An Indirect Security Trust Method Based on Credibility Evaluation

نویسندگان

  • Xianghe Wei
  • Hong Zhang
  • Zhen Liu
  • Qianmu Li
  • Bin Xia
چکیده

In existing trust models, the recommending services often provide a single trust value (computed by them during their interaction with the unknown entity in question) as a recommendation. However, a single trust value recommended by a recommender represents its subjective opinion about the unknown entity and cannot depict the real trust level very well under certain circumstances. To solve this problem, a fuzzy based credibility evaluation method for indirect trust computation is proposed. The calculation method cannot just incorporate a mechanism to determine the weight each valid recommendation should carry on aggregation process, but also distinguish between honest and dishonest recommendations in the meantime. Subject Categories and Descriptors: K.6.5 [Security and Protection]; H.5 [Information Interfaces and Presentation] ; Evaluation General Terms: Trust, Security, Security Evaluation

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A security authentication method based on trust evaluation in VANETs

Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes...

متن کامل

Online Trust and Health Information Websites

This study develops and tests a model of online trust of a health care website. The model showed a statistically strong fit to the data (N=176). Trust was significantly explained by perceptions of credibility, ease of use, and risk. Perceived ease of use was a direct predictor of trust and an indirect predictor through credibility. Credibility was both a direct predictor of trust and an indirec...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

Trust Evaluation Method for the Perceptive Credibility of Tenants in the Cloud Platform

The malicious usage of the cloud platform, untrusted providers, and untrusted perception from the users all contribute to the difficult application of the cloud services. In order to solve these issues, a trust evaluation method of the cloud service based on user perception is proposed. Based on fuzzy set theory, the behaviors of nodes in the cloud platform are quantitated, and the trust values...

متن کامل

Developing Secure Agent Systems Using Delegation Based Trust Management

We present an approach to some security problems in multi-agent systems based on distributed trust and the delegation of permissions, and credibility. We assume an open environment in which agents must interact with other agents with which they are not familiar. In particular, an agent will receive requests and assertions from other agents and must decide how to act on the requests and assess t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDIM

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2014