网构软件信任演化模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近几年,对网构软件可信性的研究成为学术界研究的热点,网构软件的出现给现有的软件技术研究提出了新的课题,现有的软件理论、方法和相应的中间件平台技术体系难以有效地适应网构软件这种新的形态。在软件理论与模型方面,传统软件理论与模型难以描述计算单元的分布、自治和异构性,以及计算单元间协同、交互的开放、动态和演化特性;在软件方法与技术方面,传统方法难以适应网构软件的协同性、自适应性,以及需求的多目标性;而在软件可信性(可靠性与安全性)方面,传统软件方法与技术体系难以适应开放环境所要求的整体。
     网构软件系统需要一种动态演化的、相对“柔性”的可信保障机制。信任机制的建立可有效提高网构软件系统的可信性,在网构软件信任系统中,实体通过选取信任度高的实体进行协作,即只允许高信任度的实体访问自身提供的服务,有效地避免free-riding问题的产生,从而达到提高网构软件系统整体可信性的目的。在进行网构软件信任机制的研究时,必须全面考虑网构软件可能面对的来自需求、环境等方面的变化,并设计相应的处理措施,使网构软件具备足够的反应性。基于网构软件的以上特征,本文的研究内容包括以下几个方面:
     (1)研究网构软件的信任机制,包括信任机制的描述、分析及逻辑推理。基于信念逻辑及信任关系,结合PKI模型实例对信任链建立过程进行描述与推演。提出一种基于贪心策略寻找最优信任链搜索算法GSTC和多路径信任聚合算法MPTA,以避免置信度较差的节点通过信任链传播到整个网络,控制恶意信任链的传播,并减少信任评估过程中的计算开销和网络负载。
     (2)针对多维信任属性的度量与评估机制,研究网构软件可信属性之间的交互关系及可能涌现的特征。提出一种历史实例数据和信任属性相结合的动态信任度量方法,通过获取多维属性的高信任度的相似构件集合,来合理评价和选择网构软件实体,以提高整个网构软件系统的信任水平。
     (3)根据网构软件演化过程具有选择遗传特征,提出一种基于Wright-Fisher的网构软件信任演化模型;基于网构软件实体信任行为的特性,提出一种基于逻辑斯蒂方程的网构软件自组织信任演化模型。从不同的角度对系统的信任演化趋势进行预测分析,并且对网构软件系统的演化方向及稳定性进行分析,建立相应的激励惩罚机制,以提高网构软件系统整体的信任水平。
     (4)基于对信任的合并、传递以及决策,提出一种基于惩罚机制的网构软件信任评估方法,以提高系统抵抗恶意攻击的能力。由于信任关系经信任网络中传递合并后可能会产生无效的信任信息,本文借鉴了RIP路由算法思想给出一种获得信任网络信任有效信息的算法,并通过实验验证其有效性和可靠性。
     (5)针对网构软件运行过程中的构件故障问题,以静态博弈为分析工具,探索网构软件的在线维护最优策略选择方法。提出一种能够模拟构件故障演化态势,具有依赖关系和维护过程特征的在线维护博弈模型;研究在具有依赖关系的两实体发生故障的情况下,采取各种维护策略所获得的综合收益的计算方法,并对该方法进行推广,使其适用于更普遍的多构件故障维护中策略的选择问题。
     本文从网构软件的基本特征出发,以开放网络的动态演化为基础,结合生物学、社会学等领域的相关知识,对网构软件信任机制、信任度量、信任演化模型、信任评估以及博弈策略展开研究,为网构软件在动态演化环境中的信任机制建立系统的信任演化模型。
In recent years, the study on trust technology of Internetware has been a research hotspot in academic world. The appearance of Internetware puts forward a new subject for the existing software technology. The existing software theory, methods and corresponding middleware platform technology are hard to adapt the new software paradigm. In the aspect of software theory and model, traditional software theory and models are difficult to describe the distribution, autonomy and heterogeneity of the calculating units, nor could they depict the open, dynamic and evolutional characteristics among calculating units in cooperative interaction. In respect of software methods and techniques, traditional methods are hard to adapt the cooperativity and self-adaptiveness of Internetware, and the multi-objectiveness of requirements. Furthermore, with regard to software trustworthiness (reliability and security), traditional approaches and technologies are hard to accommodate the entirety of the open environment.
     Internetware needs a dynamic, evolutional, relatively flexible and dependable safeguard mechanism. The credibility of Internetware system could be increased via the construction of trust mechanism. In such systems, entities tend to select those with high credibility to cooperate, that is to say, each only allows the entities with high credibility to access its own services in order to effectively avoid the phenomenon of free-riding and enhance the overall trust level of Internetware system. While studying on trust mechanism of Internetware, the variability that Internetware may encounter from requirements, environments, etc, should be taken into account and meanwhile corresponding countermeasures should be designed, so as to make Internetwares be equipped with sufficient reactivity. Based on the above characteristics of Internetware, this paper makes research in the following aspects.
     1. The trust mechanism of Internetware is studied, including description, analysis and logical reasoning. Based on belief logic and trust relationship, combined with an instance of PKI model, the description and deduction of the building process of trust chain is given in the paper. An optimal search algorithm of greedy strategy for trust chain (GSTC) and multipath trust aggregation algorithm (MPTA) are proposed, so as to prevent the nodes with relatively low credibility being spread to the whole network through trust chain, control the spread of malicious trust chain, and reduce the calculating cost and network load in the process of trust evaluation.
     2. With respect of measurement and evaluation mechanism of multidimensional trust properties for Internetware, the interactions between trust properties and the potential characteristics that may emerge are studied. A dynamic trust measurement approach conjoining historical data and trust properties is proposed, so as to evaluate and select Internetware entities reasonably and increase the overall trust level of the Internetware system via acquiring similar components set with high credibility of multidimensional trust properties.
     3. On the basis of the selective and hereditary properties of evolutional process of Internetwares, a trust evolution model of Internetware based on the Wright-Fisher is proposed. Meanwhile, according to the trust behavior characteristics of Internetware entities, a self-organizing trust evolution model of Internetware based on Logistic equation is put forward. The trust evolutional trend of Internetware is analyzed and forecasted from different angles, and the evolution direction and stability of Internetware system are analyzed. Furthermore, the corresponding incentive and punishment mechanism is established, so as to improve the whole trust level of Internetware system.
     4. On account of the trust combination, transmission and trust decision, a trust evaluation method of Internetware based on punishment mechanism is proposed, so as to improve the system's capability to resist malicious attacks. As invalid information may be generated through the process of transmission and combination of trust, an algorithm based on the idea of RIP route algorithm is proposed in the paper in order to achieve valid trust information. And its effectiveness and dependability are proved via experiments.
     5. In terms of the troubleshooting problem of Internetware components in their running process, using static game as analysis tool, the optimal strategy selection method of online maintenance for Internetware is explored. A kind of online maintenance game model with dependent relationship and characteristics of maintenance process, which could simulate the evolution tendency of component faults, is proposed. In the case of two broken-down entities with dependent relationship, the calculation method for obtaining the comprehensive income of adopting different maintenance strategies are researched, and then the method is extended to be applicable to the strategy selection of more pervasive troubleshooting problems for multiple components.
     To start with the basic characteristics of Internetwares, based on the dynamic evolution for open network, combined with the relevant knowledge in the field of Biology and Sociology, the trust mechanism, trust measurement, trust evolutional model, trust evaluation, and game strategy are studied in the paper. And then systematic evolutional models are established for trust mechanism in evolutional environment.
引文
[1]杨芙清.软件工程技术发展思索[J].软件学报.2005,16(1):1-7页.
    [2]吕建,马晓星,陶先平,曹春,黄宇,余萍.面向网构软件的环境驱动模型与支撑技术研究[J].中国科学:信息科学.2008,38(6):864-900页.
    [3]吕建,马晓星,陶先平,徐锋,胡昊.网构软件的研究与进展[J].中国科学:信息科学.2006,36(10):1037-1080页.
    [4]王远,吕建,徐锋,张林.一个适用于网构软件的信任度量及演化模型[J].软件学报.2006,17(4):682-690页.
    [5]Marcello Pelillo, Andrea Torsello. Pay off-Monotonic Game Dynamics and the Maximum Clique Problem[J]. Neural Computation.2006, (5):1215-1258p.
    [6]K. Ranagnathan, M. Ripeanu, A. Sarin, I. Foster. To Share or Not to Share:An Analysis of Incentives to Contribute in File Sharing Environments[C]. Proceedings of the First International Workshop on Economics of Peer to Peer Systems.2003.
    [7]A. Blanc, Y.K. Liu, and A. Vahdat. Designing Incentives for Peer-to-Peer Routing[C]. Proceedings of the 2nd Workshop on Economics of Peer to Peer Systems.2004.
    [8]S. Jun and M. Ahamad. Incentives in BitTorrent Induce Free Riding[C]. Proceedings of the ACM SIGCOMM. Workshop on Economics of Peer-to-Peer Systems (P2P3CON).2005.
    [9]K. Lai, M. Feldman, I. Stoica, J. Chuang. Incentives for Cooperation in Peer-to-Peer Networks[J]. Workshop on Economics of P2P Systems.2003.
    [10]M. Feldman, K. Lai, I. Stoica, J. Chuang. Robust Incentive Techniques for Peer-to-Peer Networks [C]. Proceedings of the 5th ACM Conference on Electronic Commerce.2004.
    [11]J. Jiang, H. Bai, W. Wang. Trust and Cooperation in Peer-to-Peer Systems[C]. Proceedings of the 2nd Workshop on Grid and Cooperative Computing.2003.
    [12]李杰,范聪贤,徐汀荣.基于BitTorrent的激励机制的研究与进展[J].计算机应用与软件.2010,27(4):184-187页.
    [13]余一娇,金海.对等网络中的搭便车行为分析与抑制机制综述[J].计算机学报.2008,31(1):1-15页.
    [14]Hughes D, Coulson G, Walkerdine J. Free tiding On Gnutella Revisited:the Bell Tolls[C]. IEEE Distributed Systems Online.2005,6(6):90-97p.
    [15]Cohen B. Incentives Build Robustness in BitTorrent[C]. Proc. P2P Economics Workshop.2003.
    [16]Bharambe A R, Herley C, Padmanabhan V N. Analyzing and Improving BitTorrent Peffor-manee[R]. Technical Report MSR-TR-2005-03. Microsoft Research, Redmond, WA. February.2005.
    [17]Jun S, Ahamad M. Incentives in BitTorrent Induce Free Riding[C]. Proc. ACM SIGCOMMWorkshop on Economics of Peer-to-Peer Systems (P2PECON'05).2005: 116-121p.
    [18]胡建理,吴泉源,周斌,刘家红.一种基于反馈可信度的分布式P2P信任模型[J].软件学报.2009:2885-2898页.
    [19]Xiaolin, et al. Study on the behavior-based trust model in grid security system Services Computing[C].2004 IEEE International Conference.2004:506-509p.
    [20]Hasselbring, W., and Reussner, R. Toward Trustworthy Software Systems[C]. IEEE Computer.2006, (4):91-92p.
    [21]Semir Daskapan, Indira Nurtanti, Jan Van den Berg. Trust algorithms in P2P file sharing networks[J]. International Journal of Internet Technology and Secured Transactions.2010:174-200p.
    [22]Kumar N, Misurda J, Childers B R, et al. Instrumentation in software dynamic translators for self-managed systems[C]. In:Proceedings of the 1st ACM SIGSOFT Workshop on Self-managed Systems. New York:ACM Press.2004:90-94p.
    [23]Nefti S. A Fuzzy Trust Model for E-Commerce[C]. Proceedings of the Seventh IEEE International conference on E-Commerce Technology.2005:401-404p.
    [24]林闯,彭雪海.可信网络研究[J].计算机学报.2008,28(5):751-758页.
    [25]王怀明,唐扬斌等.互联网软件的可信机理[J].中国科学(E).2006,36(10):1156-1169页.
    [26]Li HZ, Singhal M. Trust Management in Distributed Systems [J]. IEEE Computer. 2007,40(2):45-53p.
    [27]Ji M, Orgun M A. Trust Management and Trust Theroy Revision [J]. IEEE Trans on Systems, Man and Cybernetics.2006,36(3):451-460p.
    [28]Poladian V, Sousa JP, Garlan D, Shaw M. Dynamic configuration of resource-aware services[C]. In:Proc.of the 26th Int'l Conf.on Software Engineering (ICSE). Edinburgh.2004:604-613p.
    [29]杨芙清,梅宏,吕建,金芝.浅论软件技术发展[J].电子学报.2002,30(12A):1901-1906页.
    [30]孙熙,庄磊,刘文,焦文平,梅宏.一种可定制的自主构件运行支撑框架[J].软件学报.2008,19(6):1340-1349页.
    [31]侯丽珊,金芝.基于环境变迁的构件组合模型[J].电子学报.2005,33(12A):2370-2375页.
    [32]Bracciali A, Brogi A, Canal C. A formalization approach to component adaptation[J]. J Syst Softw.2005,74(1):45-54p.
    [33]Blaze M, Feigenbaum J, Lacy J.Decentralized trust management[C]. Oakland, CA, USA:Proceedings of the IEEE Symposium on Security and Privacy.1996:164-173p.
    [34]MARSH S P. Formalizationising trust as a computational concept[D]. Glasgow, Scotland:University of Stirling.1994:55-64p.
    [35]胡军,黄志球.网构软件的资源自适应性的形式化分析与验证[J].软件学报.2008:1187-1198页.
    [36]徐明迪,张焕国.可信计算平台信任链安全性分析[j].计算机学报.2010,33(7):1166-1167页.
    [37]袁禄来,曾国荪,王伟.基于Pi-演算的信任网络形式化建模[J].系统仿真学报.2008,20(1):57-61页.
    [38]徐峰,王远,吕建.一个开放环境中信任链发现算法的设计与分析[J].计算机研究与发展.2006,43:72-77页.
    [39]Li N, Mitchell J.C, Winsborough W.H. Design of a role-based trust management framework[C]. Berkeley, California:Proceedings of the 2002 IEEE Symposium on Security and Privacy.2002:114-130p.
    [40]Thomas Beth, Malte Borcherding, Birgit Klein. Valuation of Trust in Open Networks[C]. Lecture Notes in Computer Science.Proc of the European Symp on Research in Security. Berlin:Springer.1994:3-18p.
    [41]陆文,徐锋,吕建.一种开放环境下的软件可靠性评估方法[J].计算机学报.2010,33(3):452-462页.
    [42]常志明,毛新军,齐治昌.基于Agent的网构软件构件模型及其实现[J].软件学报.2008,19(5):1113-1123页.
    [43]Wooldridge M, Jennings N. Intelligent agents:Theory and practice[J]. Knowl Eng Rev. 1995,10(2):115-152p.
    [44]Imhof L A, Nowak M A. Evolutionary Game Dynamics in a Wright-Fisher Process[J]. Journal of Mathematical Biology.2006, (52):667-681p.
    [45]Karl Tuyls, Pieter Jan Hoen. An Evolutionary Dynamical Analysis of Multi-Agent Learning in Iterated Games[J]. Autonomous Agents and Multi-Agent Systems.2006: 115-153p.
    [46]Li XY, Gui XL. Research on dynamic trust model in large-scale distributed environment[J]. Journal of Software.2007,18(6):1510-1521p.
    [47]Wang HM, Tang YB, Yin G, Li L. Trusted mechanism of Internet software[J]. Chinese Science (E).2006,36(10):1156-1169p.
    [48]Voas J. Trusted software's Holy Grail[J]. Software Quality Journal.2003,11(1): 9-17p.
    [49]Lin C, Peng XH. Research on trustworthy networks[J]. Chinese Journal of Computers. 2005,28(5):751-758p.
    [50]Almenarez F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices[C]. In:Werner B, ed. Proc.of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security (PerSec 2006). Washington:IEEE Computer Society Press.2006:267-272p.
    [51]Jameel H, Hung LX, Kalim U, Asjjad A, Lee SY, Lee YK. A trust model for ubiquitous systems based on vectors of trust values[C]. In:Werner B, ed. Proc. of the 7th IEEE Int'l Symp. on Multimedia. Washington:IEEE Computer Society Press. 2005:674-679p.
    [52]Theodorakopoulos G, Baras JS. On trust models and trust evaluation metrics for ad-hoc networks[C]. IEEE Journal on Selected Areasin Communications.2006, 24(2):318-328p.
    [53]Sun Y, Yu W, Han Z, Liu KJR. Information theoretic framework of trust modeling and evaluation for ad hoc networks[C]. IEEE Journal on Selected Areas in Communications, Selected Areas in Communications.2006,249(2):305-319p.
    [54]Zhou RF, Hwang K. Power-Trust:A robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Trans. On Parallel and Distributed Systems.2007, 18(4):460-473p.
    [55]Liang ZQ, Shi WS. PET:A PErsonalized trust model with reputation and risk evaluation for P2P resource sharing[C]. In:Sprague RH, ed. Proc. of the 38th Hawaii Int'l Conf. on System Sciences. Washington:IEEE Computer Society.2005: 287-295p.
    [56]Chang JS, Wang HM, Yin G. DyTrust:A time-frame based dynamic trust model for P2P systems[J]. Chinese Journal of Computers.2006,29(8):1301-1307p.
    [57]Li X, Liu L. Peer-Trust:Supporting reputation-based trust in peer-to-peer communities[J]. IEEE Trans. on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management.2004,16(7):843-857p.
    [58]Li XY, Gui XL. Novel scalable aggregation algorithm of feedback trust information [J]. Journal of Xi'an Jiaotong University.2007,41(8):879-883p.
    [59]Li XY, Gui XL, Zhao J, Feng DP. Engineering trusted P2P system with fast reputation aggregating mechanism[C]. In:Proc. of the IEEE Int'l Conf. on Robotics and Biomimetics. Washington:IEEE Press.2007:2007-2012p.
    [60]Yan, Z., and MacLaverty, R. Autonomic Trust Management in a Component Based Software System [J]. ATC'06, LNCS Vol.4158.2006:279-292p.
    [61]Perla, RJ. A long-term forecast of MRSA daily burden using logistic modeling[J]. Clinical Laboratory Science.2009,22(1):1-5p.
    [62]Wang Li, Cai Ying, Xue Qing. Reserch on bionic self-organizing theory of reconfigurable manufacturing system[C]. Technology and Innovation Conference, 2006, ITIC 2006 International.2006:1075-1079p.
    [63]Bergers, T., R. Sarin. Learning Through Reinforcement and Replicator Dynamics[J]. Journal of Economic Theory.1997,77:1-14p.
    [64]Taylor P D, Jonker L B. Evolutionarily stable strategies and game dynamics[J]. Mathematical Biosciences.1978,40(1-2):145-156.
    [65]Siang Y. Chong, Xin Yao. Behavioral Diversity, Choices and Noise in the Iterated Prisoner's Dilemma[J]. IEEE Trans. On Evolutionary.2005:540-551p.
    [66]Siang Yew Chong, Xin Yao. Multiple Choices and Reputation in Multiagent Interactions[J]. IEEE Trans. On Evolutionary computation.2007:689-711p.
    [67]Ricardo Matsumura de Araujo, Lamb Luis C. Neural-evolutionary learning in a bounded rationality scenario [M]. Springer-Verlag. Berlin Heidebery.2004: 996-1001p.
    [68]刘伟兵,王先甲.基于PSO神经网络的进化博弈研究[J].系统工程与电子技术. 2007:1282-1284页.
    [69]Perlman R. An overview of PKI trust models[C]. IEEE Network.1991,3(6):38-43p.
    [70]Ramchurn S D, Sierra C, Godo L. Devising A Trust Model for Multi-Agent Interactions Using Confidence and Reputation [J]. Applied Artificial Intelligence. 2004,18(9/10):833-852p.
    [71]袁禄来,曾国荪,王伟.基于Pi-演算的信任网络形式化建模[J].系统仿真学报.2008,20(1):57-61页.
    [72]Foster I, Kesselman C. The Grid 2:Blueprint for a New Computing Infrastructure[M]. San Francisco:Morgan Kaufmann Pubfisher.2004.
    [73]Lampson B, Abadi M, Burrows M, Wobber E.Authentication in distributed systems: Theory and practice[J]. ACM Transactions on Computer Systems.1992,10(4): 265-310p.
    [74]Perlman R. An overview of PKI trust models[C]. IEEE Network.1991,3(6):38-43p.
    [75]龚传,刘鹏等.公钥基础设施PKI信任模型研究[J].计算机安全.2009,4:79-83页.
    [76]刘海龙,张其善.PKI信任模型的条件谓词逻辑推理[J].通信学报.2002,23(11):15-20页.
    [77]Grandison T, Sloman M. A survey of trust in Internet applications[C]. IEEE Communications Surveys.2000,4(4):2-16p.
    [78]J(?)sang A. The right type of trust for distributed systems[C]. California, USA: Proceedings of the 1996 workshop on new security paradigms.1996:119-131p.
    [79]Fedor V. Fomin, Fabrizio Grandoni. A measure & conquer approach for the analysis of exact algorithms [J]. New York, USA:Journal of the ACM.2009,56(5):25-27p.
    [80]林基艳,吴振强.并行分类信任链传递模型[J].计算机工程与应用.2008,45(31):98-101页.
    [81]张兴,黄强,沈昌翔.一种基于无干扰模型的信任链传递分析方法[J].计算机学报.2010,33(1):74-80页.
    [82]Y Wang, J Vassileva. Bayesian network-based trust model [C].WI 2003.2003.
    [83]B Yu, M P singh. Detecting deception in reputation management[C]. AAMAS03.2003: 14-18p.
    [84]Weihua Song. Neural network-based reputation model in a distributed system e-Commerce Technology[C]. CEC2004.IEEE Proceedings 6-9 July 2004.2004: 321-324p.
    [85]李小勇,桂小林.可信网络中居于多维决策属性的信任量化模型[J].计算机学报.2009,32(3):405-416页.
    [86]林闯,田立勤,王元卓.可信网络中用户行为可信的研究[J].计算机研究与发展.2008,45(12):2033-2043页.
    [87]武小平,邢宏根,沈志东.基于分布式可信度量的移动代理安全应用模型研究[J].计算机工程与科学.2010,32(6):19-21页.
    [88]胡文军.网络可信度量机制的研究与实现[D].南京理工大学硕士学位论文.2010.
    [89]韦荣.可信计算平台可信度量机制的应用与研究[D].西安电子科技大学硕士学位论文.2008.
    [90]Regina Connolly, Frank Bannister. Consumer trust in Internet shopping in Ireland: towards the development of a more effective trust measurement instrument[J]. Journal of Information Technology.2007,22(2):102-118p.
    [91]Reena Master, Xiaochun Jiang, Mohammad T. Khasawneh, Shannon R. Bowling, Larry Grimes. Anand K.Gramopadhye, Brian J. Melloy. Measurement of Trust Over Time in Hybrid Inspection Systems[J]. Human Factors and Ergonomics in Manufacturing.2005,15(2):177-196p.
    [92]赵茜,王新生.一种动态信任度量与预测方法研究[J].计算机工程与科学.2010,32(9):20-22页.
    [93]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521页.
    [94]Robert J M.信息论与编码理论[M].北京:电子工业出版社.2003:13-25页.
    [95]王国胤,于洪,杨大春.基于条件信息熵的决策表约简[J].计算机学报.2002 25(7):1-8页.
    [96]赵昀,陈庆伟,胡维礼.一种基于信息熵的强化学习算法[J].系统工程与电子技术.2010,35(5):1043-1046页.
    [97]朱莉莉,严洪森,崔鹏飞,杨人子.基于信息熵的知识网度量方法及应用[J].东南大学学报(自然科学版).2010 40(5):1097-1102页.
    [98]Sen, Monoj Kumar, Bag, Bidhan Chandra. The Effect of Interference in Additive and Multiplicative White Noises on Information Entropy Production and Entropy Flux [J]. Modern Physics Letters.B, Condensed Matter Physics, Statistical Physics, Applied Physics.2009,23(19):2385-2398p.
    [99]Shifei Ding, Yongping Zhang, Xiaofeng Lei, Xinzheng Xu, Xin Wang, Li Wang, Qing He. Research on a principal components decision algorithm based on information entropy[J]. Journal of Information Sience.2009,35(1):120-127p.
    [100]鲍新中,张建斌.基于粗糙集条件信息熵的权重确定方法[J].中国管理科学.2009,17(5):131-135页.
    [101]J.Jiang, H.Bai, W.Wang. Trust and Cooperation in Peer-to-Peer System. Gridand Cooperative Computing[C]. Second International Workshop, GCC 2003, shanghai, china, dec.2003.
    [102]Rumen Andreev. A Model of Self-Organizing Collaboration[J]. Biologically-inspired collaborative computing.2008:223-232p.
    [103]刘凤鸣.P2P服务环境中基于社会网络的信任计算研究[D].东华大学博士学位论文.2008:45-66页.
    [104]高晶,关涛,王雅林.价值网络中企业协同竞争机制的演化博弈分析[J].哈尔滨工程大学学报.2007,28(10):1178-1181页.
    [105]李小勇,桂小林.动态信任预测的认知模型[J].软件学报.2010,21(1):163-175页.
    [106]马燕芳,刘心声.一类总体有限的随机进化博弈的极限动态[J].南京大学学报数学半年刊.2009,26(1):108-110页.
    [107]谢识予.有限理性条件下的进化博弈理论[J].上海财经大学学报.2001,3(5):3-9页.
    [108]Bhaskar Anand, Song Yun S. Multi-locus match probability in a finite population:a fundamental difference between the Moran and Wright-Fisher models[J]. Bioinformatics.2009, (12):187-195p.
    [109]杨洋,荣智海,李翔.复杂网络演化博弈理论研究综述[J].复杂系统与复杂性科学.2009:47-55页.
    [110]Yuhua Liu, Naixue Xiong, Yuling Li, Kaihua Xu, Jong Hyuk Park and Chuan Lin[J]. A secure model for controlling the hubs in P2P wireless network based on trust value. Computer Communications.2010:997-1004p.
    [111]Thomas R. Genetic Algorithm Learning and Evolutionary Games [J]. Journal of Economic Dynamics & Control,2001,24:1019-1037p.
    [112]P.L.Antonelli. The Information Dynamics of the Diffusion Processes of Population Genetics[J].Kluwer Academic Publishers.1997,(4):101-117p.
    [113]Yuan Zhang, Makoto Sakamoto, Hiroshi Furutani. Effects of Population Size and Mutation Rate on Results of Genetic Algorithm[C]. IEEE Computer Society.2008: 70-75p.
    [114]黄漫,蔡彪.对逻辑斯蒂方程的考察[J].华东交通大学学报.2002,19(3):95-97页.
    [115]Perla, RJ. A long-term forecast of MRSA daily burden using logistic modeling[J]. Clinical Laboratory Science.2009,22(1):1-5p.
    [116]Wu HX, Dong HY, Zhang Q. Evolutionary game analysis of information-sharing mechanism in network organization[J]. COMPUTER ENGINEERING AND APPLICATIONS.2009,45(16):232-234p.
    [117]王龙,伏锋,陈小杰,楚天广,谢广明.演化博弈与自组织合作[J].系统科学与数学.2007,27(3):330-341页.
    [118]Marcela Mejia, Nestor Pena, Jose L, Munoz, Oscar Esparza, Marco A. Alzate. A game theoretic trust model for on-line distributed evolution of cooperation in MANETs [J]. Journal of Network and Computer Applications.2011,34:39-51p.
    [119]邱中华,金栩.基于进化博弈论研究一类监察博弈[J].南京邮电大学学报(自然科学版).2006,26(5):46-49页.
    [120]郑志明,马世龙,李未,韦卫,姜鑫,张占利,郭炳晖.软件可信性动力学特征及其演化复杂性[J].中国科学.2009,39(9):946-950页.
    [121]郑志明,马世龙,李未,姜鑫,韦卫,马丽丽,唐绍婷.软件可信复杂性及其动力学统计分析方法[J].中国科学.2009,39(10):1050-1054页.
    [122]廖志高,徐玖平.一类技术创新竞争扩散的微分动力学模型及应用[J].系统工程与电子技术.2009,31(7):1633-1637页.
    [123]Liviu Panait, Karl Tuyls, Sean Luke. Theoretical Advantages of Lenient Learners:An Evolutionary Game Theoretic Perspective [J]. The Journal of Machine Learning Research.2008:423-457p.
    [124]B.Yang, H.GMolina. Micropayments for Peer-to-Peer Systems[C]. Proceeding of 10th ACM Conference on computer and Communications Security. Washington:ACM press.2003:300-310p.
    [125]Alchian A. Uncertainty. Evolution and the economic theory [J]. The Journal of Political Economy,1995,58(3):211-221p.
    [126]肖正,张世永.基于后悔值的多Agent冲突博弈强化学习模型[J].软件学报.2008,19(11):2959-2961页.
    [127]赵灵犀,田园,邓鲁耀.P2P环境下引入激励机制的动态信任模型[J].计算机应用研究.2010,27(1):251-254页.
    [128]Manaf Zghaibeh, Kostas G. Anagnostakis. On The Impact of P2P Incentive Mechanisms on User Behavior[J]. NetEcon+ IBC.2007:1-6p.
    [129]Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, David K. Y. Yau. Incentive and Service Differentiation in P2P Networks:A Game Theoretic Approach[J]. IEEE/ACM Tran. on Networking.2006:978-991p.
    [130]陈志琦.基于博弈论的P2P服务质量差异激励模型的研究[D].硕士学位论文.2005:6-12页.
    [131]Manaf Zghaibeh, Kostas G. Anagnostakis. On The Impact of P2P Incentive Mechanisms on User Behavior[J]. NetEcon+IBC,2007:1-6p.
    [132]苏永乐.对等网络信仟模型及激励机制研究[D].山东大学硕士学位论文.2009:19-54页.
    [133]Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, David K. Y. Yau. Incentive and Service Differentiation in P2P Networks:A Game Theoretic Approach[J]. IEEE/ACM Tran. On Networking,2006:978-991 p.
    [134]于坤,吴国新,方群.基于二阶声誉测度的自组织网络合作激励机制[J].东南大学学报(自然科学版).2008,38(6):965-969页.
    [135]于真,周芳,郑雪峰,刘海燕,梁春霞.TIM:一种P2P网络激励机制[J].小型微型计算机系统.2010,31(11):2185-2190页.
    [136]M. Harish, N. Anandavelu, N. Anbalagan, G. S. Mahalakshmi and T. V. Geetha. Design and Analysis of a Game Theoretic Model for P2P Trust[C]. ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology.2007.
    [137]路峰,吴慧中.网络环境下基于云模型的信任评估与决策方法研究[J].系统仿真学报.2009,21(2):421-426页.
    [138]王志兵,李长云.基于行为模式的电子交易过程中信任评估研究[J].计算机应用研究.2010,27(3):945-947页.
    [139]张琳,王汝传,张永平.一种基于模糊集合的可用于网络环境的信任评估模型[J].电子学报.2008,36(5):862-868页.
    [140]叶阿勇,马建峰.-种移动自组网中信任评估模型的设计[J].计算机研究与发展.2008,45(5):765-770页.
    [141]付利华,王丹.可信计算信任模型的模糊评估方法研究[J].计算机工程与应用.2010,(22):4-5页.
    [142]张景安,赵慧勤.P2P网络中模糊信任模型研究[J].微电子学与计算机.2009,26(8): 158-162页.
    [143]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报.2003,14(8):1401-1408页.
    [144]陈书义,闻英友,赵宏.基于模糊集合的可信计算信任模型评估[J].计算机科学.2008,35(11):39-41页.
    [145]王琴,郭亚军,徐芬.普适环境中基于模糊理论的信任评估模型[J].计算机工程与应用.2008,44(3):170-172页.
    [146]张琳,王汝传,张永平.一种基于模糊集合的可用于网格环境的信任评估模型[J].电子学报.2008,36(5):862-868页.
    [147]朱训生.工程管理的模糊分析[M].上海:上海交通大学出版社.2004:28-87页.
    [148]张子剑,李洪,祝烈煌,廖乐健.一种新的分布式网络环境评估模型[J].北京理工大学学报.2008,28(9):798-800页.
    [149]Jungtae Mun, Moonsoo Shin, Kyunghuy Lee, Mooyoung Jung. Manufacturing enterprise collaboration based on a goal-oriented fuzzy trust evaluation model in a virtual enterprise[J]. Computers&Industrial Engineering.2009,56(3):888-901p.
    [150]Theodorakopoulos G, Baras, J.S.. On trust models and trust evaluation metrics for ad hoc networks[J]. IEEE Journal on Selected Areas in Communication.2006,24(2): 318-328p.
    [151]王勇,代桂平,侯亚荣,方娟,毛国君.基于贝叶斯网络的组合服务信任度评估方法[J].高技术通讯.2010,20(1):21-25页.
    [152]Tsung-Yi Chen, Yuh-Min Chen, Hui-Chuan Chu. Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration[J]. Computers in Industry.2008,59(6):565-579p.
    [153]Seunghun Jin, Chanil Park, Daeseon Choi, Kyoil Chung, Hyunsoo Yoon. Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network[J].2005,27(4): 465-468p.
    [154]郭玉翠,王励成,钮心忻.一个用于多个实体信任度评估的模糊数学模型[J].华侨大学学报(自然科学版).2009,30(6):637-641页.
    [155]Naoufel Cheikhrouhou, Gregory Piot, Michel Pouly. A multi-criteria model for the evaluation of business benefits in horizontal collaborative networks [J]. Journal of Intelligent Manufacturing.2010,21(3):301-309p.
    [156]李季,朱小勇.模糊Petri网及其在Web服务信任评估中的应用[J].计算机应用研 究.2010,27(2):573-576页.
    [157]Theodorakopoulos G, Baras J S. On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks[J]. IEEE Journal on Selected Area in Communications.2006, 249(2):305-319p.
    [158]Ramchurn S D, Sierra C, Godo L. Devising A Trust Model for Multi-Agent Interactions Using Confidence and Reputation[J]. Applied Artificial Intelligence.2004, 18(9/10):833-852p.
    [159]窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报.2004:571-583页.
    [160]徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报.2003,14(6):1043-1051页.
    [161]Pearl Pu, Li Chen. Trust-inspiring explanation interfaces for recommender systems[J]. Knowledge-Based Systems.2007,20(6):542-556p.
    [162]Ananth Uggirala, Anand K. Gramopadhye, Brain J. Melloy, Joe E. Toler. Measurement of trust in complex and dynamic systems using a quantitative approach[J]. International Journal of Industrial Ergonomics.2004,34(3):175-186p.
    [163]Theodorakopoulos G, Baras J S. On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks [J]. IEEE Journal on Selected Area in Communications.2006, 249(2):305-319p.
    [164]Fudenberg D, Levine D. K. The Theory of Learning in Games[J]. MIT Press.1998,78: 167-169p.
    [165]A. L. Adamic and E. Adar. Friends and Neighbors on the Web[J]. Social Networks. 2003,25(3):211-130p.
    [166]田立勤,林闯.信任网络中一种基于行为信任预测的博弈控制机制[J].计算机学报.2007,30:1931-1938页.
    [167]张大鹏,王文杰,史忠植.一种基于主体的可信网构软件设计方法[J].电子学报.2010,38(11):2523-2528.
    [168]Vitharana P. Risks and challenges of component-based software development[C]. Commun ACM.2003,46:67-72p.
    [169]Fudenberg, D. and C. Harris. Evolutionary Dynamics with Aggregate Shocks[J]. Journal of Economics Theory.1992,57:420-441p.
    [170]Adriana Figueiredo, Olga Nabuco, Tatiana AL-Chueyr, Marcos Rodrigues[J]. Framework Proposal to Evaluate Trustworthiness in an Online Community.2009: 579-582p.
    [171]王浩云,张顺颐,赵振东,马燕玲.基于不完全信息博弈的P2P网络节点行为策略模型[J].应用科学学报.2008,26(5):448-454页.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700