...
متن کاملDeveloping Secure Agent Systems Using Delegation Based Trust Management
We present an approach to some security problems in multi-agent systems based on distributed trust and the delegation of permissions, and credibility. We assume an open environment in which agents must interact with other agents with which they are not familiar. In particular, an agent will receive requests and assertions from other agents and must decide how to act on the requests and assess t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JDIM
دوره 12 شماره
صفحات -
تاریخ انتشار 2014