虚拟社区环境下信任机制的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
以Internet为代表的开放网络及其承载业务的迅速扩大,使网络安全的研究面临新的挑战。开放网络不仅意味着网络中大量动态用户的存在,也意味着在陌生实体之间进行交互的可能性将大大提高。由于交互实体并不一定隶属于同一管理机构或组织,无法采用传统的基于身份认证、授权、加密等安全技术。信任作为开放网络环境下安全技术的重要前提,正日益成为网络安全研究的焦点。
     虚拟社区(Virtual Community)是近年来借助于Internet发展起来的一个重要应用。虚拟社区在近年的蓬勃发展引起了社会学、经济学学者的研究兴趣,他们的研究侧重于在人文系统中对虚拟社区进行定性的研究。研究发现,信任的缺失问题是虚拟社区发展中的一个关键性问题,需要一种有效的信任机制帮助虚拟社区成员建立信任。
     虚拟社区作为传统社区在网络空间的缩影和延伸,不仅保留有传统社区的特点,也具有网络环境中的动态、开放的特征。因此虚拟社区的信任机制设计体现出一些不同于网络信任的要求。目前在计算机科学领域对虚拟社区以及虚拟社区信任机制的研究还不多,本文的研究在虚拟社区信任机制设计、相关算法设计以及信任策略动态管理等方面进行了一些尝试。
     基于信任和虚拟社区的人文背景,本文的研究充分借鉴了心理学、社会学、经济学、管理学等传统学科的研究成果,是计算机学科和社会学、心理学等学科的一个交叉课题。
     作者首先从计算机科学的角度分析了网络信任的主观性、不确定性、可度量性、上下文相关性、动态性、历史稳定性、异步性等特性,指出网络信任的研究重点不在于实体身份的验证,而在于对实体服务特性的评价。作者剖析了网络信任的研究现状,指出当前研究在信任特性处理、信息激励、计算模型实用性以及策略管理等方面存在的问题。
     同时作者结合当前在线声誉评估系统的实际,论述了虚拟社区信任机制设计所面临的主要问题,总结了虚拟社区信任机制的设计原则。在此基础上作者提出了一种虚拟社区信任模型—CommuTrust,该模型从主观特性方面区分了信任和声誉两个概念,并对成员节点的服务信任和推荐信任分别度量,用社区成员基本属性:社区声誉、推荐信任和活跃强度来表征成员在社区中的状态信息。CommuTrust模型无需成员节点掌握并存储大量环境或交互信息,系统消息传输流量大大减小,对虚拟社区的主要服务影响较小,适合于动态性强、异构性高的虚拟社区环境。
     针对虚拟社区中可能存在的不实评价问题,作者提出了基于双方评价的评价核查机制,通过来自于服务方和客户方的两方面评价以及交互双方的社区属性来甄别对交互服务的不实评价,降低了不实评价对系统性能的影响,同时也对成员提交不实评价给予惩罚。作者提出的评价核查机制综合考虑了评价反馈激励、真实评价激励、成员身份一致性激励等多维的信息激励,提高了系统信息的充分性和真实性,保证了系统性能。实验证明,该评价核查机制有效提高了系统性能,尤其在社区环境较为恶劣的情况下,仍可以保持较好的性能。
     作者将控制理论的思想引入网络推荐信任的度量中,提出基于PID算法的虚拟社区成员推荐信任更新算法,根据成员评价的偏离度对其推荐信任度进行更新。基于PID算法的推荐信任更新算法简单,数据存储量不高,信息传输流量小。实验证明,将控制理论中PID控制算法应用到成员信息推荐中可以取得较好的控制效果,在恶劣环境下也可以对成员推荐信任度作出较为准确的评价。
     作者提出了新型的简单高效的虚拟社区信任和声誉生成算法。信任和声誉的计算不仅反映了信任的主观性和时效性,声誉的脆弱性和历史稳定性,也有助于激励社区成员参与社区活动,保证信息来源的充分性,从而提高社区成员对于虚拟社区的忠诚度,有利于虚拟社区的管理和进一步发展。
     最后,作者引入了信任建立过程的“三阶段”理论,分析了信任在不同阶段的特性,给出了虚拟社区信任策略动态管理的建议方案,将信任策略(参数)的管理纳入信任机制的设计中。
With the development of information technology and Internet applications, the research of network security is facing new challenges. Open network environment means not only the existence of large amount of dynamic users, but also high possibility of interactions between unknown entities. Because the entities maybe not belong to the same administration domain, some traditional security technologies such as identity authentication, authorization or cryptography are not applicable. Trust, as a promising method of security technologies for open network, attracts more and more attention these years.
     Virtual Community is a significant application in the Internet. With the exponential growth of the virtual community, more and more studies about virtual community have been conducted in sociology and economics. Researches show that an effective trust mechanism is crucial to fertilize the development of the virtual community.
     As a kind of socialized network, the trust mechanism of virtual community is different from other applications. In computer science field, there are not enough studies on virtual community and relevant trust mechanism. The research of this dissertation focuses on the trust model design, relevant algorithm and dynamic policy management in virtual community.
     The main research contents of this dissertation are as follows:
     1) Analyzing the subjectivity, uncertainty, measurability, context-dependent, dynamic, asynchronies of trust, and pointing out that the focus of network trust is on the provision trust. After giving an overview of existing and proposed systems, some disadvantages are concluded.
     2) Analyzing some dominant issues in the trust model design of virtual community, and giving some design principals. A novel trust model of virtual community-CommuTrust is proposed. CommuTrust differentiates reputation from trust, and evaluate provision trust and recommendation trust respective. Three basic attributes: reputation, recommendation trust and active strength are used to indicate the status of the community members. CommuTrust, which has little cost of storage and traffic, is suitable to virtual community with high dynamic and heterogeneity.
     3) Proposing a new bi-rating based rating verification scheme, which are helpful to alleviate the affection from malicious members and unfair ratings. The rating verification Scheme gives good incentive to rating submission, fair rating and identity consistency. The experiments show that this scheme can improve the performance of the trust model, and works well even in severe environment.
     4) Proposing a control theory based updating algorithm for recommendation trust. This algorithm is simple but effective. The experiments show that it has good performance for recommendation trust assessment, and can identify malicious members quickly.
     5) Proposing new trust and reputation aggregation algorithms. The trust integration algorithm presents the subjective, time-dependent natural of trust, while the reputation aggregation algorithm presents its history-dependent stability and fragility. Both algorithms are helpful to the development of virtual community.
     6) Analyzing the features of trust in three different phases of trust formation and giving some suggestions for the dynamic trust policy management in virtual community.
引文
[1] A. Abdul-Rahman and Stephen Hailes, "Using Recommendations for Managing Trust in Distributed Systems", in proceedings of IEEE Malaysia International Conference on Communication '97(MICC'97), Kuala Lumpur, Malaysia, November 1997.
    [2] A. Abdul-Rahman and Stephen Hailes, "Supporting Trust in Virtual Communities", in proceedings of Hawaii International Conference on System Sciences 33, Maui, Hawaii, January 2000.
    [3] A. Abdul-Rahman, "A Framework for Decentralised Trust Reasoning", PhD thesis, University of London, 2004.
    [4] K. Aberer, "P-Grid: A Self-Organizing Access Structure for P2P Information Systems", in proceedings of Sixth International Conference on Cooperative Information Systems (CoopIS 2001), Trento, Italy, 2001, pp.179-194.
    [5] E. Adar and B. A. Huberman, "Free Riding on Gnutella", First Monday(Peer-reviewed Journal on the Internet), October 2000, 5(10).
    [6] alibaba, http://www.alibaba.com/
    [7] Amazon, http://www.amazon.com/
    [8] J. P. Anderson, "Computer Security Technology Planning Study", ESD-TR-73-51, 1972, I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, MA.
    [9] J. C. Anderson, J. A. Naru, "A Model of Distributor. Firm and Manufacturer Working Relationships", in Journal of Marketing, 1990(54: 1), pp. 42-58.
    [10] Bernard Barber, “信任—信任的逻辑和局限”,牟斌等译,福建人民出版社,1989.
    [11] T. Beth, M. Borcherding, B. Klein, "Valuation of Trust in Open Network", in proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994: 3~18.
    [12] BizRate, http://BizRate.com/
    [13] M. Blaze, J. Feigenbaum, J. Lacy, "Decentralized Trust Management", in proceedings of IEEE Symposium on Security and Privacy, 1996: 164-173.
    [14] M. Blaze, J. Feigenbaum, M. Strauss, "Compliance Checking in the PolicyMaker Trust Management System", in proceedings of International Conference on Financial Cryptography, LNCS 1465, 1998: 254~274.
    [15] M. Blaze, J. Feigenbaum, and J. Loannidis, "The KeyNote Trust Management System Version 2", Internet RFC 2704, 1999.
    [16] J. Breese, D. Heckerman, and C. Kadie, "Empirical Analysis of Predictive Algorithms for Collaborative Filtering", in proceedings of the 14th Conference in Uncertainty in Artificial Intelligence, Morgan Kaufman, 1998: 43-52.
    [17] C. Bridges, "The Challenge of Online Trust in B2B", White Paper by Netmarkets Europe, February 1, 2001.
    [18] S. Buchegger, J. -Y. Le Boudec, "A Robust Reputation System for Mobile Ad-hoc Networks", Technical Report IC/2003/50, EPFL-IC-LCA, 2003.
    [19] M. Chen and J. P. Singh, "Computing and Using Reputations for Internet Ratings", in proceedings of the Third ACM Conference on Electronic Commerce (EC'01), ACM, October 2001.
    [20] Cheskin Research and Studio Archetype, "E-commerce Trust Study", 1999, http://www.cheskin.com/
    [21] B. Christianson and W. S. Harbison, "Why Isn't Trust Transitive", in proceedings of the Security Protocols International Workshop, University of Cambridge, 1996.
    [22] C. L. Corritore, B. Kracher and S. Wiedenbeck, "An Overview of Trust", Working Document, 2001, http://cobacourses.creighton.edu/trust/articles/trustpaper2-9-01_final.rtf
    [23] George Cvetkovich and Ragnar Lofstedt(Eds.), "Social Trust and the Management of Risk", London: Earthscan, 1999.
    [24] P. Dasgupta, "Trust as a Commodity", in Gambetta, Diego(ed.) Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 4, pp. 49-72, 2000.
    [25] C. Dellarocas, "Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior", in ACM Conference on Electronic Commerce, 2000: 150~157.
    [26] C. Dellarocas, "Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms", in proceedings of the 3rd ACM conference on electronic commerce, Tampa, Florida, USA, 2001: 171~179.
    [27] M. Deutsch, "Trust and Suspicion", in Journal of Conflict Resolution, 1958(2): 265-279.
    [28] S. Dewan, V. Hsu, "Trust in Electronic Markets: Price Discovery in Generalist Versus Specialty Online Auctions", 2001. http://databases.si.umich.edu/reputations/bib/papers/Dewan&Hsu.doc
    [29] P. M. Doney, J. P. Cannon, and M. R. Mullen(1998), "Understanding the Influence of National Culture on the Development of Trust", Academy of Management Review, 1998, 23(3): 601-620.
    [30] Esther Dyson,“数字化时代的生活设计”,胡泳译,海南出版社,1998.
    [31] eBay, http://www.ebay.com/
    [32] Epinion, http://www.epinions.com/
    [33] E. Friedman and P. Resnick, "The Social Cost of Cheap Pseudonyms", Journal of Economics and Management Strategy, 2001, 10(2): 173-199.
    [34] D. Gambetta, "Can We Trust Trust?", in Diego Gambetta, editor, Trust, Basil Blackwell, 1988.
    [35] E. Gerck, "Toward Real-World Models of Trust", 1998, E Gerck and MCG.
    [36] J. A. Golbeck, "Computing and Applying Trust in Web-based Social Networks", PhD thesis, University of Maryland, 2005.
    [37] T. Grandison, M. Sloman, "A Survey of Trust in Internet Applications", IEEE Communications Surveys and Tutorials, 2000(3): 2-16.
    [38] T. Grandison, M. Sloman, "Specifying and Analysing Trust for Internet Applications", in proceedings of 2nd IFIP Conference on e-Commerce, e-Business, e-Government (I3E2002), Lisbon, Portugal, 2002: 145-157.
    [39] T. Grandison and M. Sloman, "Trust Management Tools for Internet Applications", in proceedings of the First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Grece, 2003: 91-107.
    [40] T. Grandison, "Trust Management for Internet Applications", PhD thesis, University of London, 2003.
    [41] P. Hage, F. Harary, "Structural Models in Anthropology", Cambridge University Press, 1983.
    [42] J. Hagel, A. G. Armstrong, "Net Gain: Expanding Market Through Virtual Communities", Harvard Business School Press, Boston, 1997.
    [43] L. T. Hosmer, "Trust: the Connection Link between Organizational Theory and Philosophical Ethics", Academy of Management Review, 1995, 20(2): 379-403.
    [44] D. E. Houser, J. Wooders, "Reputation in Interuet Auctions: Theory and Evidence from eBay", working paper, 2001. http://w3.arizona.edu/~econ/working_papers/Interuet_Auctions.pdf
    [45] I. Hummel, U. Lechner, "Social Profiles of Virtual Communities", in proceedings of the 35th Hawaii International Conference of Systems Sciences(HICSS), 2002.
    [46] Yu-Ting Caisy Hung, A. R. Dennis, L. Robert, "Trust in Virtual Teams: Towards an Integrative Model of Trust Formation", in proceedings of the 37th Hawaii International Conference on System Science (HICSS), 2004.
    [47] IBM, "Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers", in IEEE Symposium on Security and Privacy, 2000.
    [48] IBM, IBM Trust Establishment Policy Language, http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/PolicyLanguage.html
    [49] R. Ismail, C. Boyd, A. Jφsang, S. Russel, "Strong Privacy in Reputation Systems", in proceedings of the 4th International Workshop on Information Security Applications (WISA), Jeju Island, Korea, August 2003.
    [50] A. Jφsang, "The Right Type of Trust for Distributed Systems", in proceedings, New Security Paradigms 96 Workshop, 1996.
    [51] A. Jφsang, SJ. Knapskog, "A Metric for Trusted Systems", In: Global IT Security. Wien: Austrian Computer Society, 1998: 541-549.
    [52] A. Jφsang. "A Subjective Metric of Authentication", in proceedings of the 5th European Symposium on Research in Computer Security(ESORICS'98), Springer-Verlag, 1998.
    [53] A. Jφsang, "A Logic for Uncertain Probabilities", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311.
    [54] A. Jφsang, "The Consensus Operator for Combining Beliefs", Artificial Intelligence Journal, 2002, 1(2): 157-170.
    [55] A. Jφsang, R. Ismail, C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision"(to appear), Decision Support Systems, 2005.
    [56] A. Jφsang, S. Pope, "Semantic Constraints for Trust Transitivity", in proceedings of the Asia-Pacific Conference of Conceptual Modelling(APCCM), Newcastle, Australia, February 2005.
    [57] R. Jurca, B. Faltings, "An Incentive Compatible Reputation Mechanism", in proceedings of the 6th Int. Workshop on Deception Fraud and Trust in Agent Societies(at AAMAS'03), 2003.
    [58] S. D. Kamvar, M. T. Schlosser, H. GarciaMolina, "The EigenTrust Algorithm for Reputation Management in P2P Networks", in proceedings of the Twelfth International World Wide Web Conference, May, 2003.
    [59] D. Krackhardt, M. Lundberg, L. O'Rourke(1993) "KrackPlot: A Picture's Worth a Thousand Words," Connections, 16(1&2): 37-47.
    [60] R. M. Kramer, "Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions", Annual Reviews of Psychology 50, 1999: 569-598.
    [61] R. M. Kramer, "Trust Rules for Trust Dilemmas: How Decision Makers Think and Act in the Shadow of Doubt", in R. Falcone, M. Singh, and Y. -H. Tan, editors, Trust in Cyber-societies, volume LNAI 2246, 2001: 9-26. Springer-Verlag, Berlin Heidelberg, 2001.
    [62] P. Lamsal, "Understanding Trust and Security", 2001, http://www.cs.Helsinki.fi/u/Lamsal/papers/UnderstandingTrustAndSecurity.pdf
    [63] J. M. Leimeister, P. Sidiras, H. Krcmar, "Success Factors of Virtual Communities from the Perspective of Members and Operators: An Empirical Study", in proceedings of the 37th Hawaii International Conference on System Sciences(HICSS), 2004.
    [64] Z. Liang, W. Shi, "Performance Evaluation of Different Rating Aggregation Schemes in Reputation Systems", in proceedings of the first IEEE International Conference on Collaborative Computing: Networking, Applications, and Worksharing(CollaborateCom'05), San Jose, 2005.
    [65] Z. Liang, W. Shi, "PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing", in proceedings of the 38th Hawaii International Conference on System Science(HICSS), 2005.
    [66] E. H. Lorenz, "Neither Friends nor Strangers: Informal Networks of Subcontracting in French Industry", in Diego Gambetta, editor, Trust, Basil Blackwell, 1988.
    [67] D. Lucking-Reiley, D. Bryan, N. Prasad, D. Reeves, "Pennies from eBay: the Determinants of Price in Online Auctions", 2000. http:/www.vanderbilt.edu/econ/reiley/papers/PenniesFromEBay.pdf.
    [68] N. Luhmann, "Trust and Power", Wiley, 1979.
    [69] U. Markus, "Characterizing the Virtual Community", SAP AG.
    [70] S. Marsh, "Formalising Trust as a Computational Concept", PhD Thesis, University of Stirling, UK, 1994.
    [71] R. C. Mayer, J. H. Davis, F. D. Schoorman, "An Integrative Model of Organizational Trust", Academy of Management Review, 1995, 20(3): 709-734.
    [72] D. H. McKnight and N. L. Chervany, "The Meanings of Trust", Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center, http://misrc.umn.edu/wpaper/, 1996.
    [73] D. H. McKnight, L Norman, N. L. Chervany, "Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model", in proceedings of the 34th Hawaii International Conference on System Science(HICSS), 2001.
    [74] N. Miller, P. Resnick, and R. Zeckhauser, "Eliciting Honest Feedback in Electronic Markets", working paper for the SITE'02 workshop, 2002, http://www.si.umich.edu/presnick/papers/elicit/
    [75] B. Misztal, "Trust in Modern Societies: The Search for the Bases of Social Order", Polity Press, 1996.
    [76] L. Mui, M. Mohtashemi, A. Halberstadt, "A ComPutational Model of Trust and Reputation", in proceedings of the 35th Hawaii International Conference on System Science (HICSS), 2002.
    [77] L. Mui, M. Mohtashemi, and A. Halberstadt, "Notions of Reputation in Multi-agent Systems: A Review", in proceedings of International Conference on Autonomous Agents and Multi-Agents Systems(AAMAS), 2002: 280-287.
    [78] L. Mui, "Computational Models of Trust and Reputation", PhD thesis, MIT, 2002.
    [79] A1. Oram, "Peer-to-Peer: Harnessing the Power of Disruptive Technologies", O'Reilly and Associates, 2001.
    [80] S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, "A Scalable Content-Addressable Network", in proceedings of ACM SIGCOMM 2001, San Diego, California, USA, 2001: 161-172.
    [81] P. Resnick, K. Kuwabara, R. Zeckhauser, E. Friedman, "Reputation Systems", Communications of the ACM, 2000, 43(12): 45-48.
    [82] P. Resnick, R. Zeckhauser, "Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System", Working Paper for the NBER workshop on empirical studies of electronic commerce, Jan 2001.
    [83] H. Rheingold, "The Virtual Community: Homesteading on the Electronic Frontier", Addison Wesley, 1993.
    [84] J. Sabater, C. Sierra, "Regret: A Reputation Model for Gregarious Societies", in proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, Canada, 2001: 61-69.
    [85] J. Sabater, C. Sierra, "Social ReGreT, a Reputation Model Based on Social Relations", SIGecom Exchanges, 2002, 3(1): 44-56.
    [86] J. Sabater, "Trust and Reputation for Agent Societies", PhD thesis, Universitat Autonoma de Barcelona, Spain, 2003.
    [87] M. Sako, "The Role of Trust in Japanese Buyer Supplier Relationships", Ricerche Economiche, 1991, 45(2-3): 449-474.
    [88] D. L. Shapiro, B. H. Sheppard, L. Cherakin, "Business on a Handshake", Negotiation Journal, 1992, 8(4): 365-377.
    [89] K. Siau, Z. Shen, "Building Customer Trust in Mobile Commerce", Communications of the ACM, 2003, 46(4): 91-94.
    [90] P. Slovic, "Trust, Emotion, Sex, Politics, and Science: Surveying the Risk-assessment battlefield", Risk Analysis, 1999, 19(4).
    [91] A. D. Smith, "Problems of Conflict Management in Virtual Communities", in Peter Kollock &Marc A. Smith(Eds.), Communities in Cyberspace, London and New York: Routledge, 1999.
    [92] K. Stanoevska-Slabeva, B. F. Schmid, "A Typology of Online Communities and Community Supporting Platforms", in proceedings of the 34th Hawaii International Conference on System Sciences(HICSS), 2001.
    [93] I. Stoica, R. Morris, D. Karger, F. Kaashoek, H. Balakrishnan, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications", in proceedings of ACM SIGCOMM 2001, San Diego, California, USA, 2001.
    [94] T. Sundsted, "The Practice of Peer-to-peer Computing: Trust and Security in Peer-to-peer Networks", IBM: developerworks, 2001, http://www-900.ibm.com/developerWorks/cn/java/j-p2p.
    [95] J. Swannell, editor. "The Oxford Modem English Dictionary". Clarendon Press, 1992.
    [96] P. Sztompka, "Trust: A Sociological Theory", Cambridge University Press, 1999.
    [97] Y. Wang and J. Vassileva, "Bayesian Network-based Trust Model", in proceedings of IEEE/WIC International Conference on Web Intelligence(WI 2003), 2003.
    [98] K. E. Weick, D. Meyerson, R. M, Kramer "Swift trust and temporary groups", in: R. M. Kramer and T. R. Tyler(Eds.), Trust in organizations: Frontiers of theory and research. Thousand Oaks, CA: Sage Publications, 1996: 166-195.
    [99] M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "The TrustBuilder Architecture for Trust Negotiation", IEEE Internet Computing, November/December 2002.
    [100] A. Whitby, A. Jφsang, J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems", in proceedings of the 7th Int. Workshop on Trust in Agent Societies (AAMAS'04), 2004.
    [101] L. Xiong, L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities", IEEE Trans. on Knowledge and Data Engineering, 2004, 16(7): 843-857.
    [102] R. Yahalom, B. Klein, T. Beth, "Trust Relationships in Secure Systems-a Distributed Authentication Perspective", in proceedings of IEEE Symposium on Research in Security and Privacy, 1993: 50-164.
    [103] W. T. Yao, "Trust Management for Widely Distributed Systems", PhD thesis, University of Cambridge, 2003.
    [104] B. Yu, M. P. Singh, "Towards a Probabilistic Model of Distributed Reputation Management", 4th Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, Canada, 2001.
    [105] T. Yu, M. Winslett, K. E. Seamons, "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation", ACM Transactions on Information and System Security, February 2003.
    [106] T. Yu, M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation", IEEE Symposium on Security and Privacy, Berkeley, California, May 2003.
    [107] B. Yu, M. P. Singh, and K. Sycara, "Developing Toast in Large-scale Peer-to-peer Systems, in proceedings of First IEEE Symposium on Multi-Agent Security and Survivability, 2004.
    [108] G. Zacharia, A. Moukas, P. Maes, "Collaborative Reputation Mechanisms in Electronic Marketplaces", in proceedings of the 32nd Hawaii International Conference on System Science, 1999.
    [109] G. Zacharia, P. Maes, "Trust Management through Reputation Mechanisms", Applied Artificial Intelligence, 2000, 14(9): 881-907.
    [110] L. Zadeh, "Fuzzy logic and approximate reasoning", Synthese, 1975: 407-428.
    [111] L. Zadeh, "Is Probability Theory Sufficient for Dealing with Uncertainty in AI: A Negative View", in Uncertainty in Artificial Intelligence, L. N. Kanal and J. F. Lemmer (Eds.), Elsevier Science B. V. (North-Holland), 1986.
    [112] Y. Zhong, Y. Lu, B. Bhargava, "Dynamic Trust Production Based on Interaction Sequence", Technical Report, CSD-TR 03-006, Dept. of Computer Sciences, Purdue University, Match 2003.
    [113] P. Zimmermann, "PGP(tm) User's Guide", October 1994.
    [114] 陈钟,刘鹏,刘欣,“可信计算概论”,信息安全与通信保密,2003.11:17-20.
    [115] 窦文,王怀民,贾焰,邹鹏,“构造基于推荐的Peer-to-Peer环境下的Trust模型”,软件学报,2004,15(4):571-583.
    [116] 海德格尔,“存在与时间”,陈嘉映、王庆节合译,生活·读书·新知三联书店,1999.
    [117] 胡鸿保,姜振华,“从‘社区’的语词历程看一个社会学概念内涵的演化”,学术论坛,2002.5
    [118] 李军,孙玉方,“计算机安全和安全模型”,计算机研究与发展,1996,33(4):312-320.
    [119] 刘龙,“关于网络经济中虚拟社区与品牌塑造的研究”,经济问题探索,2002.9
    [120] 罗家德,“网络网际关系行销”,社会科学文献出版社,2001.
    [121] 彭华民,侯莹,“论虚拟社区与人际互动”,重庆邮电学院学报,2001.1:11-15.
    [122] 戚攻,邓新民,“网络社会学”,四川人民出版社,2001.
    [123] 孙增圻,“计算机控制理论及应用”,1989,清华大学出版社,北京
    [124] 唐文,陈钟,“基于模糊集合理论的主观信任管理模型研究”,软件学报,2003,14(8):1401-1408
    [125] 唐文,“基于模糊集合理论的信任管理研究”,博士论文,北京大学,2003
    [126] 田凯,“政府与非营利组织的信任关系研究——一个社会学理性选择理论视角的分析”,学术研究,2005.1
    [127] 汪进,杨新,刘晓松,“一种新型的网格行为信任模型”,计算机工程与应用,2003(21):62-64
    [128] 王欢,郭玉锦,“网络社区及其交往特点”,北京邮电大学学报(社会科学版)2003,5(4):19-21
    [129] 王小英,赵海,林涛,张文波,尹震宇,“基于信任的普适计算服务选择模型”,通信学报,2005,26(5):1-8
    [130] 吴宏鑫,沈少萍,“PID控制的应用与理论依据”,控制工程,2003,10(1):37-42
    [131] 肖知兴,“名声和骗子的速度竞赛”,IT经理世界,2002.11
    [132] 徐锋,吕建,“Web安全中的信任管理研究与进展”,软件学报,2002,11(13):2057-2064.
    [133] 叶建亮,“经济学视野里的信用”,中国社会科学评论(经济学卷),2003(2):347-368
    [134] 曾建平,“网络传播个人化与虚拟社区的社会学思考”,华南师范大学学报(社会科学版),2002.5:37-40
    [135] 张荣沂,“专家系统中不确定性知识的表示和处理”,自动化技术与应用,2002,21(5):35-39
    [136] 张维迎,“信息、信任与法律”,生活·读书·新知 三联书店,2003:35-41
    [137] 郑也夫,“信任的简化功能”,北京社会科学,2000(3):113-119

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700