用户名: 密码: 验证码:
信任评估模型及其方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着分布式网络技术的迅猛发展,对其安全管理技术也提出了新的要求。信任通过度量和评估节点间潜在的信任信息,为网络系统提供一种相对柔性的安全度量机制,目前已成为网络安全领域研究、开发和应用的热点。信任评估模型是信任评价体系的基础,由于信任本身的复杂性和不确定性,研究以信任度量节点的可信程度表示信任等级的高低,及构建高精度、低负担的信任评估模型仍然是一个具有挑战性的课题。本文从信任云表示的信任关系、全局信任的分布求解、基于资源属性的信任评估以及基于网格QoS的信任评估与资源调度这四方面入手,对信任评估模型的理论及其关键技术进行了研究,提出了一些新的信任评估模型和方法,旨在为分布式网络信任机制的推广应用提供技术支撑。
     首先针对当前信任评估模型普遍存在的度量合理性问题,通过对云理论模型的深入研究与扩展,提出了信任云的概念。采用云模型提取和描述主观信任信息,统一表达了信任关系中存在的随机性和模糊性以及两者之间的关联。并给出了信任云相似性度量算法,实现了基于信任云的网络服务安全决策。
     其次在深入研究全局信任机制的基础上,通过数学表述和分布求解协议的分析,构建了P2P环境下的全局信任模型。根据恶意节点在网络中可能存在的方式,模拟了多种类型恶意节点,分别以全面迭代和部分迭代两种分布求解算法对这些恶意节点类型进行仿真,并作了比较分析,以此作为评估两种算法适用环境的依据。全局信任模型获取的是节点的信誉,在相同的功能请求下,资源调度系统会选择网络中信誉最高的节点作为服务节点,这样会造成系统负载的不平衡以及新加入系统的节点无法获取服务机会等缺点。本文针对该问题,提出了基于信誉概率的资源调度算法,以节点的信誉作为服务选择的概率。实验结果证明了该算法在保证本文所提出的信任模型优势的前提下,合理平衡了网络负载,使新加入系统的节点也能获得服务机会。
     目前的主观信任模型以资源实体作为信任评估对象,以其信誉作为信任评估标准,没有考虑资源间交互的内容,这导致了信任模型粒度过于粗糙,在一些应用环境下难以实现精确的评估。本文提出了基于资源属性的信任评估模型,该模型根据信任关系的可传递性,将信任评估的粒度进一步细化,以资源的关联属性作为信任评估依据。克服了以往模型由于注重受信实体的信誉而导致评估对象单一的缺陷,实现了由关联属性量化资源信任度的目的。本文还列举了几种典型的信任情景并进行了仿真实验,实验结果及分析表明,本文提出的基于资源属性的信任评估模型在信任度量的准确度、模型结构的合理性以及模型的可扩展性等方面都取得了较好的效果。
     当前网格信任模型只把节点间的交易经验作为信任评估依据,忽略了对实体固有性能的评估,造成信任信息收集不全面、信任评估不细致等缺点。也导致信任模型无法充分利用网格基础架构的功能,信任机制与调度机制处于分离状态。本文最后分析了上述问题和目前网格QoS研究工作存在的缺陷,提出了一种基于网格QoS的信任评估及资源调度模型GRDM-Q。该模型以资源的QoS参数作为信任评估的依据,并以评估结果作为网格资源选择的重要依据,实现了信任机制和调度机制的有效融合。实验结果证明了GRDM-Q是一种网格环境下信任评估和资源调度的有效模型。
With the rapid development of the distributed network, new requirements are put forward to security management technology. Trust is a research focusing on present network security field which provides flexible safety measurement mechanism through the measurement and evaluation of trust information wrapped in network peers. As the base for trust evaluation mechanism, trust evaluation model studies how to assess and sort peers' reliability, however, construction of a highly precise trust evaluation model with low load is still challenging work due to the complexity and uncertainty of trust. This paper discusses theories and critical technologies of trust evaluation model from four perspectives including trust relationship described by trust cloud, distributed implementation of global trust, trust evaluation based on resource attribute and trust evaluation and resource management based on grid QoS, and presents some new trust evaluation models and methods. The purpose of our work is to provide supporting technologies for the popularization of trust mechanism in distributed networks.
     With regard to the rationality problem of existing trust evaluation models, we first carry out in-depth research on the cloud theory and come up with the concept of trust cloud. By using trust cloud to pick and describe subjective trust information, we describe in a unified manner the randomness and fuzziness in trust relation as well as their correlation. Algorithm of cloud similarity measurement is presented and decision-making through trust cloud on service security is also realized.
     Then based on further study of global trust mechanism, we present a global trust model in P2P environment through mathematic analysis and distributed implementation method. This paper provides two distributed implementation methods and experiment them with different types of malice peers described before. The experimental results are used as the basis for evaluating different network environment that the two methods can be applied. With the same resource requirements, resource management prefers to choose the highest reputation peer obtained by global trust models, which causes overload imbalance and failure of new peers serving the system. A novel resource scheduling algorithm based on the probability of peer reputation is proposed. It is shown via simulation that the algorithm achieves better performance on keeping overload balance and resisting attack of malice peers. At the same time, the new peers also obtain opportunity to serve the system.
     While most subjective trust models focus on entity-centered issues such as reputation, they do not model the content, ie the nature and use of the information being exchanged. Due to this problem, existing trust models fail to promise the trust computation of some special domains. According to the transferable property of trust relation, the paper proposes a novel fine-grained trust model which is based on resource attributes. Compared with prior trust models, the proposed model increases trust evaluation object. This paper simulates some use case scenarios and describes a simulation environment. Simulations show that compared with similar exising trust models, the proposed model is more accurate on trust evaluation and more reasonable and scalable on model architecture.
     At present, trust model in grid environment focuses on transaction experience while omitting the evaluation of peers' proper property. This situation indicates that the trust information between peers cannot be sufficiently collected and the trust evaluate result is not precise. Moreover, existing models cannot make full use of grid computing fundamental architecture, and trust mechanism and resource management mechanism are isolated. Addressing above problems and those in present grid QoS research work, This paper presents a novel trust evaluation and resource scheduling model GRDM-Q. This model evaluates trust on the basis of resources' QoS and uses the evaluation results as the most important factor for selecting resource, which realizes the integration of trust mechanism and resource management mechanism. Experments show that the new model is an effective approach to evaluate trust and manage resource in grid environment.
引文
[1].Michael M.Space science studies come to the internet.Aviation Week & Space Technology.1998.6.59-66.
    [2].Saroiu S,Gummadi PK,Gribble SD.A measurement study of peer-to-peer filesharing systems.Proceedings of Multimedia Computing and Networking.IEEE Soci- ety Press,2002.50-59.
    [3].Agrawal A,Casanova H.Clustering hosts in p2p and global computing platforms.Third International Workshop on Global and Peer-to-Peer Computing on Large Scale Distributed Systems.ACM Press,Tokyo,2003.5.367-343.
    [4].Marsh S.formalising trust as a computational concept.PhD Thesis.Scotland University of Stirling,1994.
    [5].Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.Proceedings of the 17th Symposium on Security and Privacy.Oakland,CA:IEEE Computer Society Press,1996.164-173.
    [6].Wang Y,Vassileva J.Bayesian network-based trust model.Proceedings of IEEE/ WIC International Conference on Web Intelligence (WI'2003).Halifax,Canada,2003.372-378.
    [7].Rasmusson L,Jansson S.Simulated social control for secure internet commerce.Proceedings of the 1996 New Security Paradigms Workshop.ACM,1996.
    [8].Azzedin F,Maheswaran M.Evolving and managing trust in grid computing system.Proceedings of the 2002 IEEE Canadian Conference on Electrical and Computer Engineering.Washington:IEEE Computer Society Press,2002,1(1):1-42.
    [9].Abdul-Rahman A,Hailes S.Supporting trust in virtual communities.Hawaii International Conference on System Sciences,Maui,Hawaii.2000.
    [10].Mui L,Mohtashemi M,Halberstadt A.A computational model of trust and reputation.Proceedings of the 35th Hawaii International Conference on System Sciences,Big Island,Hawaii,January 2002.
    [11].Gupta R,Somani AK.Reputation management framework and its use as currency in large-scale Peer-to-Peer networks.Proceedings of IEEE International Conference on Peer-to-Peer Computing,Zurich,Switzerland,July 2004.
    [12].J(?)sang A,Ismail R,Boyd C.A Survey of trust and reputation systems for online service provision.http://security.dstc.edu.au/papers/JIB2005-DSS.pdf.
    [13].Blaze M,Feigenbaum J,loannidis J,et al.The role of trust management in distributed systems security.Secure Internet Programming:Issues for Mobile and Distributed Objects.Berline:Springer-Verlag,1999.185-210.
    [14].Blaze M,Feigenbaum J,Keromytis AD.Keynote:Trust management for public key infrastrctures.Cambridge 1998 Security Protocols International Workshop.Berlin:Springer-Verglag,1999.59-63.
    [15].Chu YH,Feigenbaum J,LaMacchia B,et al.REFEREE:trust management for web applications.World Wide Web Journal,1997,2(2):127-139.
    [16].Gambetta D.Can we trust trust ? Trust:Making and Breaking Cooperative Relations.Basil Blackwell:Oxford Press,1990.213-237.
    [17].Abdul-Rahman A,Hailes S.A distributed trust model.Proceedings of the 1997 New Security Paradigms Workshop.Cumbria,UK:ACM Press,1998.48-60.
    [18].Marsh S.Optimism and pessimism in trust.Proceedings of the Ibero-American Conference on Artificial Intelligence(IBERAMIA'94).1994.
    [19].Teng Y,Phoha V,Choi B.Design of trust metrics based on dempstershafer theory.http://cites- eer.nj.nec.com/461538.html.
    [20].Shafer G.A Mathematical Theory of Evidence.Princeton NJ:Princeton University Press,1976.
    [21].Ginsberg M.Non-monotonic reasoning using dempster's rule.Proceedings of the AAAI-84,1984.125-129.
    [22].Manchala DW.Trust metrics,models and protocols for electronic commerce transaction.18th International Conference on Distributed Computing Systems,1998.3-12.
    [23].Malaga RA.Web based reputation management systems:problems and suggested solutions.Electronic Commerce Research,1(4),2001.
    [24].Resnick P,Zeckhauser R,Friedman E,et al.Reputation Systems.Comm ACM,43 (12),2000.
    [25].Dellarocas C.The digitization of world-of-mouth:promise and challenges of online reputation mechanism.Management Science,49(10),2003.
    [26].Kazaa.http://www.kazaa.com/.
    [27].Pujol J,Sanguesa R,et al.Extracting reputation in multi agent systems by means of social network topology.First International Joint Conference on Autonomous Agents and MultiAgent Systems.Bologna,Italy,2002.
    [28].eBay,http://www.ebay.com/
    [29].eBay Feedback Forum.http://pages,ebay.com/services/forum/feedback.html?ssPa-geName=STRK
    [30].Dellarocas C.Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior.Proceedings of the 2nd ACM Conference on Electronic Commerce.2000.
    [31].Beth T,Borcherding M,Klein B.Valuation of Trust in open network.Proceedings of the European Symposium on Research in Security (ESORICS).Brighton:Springer-Verlag,1994 ,3-18.
    [32].Abdul-Rahman A.The PGP trust model.1996.http://www.cs.ucl.ac.uk/staff/ F.AbdulRahman/docs/pgptrust.html.
    [33].J(?)sang A.The right type of trust for distributed systems.Proceedings of the 1996 New Security Paradigms Workshop.Lake Arrowhead,CA:ACM Press,1996.
    [34].J(?)sang A.A model for trust in security systems.Proceedings of the2nd Nordic Workshop on Secure Computer Systems.1997.
    [35].J(?)sang A..A Subjective Metric of Authentication.Proceedings of the ESORICS'98.Louvain-la-Neuve:Springer-Verlag,1998,329-344
    [36].Choon HD,Sarana N,Rajkumar B.P2P networks for content sharing.Technical Report,GRIDS-TR-2003-7,Grid Computing and Distributed Systems Laboratory,University of Melbourne,Australia,December 2003.
    [37].Foster I,Kesselman C,Nick J.Grid services for distributed system integration.IEEE Computer,2002,35(6):37-46.
    [38].Perkins CE.Ad Hoc Networking.London:Addison-Wesley,2001.
    [39].徐光祐,史元春,谢伟凯.普适计算.计算机学报.2003,26(9):1042-1050.
    [40].Tilak S,Abu-Ghazaleh NB,Heinzelman W.A taxonomy of wireless micro-sensor network models.Mobile Computing and Communications Review,2002,1(2):1-8.
    [41].Almenarez F,Marin A,Diaz D,et al.Developing a model for trust management in pervasive devices.Proceedings of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security (PerSec 2006).Washington: IEEE Computer Society Press,2006.267-272.
    [42].Almenarez F,Marin A,Campo C,et al.PTM:A pervasive trust management model for dynamic open environments.Proceedings of the 1st Workshop on Pervasive Security,Privacy and Trust.Boston,2004.http://jerry.c-lab.de/ubisec/publications/PSPT04_PTM.pdf.
    [43].Almenarez F,Marin A,Campo C,et al.TrustAC:Trust-Based access control for pervasive devices.LNCS 450.Berlin:Springer-Verlag,2005.225-238.
    [44].Jameel H,Hung LX,Kalim U,et al.A trust model for ubiquitous systems based on vectors of trust values.Proceedings of the 7th IEEE International Symposium on Multimedia.Washington:IEEE Computer Society Press,2005.674-679.
    [45].Theodorakopoulos G,Baras JS.On trust models and trust evaluation metrics for ad-hoc networks.IEEE Journal on Selected Areas in Communications,2006,24(2):318-328.
    [46].Theodorakopoulos G.Distributed trust evaluation in ad-hoc networks[MS Thesis].2004.http://www.isr.umd.edu/~baras/publications/dissertations/2OO4/Theodorak-opoulos _MS_2004-2.pdf.
    [47].Sun Y,Yu W,Han Z,et al.Information theoretic framework of trust modeling and evaluation for ad hoc networks.IEEE Journal on Selected Areas in Communications ,Selected Areas in Communications,2006,249(2):305-319.
    [48].Sun Y,Yu W,Han Z,et al.Trust modeling and evaluation in ad hoc networks.Proceedings of the Global Telecommunications Conference Globecom 2005.Washington:IEEE Computer Society Press,2005.541-552.
    [49].Melaye D,Demazeau Y.Bayesian dynamic trust model.LNCS 3690.Berlin:Springer-Verlag,2005.480-489.
    [50].Song S,Hwang K.Fuzzy trust integration for security enforcement in grid computing.Proceedings of the International Symposium on Network and Parallel Computing(NPC 2004).LNCS 3222,Berlin:Springer-Verlag,2005.9-21.
    [51].窦文.信任敏感的P2P拓扑构造及相关技术研究[博士学位论文].长沙:国防科学技术大学,2003.
    [52].Aberer K,Despotovic Z.Managing trust in a peer-to-peer information system.In:2001 ACM CIKM International Conference on Information and Knowledge Management,2001.
    [53].Xiong L,Liu L.A reputation-based trust model for P2P ecommerce communities.IEEE Conference on E-Commerce(CEC'03).Newport Beach,California,275-284,2003.
    [54].Xiong L,Liu L.PeerTrust:Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities.IEEE Trans.Knowl.Data Eng.16(7):843-857,2004.
    [55].Wang Y,Vassileva J.Bayesian network trust model in peer-to-peer networks.Proceedings of the 2nd International Workshop on Agents and Peer-to-Peer Computing.Berlin:Springer-Verlag,2004.23-34.
    [56].Damiani E,Vimercati DC,Paraboschi S,et al.A Reputation-Based Approach for Choosing Reliable Resource in Peer-to-Peer Networks.Proceedings of the 9th ACM conference on computer and communications security.ACM Press,2002.207-216.
    [57].Cornelli F,Damiani E,Vimercati DC,et al.Choosing reputable servents in a P2P network Proceedings of the 11th International World Wide Web Conference.Hawaii:ACM Press,2002,441-449.
    [58].Yu B,Singh MP.A Social Mechanism of Reputation Management in Electronic Communities.Proceedings of the 4th International Workshop on Cooperative Information Agents,2000,154-165.
    [59].Kamvar SD,Schlosser MT,Garcia-Molina H.The eigentrust algorithm for reputation management in P2P networks.Proceedings of the 12th International World Wide Web Conference.Budapest:ACM Press,2003.640-651.
    [60].窦文,王怀民,贾焰等.构造基于推荐的Peer-to-Peer环境下的Trust模型.软件学报,2004,15(4):571-583.
    [61].李景涛,荆一楠,肖晓春等.基于相似度加权推荐的P2P环境下的信任模型.软件学报,2007,18(1):157-167.
    [62].Duma C,Shahmehri N.Dynamic trust metrics for peer-to-peer system.Proceedings.of the 16th International Workshop on Database and Expert Systems Applications(DEXA 2005).Washington:IEEE Computer Society Press,2005.776-781.
    [63].Kaelbling LP,Littman ML,Moore AW.Reinforcement learning:A survey.Journal of Artificial Intelligence Research,1996,4:237-285.
    [64].Haveliwala T,Kamvar SD.The Second Eigenvalue of the Google Matrix.Technical Report,Standford University,2003.
    [65].Amazon.http://www.amazon.com
    [66].田春岐.P2P网络信任模型的研究[博士学位论文].北京:北京邮电大学,2007.
    [67].Pearl J.The handbook of brain theory and neural networks.MIT Press.1998:149-153.
    [68].Pearl J.Artificial Intelligence.Elsevier Science Publishers Ltd.1986:241-288.
    [69].J(?)sang A,Ismail R.The beta reputation system.Proceedings of the 15th Bled Electronic Commerce Conference,June 2002.
    [70].Wang Y,Vassileva J.Trust and Reputation Model in Peer-to-Peer Networks.Proceedings of the 3th International Conference on Peer-to-Peer Computing (P2P'03),IEEE,September 01-03,2003.
    [71].Gnutella.http://www.gnutella.com/
    [72].Cahill V,Gray E,Seigneur JM,et al.Using Trust for Secure Collaboration in Uncertain Environments.Pervasive Computing,2(3):52-61,July-September 2003.
    [73].Sabater J,Sierra C.Reputation and social network analysis in multi-agent systems.First International Joint Conference on Autonomous Agents and Multi-Agent Sysms,,Bologna,Italy,2002.
    [74].Song S,Hwang K,Zhou RF.Trusted P2P Transactions with Fuzzy Reputation Aggregation.IEEE Internet Computing,18-28,2005.
    [75].唐文,陈钟.基于模糊集合理论的主观信任管理模型研究.软件学报.2003,14(8):1401-1407.
    [76].Yu B,Singh MP,Sycara K.Developing Trust in Large-Scale Peer-to-Peer Systems.Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Surviablility,,Philadepllia,2004.
    [77].朱峻茂,杨寿保,樊建平等.Grid与P2P混和计算环境下基于推荐证据推理的信任模型.计算机研究与发展,2005,42(5):797-803.
    [78].J(?)sang A.Trust-Based Decision Making for Electronic Transactions.Proceedings of the 4th Nordic Workshop on Secure Computer Systems(NORDSEC'99).Stockholm University,Sweden,1999.
    [79].Yamamoto A,Asahara D,Itao T,et al.Distributed Pagerank:A distributed reputation model for open P2P networks.Proceedings of the 2004 International Symposium on Applications and the Internet Workshop(SAINTW'04),2004.
    [80].J(?)sang A.An algebra for assessing trust in certification chains.Proceedings of the Network and Distributed Systems Security Symposium.1999.
    [81].Caronni G.Walking the Web of trust.Proceedings of the IEEE 9th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises..IEEE Press,2000.153-159.
    [82].Povey D.Developing electronic trust policies using a risk management model.Proceedings of the 1999 CQRE Congress.1999.1-16.
    [83].Abdul-Rahman A,Hailes S.Using recommendation for managing trust in distributed systems.Proceedings of the IEEE Malaysia International Conference on Communication'97(MICC'97).Kuala Lumper:IEEE Press,1997.http://citeseer.nj.nec.com/360414.html.
    [84].Manchala DW.E-Commerce Trust Metrics and Models.IEEE Internet Computing,2000.
    [85].李德毅,刘常昱等.不确定性人工智能.软件学报.2004,15(11):1583-1594.
    [86].李德毅,孟海军,史雪梅.隶属云和隶属云发生器.计算机研究与发展.1995,32(6):16-21.
    [87].邸凯昌.空间数据发掘与知识发现.武汉:武汉大学出版社,2001:42-77.
    [88].李德毅,刘常昱.论正态云模型的普适性.中国工程科学.2004,6(8):28-34.
    [89].刘常昱,冯芒,戴晓军等.基于云X信息的逆向云新算法.系统仿真学报.2004,16(11):2417-2421.
    [90].李德毅,杜鹢.不确定性人工智能.北京:国防工业出版社,2005.
    [91].宋远骏,杨孝宗,李德毅等.多机多任务实时系统云调度策略.计算机学报.2000,23(10):1107-1113.
    [92].徐锋,吕建,郑玮等.一个软件服务协同中信任评估模型的设计.软件学报,2003,14(6):1043-1051.
    [93].王远,吕建,徐锋等.一个适用于网构软件的信任度量及演化模型.软件学报.2006,17(4):682-690.
    [94].张勇,赵东宁,李德毅.相似云及其度量分析方法.信息与控制.2004,33(2):129-132.
    [95].Oram A.Peer-to-Peer:Harnessing the Power of Disruptive Technology.Sebas-topol :O'Reilly Press,2001,222-238.
    [96].Zhang Q,Sun Y,Liu Z,et al.Design of a P2P-based grid content management architecture.Proceedings of the 3rd Communication Networks and Services Research Conference.New York:IEEE Press,2005.339-344.
    [97].郑纬明,胡进锋,代亚非等.对等计算研究概论.技术发展年度报告.中国计算机学会,2004.http://www.ccf.org.cn.
    [98].Milojicic DS,Kalogeraki V,Lukose R,et al.Peer-to-Peer Computing.HP Laboratories Palo Alto,Technical Report,HPL-2002-57,2002.
    [99].Adar E,Huberman B.Free riding on Gnutella.Technical Report,CSL-00-3,Palo Alto:Xerox PARC,2000.
    [100].Wasserman S,Faust K.Social network analysis:methods and applications.Cambridge University Press.1994.
    [101].Buragohain C,Agrawal D,Suri S.A Game Theoretic Framework for Incentives in P2P Systems.Proceedings of the Third International Conference on Peer-to-Peer Computing(P2P'03).IEEE Press,2003.48-56.
    [102].Lee S,Sherwood R,Bhattacharjee B.Cooperative peer groups in NICE.IEEE Infocom,San Francisco,USA,2003.
    [103].Marti S,Garcia-Molina H.Limited Reputation Sharing in P2P Systems.Proceedings of the 5th ACM conference on Electronic commerce.New York,USA,2004.91-101.
    [104].Selcuk AA,Uzun E,Pariente MR.A Reputation-Based Trust Management System for P2P Networks.IEEE International Symposium on Cluster computing and the Grid,2004.251-258.
    [105].Mekouar L,Iraqi Y,Boutaba R.A Reputation Management and selection Advisor Schemes for Peer-to-Peer Systems.The 15th IFIP/IEEE International Workshop on Distributed Systems:Operations & Management,CA,USA,2004.
    [106].李建良,蒋勇,汪光先.计算机数值方法.南京:东南大学出版社,2000.
    [107].李景涛.P2P环境下的信任模型与副本方案研究[博士学位论文].上海:复旦大学.2006.
    [108].Stoical I,Morris R,Karger D.Chord:A scalable peer-to-peer lookup service for Internet application.Technical Report,2002.http://pdos.csail.mit.edu/chord/.
    [109].Hazel S,Wiley B.Achord:A variant of the chord lookup service for use in censorship resistant peer-to-peer publishing systems.The 1st International Workshop on Peer-to-Peer Systems(IPTPS'02).Cambridge:2002.http://www.cs.rice.edu/Conferences/IPTPS02/.
    [110].Schlosser MT,Condie TE,Kamvar SD.Simulating a file-sharing P2P network.Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing (SemPGRID 2003).Budapest,2003.69-80.
    [111].Khambatti M,Dasgupta P,Ryu KD.A role-based model for Peer-to-Peer communities and dynamic coalitions.Proceedings of the 2nd IEEE International Information Assurance Workshop.New York:IEEE Press,2004.141-154.
    [112].Zacharia G,Maes P.Trust management through reputation mechanisms.Applied Artificial Intelligence.2000,14(8):881-907.
    [113].Zacharia G,Moukas A,Maes P.Collaborative reputation mechanisms in electronic marketplaces.Proceedings of the 32nd Annual Hawaii International Conference on System Sciences,(HICSS-32).1999.
    [114].Liang ZQ,Shi WS.PET:A personalized trust model with reputation and risk evaluation for p2p resource sharing.The 38th International Conference on System Science,Hawaii,2005:256-264.
    [115].张骞,张霞,文学志等.Peer-to-Peer环境下多粒度Trust模型构造.软件学报.2006,17(1):96-107.
    [116].Quercia D,Hailes S,Capra L.B-trust:Bayesian trust framework for pervasive computing.Proceedings of the Fourth International Conference on Trust Management.Pisa,Italy:Springer Press,2006:298-312.
    [117].Zhu L,Nyang DH,Lee KH,et al.Fair reputation evaluating protocol for mobile ad hoc network.Proceedings of the 2006 International Conference on Computational Intelligence and Security.Guangzhou,China:IEEE Press,2006:613-616.
    [118].Moloney M,Weber S.A context aware trust based security system for ad hoe networks.Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks.Athens,Greece:IEEE Press,2005:153-160.
    [119].Liu J,Issarny V.Enhanced reputation mechanism for mobile ad hoc networks.Proceedings of the Second Conference on Trust Management.Oxford,UK:Springer Press,2004:48-62.
    [120].王勇,李明,崔灵果等.一种上下文敏感的信任管理系统.北京理工大学学报.2008,28(2):95-96,115.
    [121].Huang J,Fox MS.An ontology of trust:formal semantics and transitivity.Proceedings of the 8th International Conference on Electronic Commerce.New York:ACM Press,2006:259-270.
    [122].Richardson M,Agrawal R,Domingos P.Trust management for the semantic Web.Proceedings of the second International Semantic Web Conference.Florida:Springer ,2003:351-368.
    [123].Richardson M,Domingos P.The intelligent surfer:probabilistic combination of link and content information in pagerank.Proceedings of Advances in Neural Information Processing Systems.Cambridge:MIT Press,2002:673-680.
    [124].张波,向阳.语义网中基于本体的语义信任计算研究.计算机应用.2008,28(2):267-271.
    [125].Berners-Lee T,Hendler J,Lassila O.The Semantic Web.Scientific American,2001,284(5):34-43.
    [126].Fensel D,Musen MA,Amsterdam VU.The Semantic Web:a Brain for humankind.IEEE Intelligent System,2001,16(2):24-25.
    [127].Gil Y,Artz D.Towards content trust of web resources.Proceedings of the 15th International Conference on World Wide Web.New York,NY,USA:ACM Press,2006:565-574.
    [128].Foster I,Kesselman C.The Grid:Blueprint for a New Computing frastructure.San Francisco:Morgan Kaufmann Publisher.1999.
    [129].Maximilien EM,Singh MP.A framework and ontology for dynamic web services selection.Internet Computing,2004,8(5):84-93.
    [130]柴晓路.Web服务架构与开放互操作技术.北京:清华大学出版社.2002.
    [131].Foster I,Kesselaman C,Lee C,et al.A distributed resource management architecture that supports advance reservations and co-allocation.Proceedings of the 7th International Workshop on Quality of Service,Vol 13.1999.27-36.
    [132].Foster I,Roy A,Sander V.A quality of service architecture that combines resource reservation and application adaptation.Proceedings of the 8th International Workshop on Quality of Service.2000.181-188.
    [133].Roy A.End-to-End quality of service for high-end application [Ph.D.Thesis].Chicago:University of Chicago,2001.
    [134].Roy A,Foster I,Gropp W,et al.MPICH-GQ:Quality-of-Service for Message Passing Programs.SanDiego:IEEE Computer Society Press,2000.19-30.
    [135].Al-Ali R,ShaikhAli A,Rana O,et al.Supporting Qos-based discovery in service oriented grids.Proceedings of the International Parallel and Distributed Processing Symp.(IPDPS 2003).Nice:IEEE Computer Society,2003.101-109.
    [136].Kim JK,Kidd T,Siegal HJ,et al.Collective value of QoS:A performance measure framework for distributed heterogeneous networks.Proceedings of the International Parellel and Distributed Processing Symposium.(IPDPS).San Fransisco:IEEE Computer Society,2001.137-150.
    [137].Irvine CE,Levin T.An approach characterizing resource usage and user preferences in benefit functions.Technical Report,NPS-CS-99-005,NPS,1999.
    [138].Irvine CE,Levin T.Toward quality of security service in a resource management system benefit function.Proceedings of the 15th Annual Computer Security Application Conference.IEEE Computer Society,2000.133-139.
    [139].Czajkowski K.Ferguson DF,Foster I,et al.The WS-resource framework.The Globus Alliance.2004 http://www.globus.org/wsrf/specs/ws-wsrf.pdf
    [140].Foster I,Kesselman C,Nick J,et al.The physiology of the grid:An open grid services architecture for distributed systems integration.Global Grid Forum 2002.http://www.grid forum.org/ogsi-wg/drafts/ogsa_draft2.9_2002-06-22.pdf
    [141].Foster I,Kesselman C,Tuecke S.The anatomy of the grid:Enabling scalable virtual organizations.Journal of Supercomputer Applications,2001,15(3):200-222.
    [142].张伟哲,胡铭曾,张宏莉等.多QoS约束网格作业调度问题的多目标演化算法.计算机研究与发展.2006,43(11):1855-1862.
    [143].郭得科,任彦,陈洪辉等.一种QoS有保障得Web服务分布式发现模型.软件学报.2006,17(11):2324-2334.
    [144].伍之昂,罗军舟,宋爱波.基于QoS的网络资源管理.软件学报.2006,17(11):2264-2276.
    [145].杨胜文,史美林.一种支持QoS约束的Web服务发现模型.计算机学报.2005,28(4):589-594.
    [146].Liu Y,Ngu AH,Zeng LZ.QoS Computation and Policing in Dynamic Web Service Selection.Proceedings of the 13th international World Wide Web conference.ACM Press,2004,66-73.
    [147].Tuecke S,Czajkowski K,Foster I,et al.Open grid services infrastructure(OGSI).2003.http://forge.gridforum.org/projects/ggf-editor/document/draft-ogsi-service -1/en/1.
    [148].He X,Sun X,Gregor VL.QoS guided min-min heuristic for grid task scheduling.Journal of Computer Science and technology,2003,18(4):442-451.
    [149].Xiong K,Perros H.Trust-based resource allocation in Web services.Proceedings of the International Conference on Web Services.Chicago,USA:IEEE Computer Society,2006:663-672.
    [150].袁禄来,曾国荪,姜黎立等.网格环境下基于信任模型的动态级调度.计算机学报.2006,29(7):1217-1224.
    [151].Lin C,Varadharajan V,Wang Y,et al.Enhancing grid security with trust management.Proceedings of the 2004 IEEE international Conference on Services Computing.IEEE Computer Society Press,2004.
    [152].张伟哲,方滨兴,胡铭曾等.基于信任QoS增强的网格服务调度算法.计算机学报.2006,29(7):1157-1165.
    [153].Foster I,Kesselman C.The globus project:A status report.Proceedings of IPPS/ SPDP'98 Heterogeneous Computing Workshop,1998,4-18.
    [154].Lee KH,Lee M,Hwang YY,et al.A Framework for XML Web Services Retrieval with ranking.International Conference on Multimedia and Ubiquitous Engineering 2007 (MUE'07),2007:773-778.
    [155].Zhang LJ,Zhou Q,Chao T,et al.A dynamic services discovery framework for traversing Web Services representation chain.Proceedings of IEEE international Conference on Web Services,2004.632-639.
    [156].Liang Q,SYW Su,Li H,et al.A unified approach to discover multimedia Web services.Proceedings of the 5th International Symposium on Multimedia Software,2003.62-69.
    [157].Sugimoto A.VEGA:A Visual Modeling Language for Digital Systems.IEEE Design & Test of Computers,1986.:38-45.
    [158].Yang H,Xu Z,Sun.Y Modeling and performance analysis of the VEGA grid system.First International Conference on e-Science and Grid Computing,2005:8.
    [159].Kim SM,Rosu MC.A survey of public Web services.Proceedings of the 13th International conference on World Wide Web(WWW2004).New York:ACM Press,2004,312-313.
    [160].Colgrave J,Akkiraju R,Goodwin R.External matching in UDDI.Proceedings of IEEE International Conference on Web Services,2004.226-233.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700