复杂在线信誉系统中若干关键问题的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近些年来,随着互联网技术的迅速发展,出现了许多大规模的分布式应用系统,如普适计算、网格、对等网络、Ad Hoc等。由于这类分布式应用系统的动态性、开放性、自治性等特性,使得主体在面对传统安全威胁同时,还要经常面对陌生的、理性的合作对象,从而出现了诸如“搭便车”、“公共悲剧”以及“资源不可信”等现象。这大大增加了主体利益受到新侵害的风险。因此,如何保护此类新环境下主体间可信性(例如,安全性,公平性等)成为近来研究的热点。在此背景下,作为研究的重点方向之一,研究人员提出了信任(誉)管理等相关技术,旨在通过“软安全”方法来保障开放环境中主体面临的可信性问题。本文针对现有信誉系统研究中存在的问题,主要从信任评估粒度、主体合作理论以及主体信任结构等三个方面展开,并提出了问题的解决方案。其主要贡献如下:
     (1)在信任评估的粒度研究中,针对如何选择合适的推荐主体以及分析其推荐信息的可靠性等两大问题,提出了一种细粒度信任计算模型。该模型将服务质量进行细粒度化,在选择推荐主体时,通过定义朋友因子来反映主体间关系的亲疏,从而选择合适的推荐主体。在分析推荐信息时,通过分析主体的即时状态、推荐错误以及偏好相似性等信息,从而提高推荐信息的精确性。相关实验结果表明,当服务质量的维数增加时,该模型可以有效地抑制恶意主体。
     (2)在主体合作理论研究中,针对在信誉系统中如何促使主体间合作产生的问题,提出了一种基于群体的方案。该方案以群体选择理论为基础,将信誉系统中主体依据其存在的社会联系分成独立的“群体”,并从主体层次和群体层次来分析了其演化动态性。相关实验表明,该方案可以有效地抑制不合作主体。
     (3)在主体信任结构研究中,针对主体信任结构对于系统安全影响的问题,提出了一种利用信任思想来分析桥式信任结构安全性的方法,该方法将现有桥式信任结构抽象成(m,n)星型结构,并证明了(m,n)桥式信任结构“扮演风险”上限为1-(n-1)/2mn,据此,给出了现有桥式信任结构修改方案。
With the development of Internet technologies, it emerges a lot of large scale distributed systems, such as Ubiquitous computing, Grid computing, Peer-to-Peer (P2P) computing, Ad hoc networks, etc. Because of the dynamics, openness and autonomy nature of these systems, it may harm users' benefit under the increasing risks. Therefore, there are big challenges how to solve the trust issues (e.g., security, fairness) among participants in this kind of environment. Reputation systems which designed to address these problems represent a significant trend in decision support for internet mediated service provision. The basic idea is to let parties rate each other after the completion of an interaction, and use the aggregated ratings about a given party to derive a reputation score, which can assist other parties in deciding whether or not interact with that party in near future. Facing the weakness of the existing work, in this dissertation, we highlight several key research topics, such as, granularity of trust evaluation, cooperation theory and trust overlay.
     The contributions of this dissertation are list as follows:
     (1) Granularity of Trust Evaluation. We propose a fine-grained trust computation model for P2P networks. Our model defines the service as a fined-grained quality-of-service (QoS) (N-dimensional vector), and in order to accurate the recommendation trust computing, several concepts are introduced to reflect the recommenders'current status, history behavior, and the gap between these two behaviors. Also, we firstly introduce the Gauss-bar function to measure the preference similarity between peers. All these will result in a flexible model which represents trust in a manner more close to human intuitions and satisfies the diverse QoS requirements of peers in P2P networks.
     (2) Cooperation Theory. We propose a group-based scheme to enhance cooperation for online reputation systems. In this section, we define related concepts to capture the social structure and ties among participants in reputation system, e.g., group, assortativity, etc. Also, we use Femi distribution function to reflect the bounded rationality of participants and the existing of stochastic factors in evolutionary process.
     (3) Trust Overlay. We propose two methods to analyze structured trust overlay and un-structured trust overlay, repectively. In the first method, we analyze the security issues in PKI trust model, especially for Bridge Certificate Authorities (BCA), by using the concept of "impersonation risk", and prove the upper of "impersonation risk" of BCA trust model is 1-(n-1)/2mn. Based on that, we finally propose a new modified BCA model, which enhances its security, but a bit more complex in certificate path building and implementation than existing one. In the seconde method, we develop a mathematical framework to analyze the stochastic dynamics of trust structure, which enabling agents to change. Our method can instruct to how enhance agent cooperation, or design reward and punishment mechanisms in open networks.
引文
[1]黄继武,沈昌祥,张焕国,等.信息安全综述[J].中国科学E辑,2009,37:129-150.
    [2]S.D.T.,杨孝宗,C. Ram, et al.可信计算的产业趋势和研究[J].计算机学报,2007,30:1645-1661.
    [3]徐峰,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064.
    [4]耿秀华.基于证书的信任管理研究[D].北京:北京交通大学计算机与信息技术学院,2009.
    [5]L. Rasmusson, S. Jansson. Simulated Social Control for Secure Internet Commerce [C]. In New Security Paradigms Workshop,1996:18-26.
    [6]Stephen P M. Formalising Trust as a Computational Concept [D]. Stirling:University of Stirling,1994.
    [7]Feng L, Jie W. Mobility reduces uncertainty in MANETs [C]. IEEE INFOCOM, USA, 2007:1946-1954.
    [8]James S. C. Foundations of Social Theory [M]. London:Belknap Press of Harvard University Press,1990.
    [9]Lagenspetz 0. Legitimacy and Trust [J]. Philosophical Investigations,1992, 15(1):1-21.
    [10]Harold G. A Conception of, and Experiments With, "Trust" as a Condition of Stable Concerted Actions [M]. New York:Motivation and Social Interaction. Ronald Press, 1963.
    [11]Berg J, Dickhaut J, McCabe K. Trust, reciprocity, and social history [J]. Games and Economic Behavior,1995,10:122-142.
    [12]Luis M B C. The Economics of Trust and Reputation:A Primer [R]. New York University and CEPR,2006.
    [13]Barbara M. Trust in Modern Societies:The Search for the Bases of Social Order [M]. Cambridge:Polity Press,1996.
    [14]Annette B. Trust and Antitrust [J]. Ethics,1986,96(2):231-260.
    [15]Carolyn M. Trust [R]. The Stanford Encyclopedia of Philosophy,2006.
    [16]D. H. M, N. L. Chervany. The Meanings of Trust [R]. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center,1996.
    [17]Diego G. Can We Trust Trust? [M]. Oxford:Uversity of Oxford,1988.
    [18]Tyrone G, Morris S. A Survey of Trust in Internet Applications [J]. IEEE Communications Surveys and Tutorials,2000,3(4):1-30.
    [19]Daniel O, Omer F R, Brian M, et al. Security and trust issues in semantic grids [C]. In Semantic Grid:The Convergence of Technologies, volume 05271 of Dagstuhl Seminar Proceedings. Internationales Begegnungs-und Forschungszentrum (IBFI), Germany,2005:53-69.
    [20]Donovan A, Yolanda G. A survey of trust in computer science and the Semantic Web [J]. Web Semant,2007,5 (2):58-71.
    [21]Nahapiet J, Ghoshal S. Social Capital, Intellectual Capital and Organizational Advantage [J]. Academy of Management Review,1998,23(2):242-266.
    [22]Adams W J, Davis N J. Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration [C]. Proc.6th Annual IEEE SMC Information Assurance Workshop, USA,2005:317-324.
    [23]Capra L. Toward a Human Trust Model for Mobile Ad-hoc Networks [C]. Proc.2nd UK-UbiNet Workshop, UK,2004:1-2.
    [24]KSeshadri Ramana, A A Chari, N Kasiviswanth. A survey on trust management for mobile Ad Hoc networks [J]. International Journal of Network Security and Its applications, 2010,2 (2):75-85.
    [25]Zhou R, Hwang K. PowerTrust:A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007,18(4):460-473.
    [26]Jφsang A, Ismail R, Boyd C. A Survey of Trust and Reputation Systems for Online Service Provision [J]. Decision Support Systems,2007,43(2):618-644.
    [27]R Aringhieri, E Damiani, S D C D Vimercati, et al. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems [J]. J. Am. Soc. Inf. Sci. Technol.,2006,57:528-537.
    [28]Paul R, Richard Z, Eric F, et al. Reputation Systems [J]. Communications of the ACM,2000,43(12):45-48.
    [29]L Mekouar, Y Iraqi, R Boutaba. A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems [C]. In 15th IFIP/IEEE International Workshop on Distributed Systems:Operations & Management, USA,2004:208-219.
    [30]S Kamvar, M Schlosser. The EigenTrust Algorithm for Reputation Management in P2P Networks [C]. The 12nd International World Wide Web Conference, Hungary, 2003:640-651.
    [31]W Dou, H M Wang, Y Jia, P Zou. A recommendation-based peer-to-peer trust model [J]. Journal of Software,2005,15(4):571-583.
    [32]F Cornelli, E Damiani, D C Di Vimercati, et al. Choosing reputable servents in a P2P network [C]. The 11th International World Wide Web Conference, USA,2002: 441-449.
    [33]L Xiong, L Liu. PeerTrust:Supporting Reputaion-Based Trust for Peer-to-Peer Electronic Communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7):843-857.
    [34]K Walsh, E G Sirer. Experience with an object reputation system for peer-to-peer filesharing [C]. Symposium on Networked System Design and Implementation, USA, 2006:1-14.
    [35]KAberer, P Cudre-Mauroux, A Datta, et al. P-Grid:A Self-organizing Structured P2P System [J]. In SIGMOD Record,2003,32(2):29-33.
    [36]E Damiani, S D C di Vimercati, S Paraboschi, et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks [C]. The 9th ACM conference on Computer and Communications Security, USA,2002:207-216.
    [37]K Aberer, Z Despotovic. Managing Trust in a Peer-to-Peer Information System [C]. In Proc. of the IX International Conference on Information and Knowledge Management, USA,2001:310-317.
    [38]S Lee, R Sherwood, B Bhattacharjee. Cooperative peer groups in NICE[C]. IEEE Infocom, USA,2003:1272-1282.
    [39]S Song, K Hwang, R Zhou. Trusted P2P Transactions with Fuzzy Reputation Aggregation [J]. IEEE Internet computing,2005,9(9):24-34.
    [40]J Sabater, C Sierra. Reputation and social network analysis in multi-agent systems [C]. First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Italy,2002:475-482.
    [41]Beth T, Malte B, Birgit K. Valuation of trust in open networks [C]. In:Proc. of the Conf. on Computer Security, New York,1994:3-18.
    [42]L Mui, M Mohtashemi, A halberstadt. A computational Model of trust and reputation [C]. Proceedings of the 35th Hawaii International Conference on System Sciences, USA,2002:2431-2439.
    [43]Yao Wang, Julita Vassileva. Bayesian Network Trust Model in Peer-to-Peer Networks [J]. Agents and Peer-to-Peer Computing,2005,2872:23-34.
    [44]Josang A. A logic for uncertain probabilities [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.
    [45]Yu B, Singh M. An Evidential Model of Distributed Reputation Management [C]. The 1st Int Joint Conf on Autonomous Agents and Multi-agent Systems, Italy,2002:294-301.
    [46]Manchala D. E-commerce trust metrics and models [J]. IEEE Internet Computing,2000, 4(2):36-44.
    [47]J Sabater, C Sierra. Regret:A reputation model for gregarious societies [C]. In 4th Workshop on Deception Fraud & Trust in Agent Societies, Canada,2001:61-70.
    [48]Falcone R, Castelfranchi C. Social Trust:A cognitive approach [M]. Norwell:Kluwer Academic Publishers,2001.
    [49]屈延文.软件行为学[M].北京:电子工业出版社,2004.
    [50]Hales D, Arteconi S. Article. SLACER:A Self-organizing Protocol for Coordination in P2P Networks [J]. IEEE Intelligent Systems,2006,21(2):29-35.
    [51]Despotovic Z, Aberer K. P2P reputation management:Probabilistic estimation vs. social networks [J]. Computer Networks,2006,50(4):485-500.
    [52]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
    [53]李海华,杜小勇,田萱.一种能力属性增强的Web服务信任评估模型[J].计算机学报,2008,19(8):1471-1477.
    [54]翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型[J].软件学报,2007,18(8):2002-2015
    [55]丁旭阳,范明钰,朱大勇,等.无线网状网基于不确定性度量极小化信任模型[J].软件学报,2008,19(1):116-124.
    [56]李景涛,荆一楠,肖晓春,等.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167.
    [57]彭冬生,林闯,刘卫东.一种直接评价节点诚信度的分布式信任机制[J].软件学报,2008,19(4):946-955.
    [58]吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评价模型[J].计算机研究与发展,2008,45(3):408-416
    [59]Hoffman K, David Zage, Cristina Nita-Rotaru. A survey of attack and defense techniques for reputation systems [J]. ACM Computing Surveys,2009,42(1):1-31.
    [60]田慧蓉.P2P网络信任模型与激励机制的研究[D].北京:北京邮电大学计算机科学与技术学院,2006.
    [61]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521.
    [62]荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730.
    [63]李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133.
    [64]张焕国,罗捷,金刚,等.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518.
    [65]Y Cui, M Li, Y Ren, et al. An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation [J]. IEICE Transactions,2009,92-A(5):1339-1346.
    [66]陈博,李明楚,任一支.基于信任度的改进凭证链发现算法[J].计算机工程,2008,34(22):174-176.
    [67]崔永瑞,李明楚,胡红刚,等.基于信任度的网格虚拟组织访问控制模型[J].计算机科学,2008,35(12):83-86.
    [68]崔永瑞,李明楚,任一支.一种健壮的可扩展网格信誉系统[J].小型微型计算机系统,2009,30(7):1383-1387.
    [69]李明楚,杨彬,钟玮,等.基于反馈机制的网格动态授权新模型[J].计算机学报,2009,32(11):2187-2200.
    [70]Y Ren, M Li, Y Cui, et al. Enhancing Cooperative Behavior for Online Reputation Systems by Group Selection [C]. Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Australia,2009:568-573.
    [71]Y Cui, M Li, Yizhi Ren, et al. A Quality-of-Service based Fine-grained Reputation System in the Grid Economy [C]. Proceedings of Symposium on Cryptography and Information Security, Japan,2009:156-161.
    [72]L Xiong, L Liu, M Ahamad. Countering sparsity and vulnerabilities in reputation systems [R]. Tech. Rep. TR-2005-017-A, Emory University,2005.
    [73]Y Ren, M Li, C Guo, et al. Trust Similarity Measure in Trust Model for P2P Networks [C]. Proceedings of the IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications, China,2008:107-112.
    [74]M Li, Y Ren, K Sakurai, et al. Granularity Considering in Trust Model for P2P Networks [C]. Proceedings of the 22nd IEEE International Conference on Advanced Information Networking and Applications Workshops, Japan,2008:307-312.
    [75]Y Ren, M Li, K Sakurai. FineTrust:A Fine-grained Trust Model for P2P Networks [J]. Wiley's Security and Communication Networks Journal,2010,10.1002/sec.165.
    [76]C Guo, M Li, K Sakurai, et al. A Trust Data Storage Management System based on Verifiable Secret Sharing in P2P Networks [C]. Proceeding of Computer Security Symposium, Japan,2008:953-958.
    [77]Y Ren, M Li, K Sakurai. Toward the Evolving Trust Overlay:An Evolutionary Game View. The 2nd Annual Meeting of Asian Association for Algorithms and Computation, Hangzhou, China,2009:5.
    [78]Caverlee J, Liu L, Webb S. Towards robust trust establishment in web-based social networks with socialtrust [C]. International World Wide Web Conference, Beijing, China,2008:1163-1164.
    [79]Mui L. Computational Models of Trust and Reputation:Agents, Evolutionary Games, and Social Networks [D]. Cambridge:Massachusetts Institute of Technology,2002.
    [80]Aberer K, Despotovic Z, Galuba W, et al. The complex facets of reputation and trust [C]. International Conference 9th Fuzzy Days, Dortmund, Germany,2006:283-294.
    [81]E. Adar, B. A. Huberman. Free riding on Gnutella Technical Report[R], Xerox PARC, 2000.
    [82]M Ham, G Agha. ARA:a robust audit to prevent free-riding in P2P networks [C]. IEEE International Conference on Peer-to-Peer Computing, Germany,2005:125-132.
    [83]C Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior[C]. ACM conference on Electronic Commerce, USA, 2000:150-157.
    [84]Dingledine R, Freedman M J, Molnar D. Accountability measures for peer-to-peer systems, Peer-to-Peer:Harnessing the Power of Disruptive Technologies [M]. Sebastopol:O'Reilly and Associates,2000.
    [85]M Ekstrom, H. Bjornsson. A rating system for AEC e-bidding that accounts for rater credibility [C]. Proceedings of the CIB W 65 symposium, USA,2002:753-766.
    [86]L C Freeman. Centrality in social networks:Conceptual clarification [J]. Social networks,1979,1:215-239.
    [87]Fredeman E, Resnick P. The social cost of cheap pseudonyms [J]. Journal of Economics and Management Strategy,2001,10(2):173-199.
    [88]Gambetta D. Can we trust trust? [M]. Oxford:Basil Blackwell,1990.
    [89]Page L, Brin S, Motwani R, et al. The PageRank ciation ranking:Bringing order to the web [R]. Technical report, Stanford Digital Library Technologies Project,1998.
    [90]Josang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision [J]. Decision Support Systems,2005,43(2):618-644.
    [91]Edmonds B., Norling E., Hales D. Towards the Evolution of Social Structure [J]. Computational and Mathematical Organization Theory,2009,15(2):78-94.
    [92]Hales D, Arteconi S, Marcozzi A, et al. Towards a group selection design pattern [R]. Technical Report UBLCS-2007-25,2007.
    [93]Marcozzi A, Hales D. Emergent Social Rationality in a Peer-to-Peer System [J]. Advances in Complex Systems (ACS),2008,11(4):581-595.
    [94]Martin A Nowak. Five rules for the evolution of cooperation [J]. Science,2006, 314(5805):1560-1563.
    [95]Karl A, Zoran D. Managing trust in a peer-2-peer information system [C]. The international conference on Information and knowledge management, Atlanta, USA, 2001:310-317.
    [96]Zoran D, Karl A. Probabilistic prediction of peers' performance in P2P networks [J]. Eng. Appl. of AI,2005,18(7):771-780.
    [97]Schmidt S, Steele R, Dillon T S, et al. Fuzzy trust evaluation and credibility development in multi-agent systems [J]. Applied Soft Computing,2007, 7(2):492-505.
    [98]Srivatsa M, Xiong L, Liu L. TrustGuard:countering vulnerabilities in reputation management for decentralized overlay networks[C]. The 14th international conference on World Wide Web, USA,2005:422-431.
    [99]邓聚龙.灰色系统理论教程[M].武汉:华中理工大学出版社,1990.
    [100]徐兰芳,胡怀飞,桑子夏,等.基于灰色系统理论的信誉报告机制[J].软件学报,2007,18(7):1730-1737.
    [101]Levien R. Attack Resistant Trust Metrics [D]. Berkeley:University of California at Berkeley,2004.
    [102]Ziegler C N, Lausen G. Spreading activation models for trust propagation [C]. The IEEE International Conference on e-Technology, e-Commerce, and e-Service, Taiwan,2004:83-97.
    [103]Kandori M, Matsushima H. Private observation, communication and collusion [J]. Econometrica,1998,66(3):627-652.
    [104]Kreps D M, Wilson R. Reputation and imperfecct information [J]. Journal of Economic Theory,1982,27:253-279.
    [105]Mailath G, Morris S. Repeated Games with Almost-Public Monitoring [J]. Journal of Economic Theory,2002,102(1):189-228.
    [106]Henrich J, Boyd R. Why People Punish Defectors:Weak Conformist Transmission can Stabilize Costly Enforcement of Norms in Cooperative Dilemmas [J]. Journal of Theoretical Biology,2001,208(1):79-89.
    [107]Kandori M. Social norms and community enforcement [J]. The Review of Economic Studies,1992,59(1):63-80.
    [108]代亚非,李勇军.对等网络信任机制研究[J].计算机学报,2010,33(3):390-405.
    [109]Stoica I, Morris R, Karger D, et al. Chord:A scalable peer-to-peer lookup service for internet applications[C]. The conference on Applications, technologies, architectures, and protocols for computer communications, Barcelona, Spain, 2001:149-160.
    [110]Sylvia R, Paul F, Mark H, et al. A scalable content-addressable network [J]. ACM SIGCOMM Computer Communication Review,2001,31(4):161-172.
    [111]Antony R, Peter D. Pastry:Scalable, decentralized object location, and routing for large-scale peer-to-peer systems [C]. Middleware, Germany,2001:329-350.
    [112]Zhao B Y, Kubiatowicz J D, Joseph A D. Tapestry:An infrastructure for fault-tolerant wide-area location and routing [J]. Computer,2001,32(1):11-20.
    [113]Zhang Y, Fang Y. A fine-grained reputation system for reliable service selection in peer-to-peer networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2007,18(8):1134-1145.
    [114]Abdul-Rahman A, Hailes S. Supporting trust in virtual communities [C]. The 33rd Annual Hawaii International Conference on System Sciences, USA,2000:6007-6016.
    [115]Vinny C, Brian S, Elizabeth G, et al. Using trust for secure collaboration in uncertain environments [J]. IEEE Pervasive Computing,2003,2 (3):52-61.
    [116]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583.
    [117]张骞,张霞,文学志,等.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,200617(1):96-107.
    [118]常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307.
    [119]Silaghi G C, Arenas A E, Silva L M. Reputation-based trust management systems andtheir applicability to grids [R/OL]. CoreGRID Technical Report,2007.
    [120]Jφsang A. Trust-based decision making for electronic transactions [C]. Fourth. Nordic Workshop on Secure IT Systems, Sweden,1999:1-21.
    [121]Jφsang A, Ismail R. The beta reputation system [C]. Proceedings of the 15th Bled Electronic Commerce Conference, Slovenia,2002:324-338.
    [122]Ernesto D, Sabrina D C D V, Stefano P, et al. Managing and sharing servents' reputations in P2P systems [J]. IEEE Transaction Knowledge Data Engineering,2003, 15(4):840-854.
    [123]Wright S. Tempo and mode in evolution:a critical review [J]. Ecology,1945, 26:415-419.
    [124]Wilson D S, Sober E. Reintroducing group selection to the humsan behavioral sciences [J]. Behavioral and Brain Sciences,1994,17(4):585-654.
    [125]Arne Traulsen, Martin A Nowak. Evolution of cooperation by multilevel selection [J], PNAS,2006,103(29):10952-10955.
    [126]Keller L. Levels of Selection [M]. Princeton:Princeton University Press,1999.
    [127]Paulsson J. Multileveled Selection on Plasmid Replication [J]. Genetics,2002, 161:1373-1384.
    [128]Henrich J. Cultural group selection, co-evolutionary processes and large-scale cooperation [J]. Journal of Economic Behavior and Organisation,2004,53:3-35
    [129]David B K, Philip K M, Charles O. Using group selection to evolve leadership in populations of self-replicating digital organisms [C]. Genetic and Evolutionary Computation Conference, England,2007:293-300.
    [130]Nandi A, T W Ngan, A Singh, et al. Providing incentives in cooperative content distribution systems [C]. ACM/IFIP/USENIX 6th International Middleware Conference, France,2005:270-291.
    [131]Istvan S. Evolution of generous cooperative norms by cultural group selection [J]. Journal of Theoretical Biology,2009,257:297-407.
    [132]Borety B, Peter J R. Group Beneficial Norms Can Spread Rapidly in a Structured Population [J]. Journal of Theoretical Biology,2002,215:287-296.
    [133]Sepandar K, Beverly Y, Hector G M. Addressing the Non-Cooperation Problem in Competitive P2P Systems [C]. In Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA,2003:1-6.
    [134]Wang Y F, Hori Y, Sakurai K. Characterizing economic and social properties of trust and reputation systems in P2P environment [J]. Journal of Computer Science and Technology,2008,23(1):129-140.
    [135]Hales D, Arteconi S. SLACER. A Self-Organizing Protocol for Coordination in P2P Networks [J]. IEEE Intelligent Systems,2006,21(2):29-35.
    [136]Hales D. Emergent Group Level Selection in a Peer-to-Peer Network [J]. Complexus, 2006,3:108-118.
    [137]Theodore C B. Evolution of Social Behavior:Individual and Group Selection [J], Journal of Economic Perspectives,2002,16(2):67-88.
    [138]Clutton-Brock T H, Parker G A. Punishment in animal societies [J]. Nature,1995, 373:209-216.
    [139]Fehr E, Gachter S. Altruistic punishment in humans [J]. Nature,2002,415: 137-140.
    [140]Hisashi O, Yoh I, Martin A. Nowak. Indirect reciprocity provides only a narrow margin of efficiency for costly punishment [J]. Nature,2009,457:79-82.
    [141]Shaikh, R. Jameel, H., d'Aurol, B., Lee, et al. Group-based Selection Trust Management scheme for clustered wireless sensor networks [J]. IEEE Transactions on Parallel and Distributed Systems,2009,20(11):1698-1712.
    [142]Hales D, Stefano A, Andrea M, et al. Towads a Group Selection Design Pattern[R]. Technical Report UBLCS-2007-25, University of Bologna, Dept. of Computer Science. [DELISTR-0568],2007.
    [143]M Cooper, Y Dzambasow, P Hesse, et al. Internet X.509 Public Key Infrastructure: Certification Path Building [R]. RFC 4158, September,2005.
    [144]Steve L. Understanding Certification Path Construction [R]. PKI Forum White Paper, September,2002.
    [145]Cooper D, Santesson S, Farrell S, et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile [R]. RFC5280, May 2008.
    [146]Chris C, Peter v D, Francis V, et al. PKI Interoperability Models [R]. White Paper for Galexia Consulting, July 2005.
    [147]PKI Forum. CA-CA Interoperability White paper [R]. March 2001.
    [148]PKI International Scan [R/OL]. April 16,2003.[2003-4-31] http://www. tbs-sct. gc.ca/pkiicp/pki-in-practice/efforts/efforts e.asp.
    [149]Jung E, Gouda M G. Vulnerability Analysis of Certificate Graphs [J]. International Journal of Security and Networks,2006,1(2):13-23.
    [150]Peter A. The U. S. Federal PKI and the Federal Bridge Certification Authority [J]. Computer Networks,2001,37(6):685-690.
    [151]Jφsang A, Golbeck Jennifer. Challenges for robust of trust and reputation systems [C]. Workshop on Security and Trust, Saint Malo, Franc,2009:1-12.
    [152]Albert R, A L Barabasi. Statistical mechanics of complex networks [J]. Rev. Mod. Phys,2002,74:47-97.
    [153]Boccaletti S, Latora V, Moreno Y, et al. Complex networks:structure and dynamics [J]. Phys. Rep,2006,424:175-308.
    [154]Newman M E J. The Structure and Function of Complex Networks [J]. SIAM Review, 2003,45:167-256.
    [155]Milgram S. Psychol [J]. Today,1967,2:60-67.
    [156]D J Watts, S H Strogatz. Collective dynamics of 'small-world' networks [J]. Nature, 1998,393:440-42.
    [157]A-L Barabdsi, R Albert. Emergence of scaling in random networks [J]. Science, 1999,286:509-512.
    [158]S N Dorogovtsev, Mendes J F F, A N Samukhin. Size-dependent degree distribution of a scale-free growing network [J]. Phys. Rev. E,2001,63(6):2101-2105.
    [159]Maynard S, J Price, G R. The logic of animal Conflict [J]. Nature,1973, 246(1):15-18.
    [160]Hofbauer J, K Sigmund. Evolutionary Games and Population Dynamics [M]. Cambridge: Cambridge University Press,1998.
    [161]Erez L, Christoph H, Martin A Nowak. Evolutionary Dynamics on Graphs [J]. Nature, 2005,433:312-316.
    [162]Foster D, Young H. Stochastic evolutionary game dynamics [J]. Theoretical Population Biology,1990,38:219-232.
    [163]Roger D, Michael J Freedman, David Molnar. The Free Haven Project:Distributed Anonymous Storage Service [C]. Workshop on Design Issues in Anonymity and Unobservability, USA,2000:67-95.
    [164]N Leibowitz, M Ripeanu, A Wierzbick. Deconstructing the Kazaa Network [C]. IEEE Workshop on Internet Applications, Santa Clara, CA,2003:112-120.
    [165]B Yu, M P Singh. A social mechanism of reputation management in electronic communities [C]. The 4th InternationalWorkshop on Cooperative Information Agents IV, the Future of Information Agents in Cyberspace, USA,2000:154-165.
    [166]P Zimmermann, The official PGP user's guide [M]. Cambridge:MIT Press,1995.
    [167]M Castro, P Druschel, A Ganesh, A Rowstron, et al. Secure routing for structured peer-to-peer overlay networks [J]. SIGOPS Oper. Syst. Rev.,2002,36(SI):299-314.
    [168]P Michiardi, R Molva. CORE:a collaborative reputation mech-anism to enforce node cooperation in mobile ad hoc networks [J]. Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Netherlands,2002:107-121.
    [169]L Xiong, L Liu. A reputation-based trust model for peer-to-peer e-commerce communities [C]. IEEE Conference on Electronic Commerce, USA,2003:275-284.
    [170]S Buchegger, J Y Le Boudec. A robust reputation system for P2P and mobile ad-hoc networks [C]. The Second Workshop on the Economics of Peer-to-Peer Systems, USA, 2004:1-6.
    [171]R Guha, R Kumar, P Raghavan, et al. Propagation of trust and distrust [C]. International conference on World Wide Web, USA,2004:403-412
    [172]M Feldman, K Lai, I Stoica, et al. Chuang. Robust incentive techniques for peer-to-peer networks [C]. The 5th ACM conference on Electronic commerce, USA, 2004:102-111.
    [173]S Marti, H Garcia-Molina. Limited reputation sharing in P2P systems. [C]. The 5th ACM conference on Electronic commerce, USA,2004:91-101.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700