大规模分布式环境下动态信任管理机制的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Internet技术的发展,大规模分布式计算环境,如P2P计算、网格计算、AdHoc网络、社会网络等得到了广泛的应用。这类计算环境下的新的应用模式通常表现为由多个异构的系统或软件服务组成的动态协作系统。这类系统的形态正从封闭的、面向熟识用户群体的、相对静态的形式,向开放的、面向公共用户的、动态协作的模式转变。这些特性使得这类系统表现出很强的复杂性和动态性,也使得我们很难通过“控制”来适应这种环境,即很难用传统的中央控制机制来管理这类系统的安全。同时,以P2P文件分享系统、大型电子商务系统、社交网站为代表的新的应用模式也带来了信息过载、节点自私性等新的管理问题。
     现实中人类社会也具备上述的特点并且更为显著。信任是人类社会的重要基石之一。在社会科学、商业等诸多领域中,特别是人们的日常生活中,信任都在时刻发生着作用。所以,近年来计算机科学领域中的信任管理模型的研究主要是通过借鉴社会学、心理学等领域中有关信任的研究成果,通过“信任”来简化上述系统的复杂性。
     本文主要围绕上述的大规模分布式计算环境的特点,研究适合这些特点的动态信任管理机制来解决此环境下的应用的安全管理问题,并在此基础上探索了利用动态信任管理机制来解决此环境下新的应用模式带来的信息过载、节点自私性问题的可能方法。本文的主要研究内容和创新点归纳如下:
     1)目前的信任管理机制的研究中,通常采用数学以及人工智能等方面的理论和方法来形式化的描述一定环境下的信任关系,从而实现此环境下的信任评估。本文首先分析了大规模分布式计算环境下信任和信任管理的特点,借鉴了信任在其他学科的研究成果,归纳总结了计算机科学领域中信任研究的进展情况。在此基础上,本文定义了目前有代表性的动态信任关系的概念和动态信任关系的基本性质,给出了适应大规模分布式计算环境需求的动态信任管理模型所必须具备的特征,讨论了信任的度量方法。综合上述研究内容,本文设计了一个基于声誉的分布式动态信任管理模型。该模型能够成为传统安全技术的一种有益补充,作为“软安全”机制,与传统的安全机制协作实现大规模分布式计算环境下的系统安全性。
     2)现有的大多数信任管理模型都是使用固定的公式和预定义的参数等来表述信任关系。它们常常面临两个问题:一是大规模分布式计算环境下的极端动态性导致这些固定的公式和预定义的参数很难适用。二是如果要建立的信任关系必须面向信任的多个属性,由于多属性之间的关联常常是模糊、不确定的,而固定的公式和预定义的参数很难描述这种模糊、不确定性。本文基于进化计算中的“涌现”性的学习模型,将机器学习引入信任管理,提出了一个针对多属性信任关系的动态评估模型。该模型能综合对信任的多属性进行评估,并能够在不断的执行动态评估任务的过程中,自主的学习,自主的提高模型的评估任务的执行能力,从而适应上述的动态性和模糊性。
     3)解决新的应用模式下存在的信息过载问题,在海量的数据中迅速准确的找到用户可能感兴趣的内容并推荐给用户,对于今天的大型电子商务应用系统来说是一个至关重要的问题。以协同过滤为代表的推荐技术是当前的一个研究热点。我们探索了动态信任管理在个性化推荐系统的应用方法。我们将动态信任管理模型和协同过滤技术结合起来,设计了一个基于信任的个性化推荐系统。该系统将信任度、评价度和推荐度统一起来,利用用户间的评价相似性生成信任关系,并用前述的信任模型来管理这些信任关系。这样,用户就可以根据信任关系及其他用户给出的评价来预测自身对未知资源目标的评分。从而利用信任管理来解决协同过滤中由于用户评价项目的稀疏性、评价信息不准确等问题带来的推荐准确度不高的问题。
     4)合作涌现问题是指“自私”的个体群体中为何会出现“合作”行为,它是多个学科领域的研究热点。这个问题在计算机科学中最重要的应用是:在以P2P文件共享等为代表的应用中,系统由异构的个体构成,这些个体必须通过合作来获得系统的总体公共目标。因而个体的“自私性”必将导致系统中free-riding问题的出现。我们认为信任关系在人类社会的合作涌现中起着非常重要的作用。因此在本文中对以信任为基础的合作激励机制进行了探索。我们设计了一个基于经典囚徒困境问题的演化游戏。在游戏中我们加入了以信任为基础的合作激励机制,即交互的双方的行为除了会影响到双方的收益之外,还会影响到双方的声誉变化。而其他的交互者则会根据对方的声誉来选择自身的行为。演化实验的结果说明,信任在游戏中成功的促进了合作,起到了合作激励的作用。
With the development of Internet technology, large-scale distributed computing environ-ments such as P2P computing, grid computing, Ad Hoc networks, social networks have beenwidely used. The new application models in such computing environment typically be com-posed by multiple heterogeneous systems or software services. Now, such models moving fromthe closed, facing familiar user groups, relatively static form, to open for public users, dynamiccollaboration paradigm shift. These features give the great complexity and dynamic to thesesystems. It is impossible to "Control" this systems, i.e. that is difficult to use traditional cen-tral control mechanisms to manage the security of such systems. Meanwhile, P2P file sharingsystem, large e-commerce systems, social networking sites as a representative of these new ap-plication models also brings information overload, the "selfish" node and other new issues.
     Human society also has the above characteristics, and maybe more significant."Trust"is one of the cornerstones of human society. In the social sciences, business and many otherareas, especially in people's daily life, trust is happening in the moment of action. Therefore,by drawing sociology, psychology and other fields of research about trust, trust management iswidely researched in computer science in recent years. These researches want to use "trust" tosimplify the complexity of the systems.
     Thisthesismainlyfocusonthecharacteristicsoflarge-scaledistributedcomputingenviron-ment. We has proposed suitable dynamic trust management mechanisms for this environment,and explored the possible ways to address the new issues such as the information overload and"selfish" node by using trust management mechanisms. The main contents and novelties areillustrated as follows:
     1)The current trust management mechanisms, usually using mathematical, artificial intelli-gence and other aspects of the theory and methods to describe the formal relations of trust undercertain circumstances, in order to achieve trust evaluation in these environment. We analyzedthe characteristics of dynamic trust in large-scale distributed computing environment by draw-ing sociology, psychology and other fields of research about trust, summarized the progressof the research progress of trust in computer science, discussed the characteristics of dynamictrust management mechanism in large-scale distributed computing environment. On this ba- sis, we proposed a reputation-based distributed dynamic trust management mechanism. Thismechanism, as a "soft security" mechanism, can be a useful supplement to the traditional secu-rity mechanism. This mechanism can collaborate with the traditional security mechanisms toachieve security in large-scale distributed computing environment.
     2)Most of the existing trust management mechanisms are using fixed formulas and prede-fined parameters to describe the trust relationship. These mechanisms always have two prob-lems: one is the fixed formulas and predefined parameters can not adopt the dynamic envi-ronment; the other is the fixed formulas and predefined parameters can not describe the fuzzyrelationship between different attributes of trust. We designed a dynamic evaluation model formulti-attributes trust relationship. This model achieves the learning ability by using evolution-ary computing. With autonomous learning, the model can improve it's evaluation performanceof its own. Therefore, this model can adopt the the dynamic environment and describe the fuzzyrelationship between different attributes of trust.
     3)Addressing the information overload is a crucial issue for today's large-scale e-businessapplications. Collaborative filtering is a hot-spot in recent research of personalized recommen-dation systems. We argued the relationship between collaborative filtering and trust manage-ment. Byunifyingthetrust,theevaluation,andtherecommendation,wedesignedapersonalizedrecommendation systems based on reputation. User can predict his rating on the unknown re-sources by the reputation of the other users and the recommendation of the others. By using thetrust management mechanism, the system can address the problems caused by sparse rating andunreliable rating. Therefore, the system can improve the accuracy of the prediction.
     4)The evolution of cooperation between selfish individuals is a fascinating topic that hasattracted scientists in different fields. This question is also beginning to arise in computer sys-tems. The P2P systems are characterized by heterogeneous components that interact to achievethe public goals. Thus, the free-riding problem will caused by selfish individuals in these sys-tems. We argued that the trust information is an important factor in the rise of cooperativebehaviors in the evolution of a group of selfish individuals. Therefore, we explored the cooper-ation stimulation mechanisms based on trust. This thesis designed an evolutionary game basedon classic prisoners dilemma game. A cooperation stimulation mechanism based on trust hasbeen put in this game. The individuals update their strategies and adjust their relationship with others merely according to the opponents' trust information. The result of the game illustratedthe effectiveness of our mechanism.
引文
[1]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510–1521.
    [2] Govindan K, Mohapatra P. Trust computations and trust dynamics in mobile adhoc networks: a sur-vey[J]. Communications Surveys&Tutorials, IEEE,2012,14(2):279–298.
    [3] Blaze M, Kannan S, Lee I, et al. Dynamic trust management[J]. Computer, IEEE,2009,42(2):44–52.
    [4] Yuan W, Shu L, Chao H C, et al. ITARS: trust-aware recommender system using implicit trust net-works[J]. Communications, IET,2010,4(14):1709–1721.
    [5] Zhan G, Shi W, Deng J. Design and Implementation of TARF: A Trust-Aware Routing Framework forWSNs[J]. Dependable and Secure Computing, IEEE Transactions on,2012,9(2):184–197.
    [6]林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751–758.
    [7] Abdul-Rahman A, Hailes S. A distributed trust model[A]. In: Proceedings of the1997workshop onNew security paradigms[C]. Cumbria, UK,1998:48–60.
    [8] William S. Cryptography and Network Security: Principles and Practice[M].5th. USA: Prentice Hall,2010.
    [9] Sandhu R S, Samarati P. Access control: principle and practice[J]. Communications Magazine, IEEE,1994,32(9):40–48.
    [10] Jun S, Ahamad M. Incentives in BitTorrent induce free riding[A]. In: Proceedings of the2005ACMSIGCOMM workshop on Economics of peer-to-peer systems[C]. Cumbria, UK,2005:116–121.
    [11] Blaze M, Feigenbaum J, Ioannidis J, et al. The role of trust management in distributed systems secu-rity[A]. In: Secure Internet Programming[C]. Springer,1999:185–210.
    [12] Stephen M. Formalising trust as a computational concept[D]:[PhD Thesis]. scotland: University ofStirling,1994.
    [13] Rindeb ck C, Gustavsson R. Why trust is hard–challenges in e-mediated services[A]. In: TrustingAgents for Trusting Electronic Societies[C]. Berlin, Heidelberg,2005:180–199.
    [14] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[A]. In: Security and Privacy,1996.Proceedings.,1996IEEE Symposium on[C]. Okalnad, CA,1996:164–173.
    [15] Grandison T W. Trust management for internet applications[D]:[PhD Thesis]. UK: Imperial College,2003.
    [16] Grandison T, Sloman M. A survey of trust in internet applications[J]. Communications Surveys&Tutorials, IEEE,2000,3(4):2–16.
    [17] McKnightDH,ChervanyNL. Themeaningsoftrust[R]. USA:UniversityofMinnesota,ManagementInformation Systems Research Center,1996.
    [18] Cho J H, Swami A, Chen R. A survey on trust management for mobile ad hoc networks[J]. Commu-nications Surveys&Tutorials, IEEE,2011,13(4):562–583.
    [19]什托姆普卡, Sztompak P,程胜利.信任:一种社会学理论[M].北京:中华书局,2005.
    [20] Good D. Individuals, Interpersonal Relations, and Trust[J]. Trust: Making and Breaking CooperativeRelations, electronic edition, Department of Sociology, University of Oxford,2000,2000:31–48.
    [21] Seligman A B. The problem of trust[M]. New Jersey: Princeton University Press,2000.
    [22] Gambetta D. Can we trust trust[J]. Trust: Making and breaking cooperative relations,2000,2000:213–237.
    [23] Barbalet J M. Social emotions: confidence, trust and loyalty[J]. International Journal of Sociologyand Social Policy,1996,16(9/10):75–96.
    [24] Luhmann N. Risk: A sociological theory[M]. New York: Aldine de Gruyter,2005.
    [25] ShortJ. Hazard, risk,andenterprise: Approachestoscience, law,andsocialpolicy[J]. LawandSocietyReview,1990,24(1):179–198.
    [26] Earle T C, Cvetkovich G. Social trust: Toward a cosmopolitan society[M]. New York: PraegerPublishers,1995.
    [27] Benn S I, Peters R S. Social principles and the democratic state[M]. London: Allen&Unwin,1959.
    [28] Welty B, Becerra-Fernandez I. Managing trust and commitment in collaborative supply chain relation-ships[J]. Communications of the ACM,2001,44(6):67–73.
    [29] J sang A. An algebra for assessing trust in certification chains[A]. In: Proceedings of the Networkand Distributed Systems Security Symposium (NDSS’99). The Internet Society[C]. San Diego, Cal-ifornia,1999.
    [30] Dimitrakos T. System models, e-risks and e-trust[M]//. In: Towards the E-Society[C]. USA: Springer,2002:45–58.
    [31] Huang J, Fox M S. An ontology of trust: formal semantics and transitivity[A]. In: Proceedings ofthe8th international conference on Electronic commerce: The new e-commerce: innovations for con-quering current barriers, obstacles and limitations to conducting successful business on the internet[C].New York,2006:259–270.
    [32] Perlman R. An overview of PKI trust models[J]. Network, IEEE,1999,13(6):38–43.
    [33] Abdul-Rahman A. The pgp trust model[A]. In: EDI-Forum: the Journal of Electronic Commerce[C].USA,1997.10:27–31.
    [34] Bosworth K, Tedeschi N. Public key infrastructures—the next generation[J]. BT Technology Journal,2001,19(3):44–59.
    [35] Thompson M R, Essiari A, Mudumbai S. Certificate-based authorization policy in a PKI environmen-t[J]. ACM Transactions on Information and System Security (TISSEC),2003,6(4):566–588.
    [36] Saunders G, Hitchens M, Varadharajan V. Role-based access control and the access control matrix[J].ACM SIGOPS Operating Systems Review,2001,35(4):6–20.
    [37] SeamonsKE,WinslettM,YuT,etal. Limitingthedisclosureofaccesscontrolpoliciesduringautomat-ed trust negotiation[A]. In: Proceedings of the Network and Distributed Systems Symposium.(NDSS2001)[C]. San Diego, California, USA,2001.
    [38] WinsboroughWH,LiN. Towardspracticalautomatedtrustnegotiation[A]. In: PoliciesforDistributedSystems and Networks,2002. Proceedings. Third International Workshop on[C]. Washington,2002:92–103.
    [39] Kamvar S D, Schlosser M T, Garcia-Molina H. The eigentrust algorithm for reputation managementin p2p networks[A]. In: Proceedings of the12th international conference on World Wide Web[C].Budapest,2003:640–651.
    [40] Haveliwala T, Kamvar S. The second eigenvalue of the Google matrix[R]. Stanford: Stanford Uni-versity,2003.
    [41] Wilson J Q. The moral sense[M]. New York: Free Press,1997.
    [42] Giddens A. Modernity and self-identity: Self and society in the late modern age[M]. Stanford, Cali-fornia: Stanford University Press,1991.
    [43] Luhmann N, Davis H, Raffan J, et al. Trust; and, Power: two works by Niklas Luhmann[M]. NewYork: Wiley Chichester,1979.
    [44] J sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision[J].Decision support systems,2007,43(2):618–644.
    [45] Abdul-Rahman A, Hailes S. Supporting trust in virtual communities[A]. In: System Sciences,2000.Proceedings of the33rd Annual Hawaii International Conference on[C]. Hawaii,2000:9–pp.
    [46] Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation[A]. In: Sys-tem Sciences,2002. HICSS. Proceedings of the35th Annual Hawaii International Conference on[C].Hawaii, USA,2002:2431–2439.
    [47] Chang E, Hussain F, Dillon T. Trust and reputation for service-oriented environments: technologiesfor building business intelligence and consumer confidence[M]. New York: John Wiley&Sons,2006.
    [48] Almenárez F, Marín A, Campo C, et al. PTM: A pervasive trust management model for dynamic openenvironments[A]. In: First Workshop on Pervasive Security, Privacy and Trust PSPT[C]. Boston,2004.4:1–8.
    [49] AlmenárezF,MarínA,CampoC,etal. TrustAC:Trust-basedaccesscontrolforpervasivedevices[M]//.In: Security in Pervasive Computing[C]. Berlin: Springer,2005:225–238.
    [50] Almenarez F, Marin A, Díaz D, et al. Developing a model for trust management in pervasive de-vices[A]. In: Pervasive ComputingandCommunications Workshops,2006.PerCom Workshops2006.Fourth Annual IEEE International Conference on[C]. Washington,2006:267–272.
    [51] MelayeD,DemazeauY. Bayesiandynamictrustmodel[M]//. In: Multi-agentsystemsandapplicationsIV[C]. Berlin: Springer,2005:480–489.
    [52] He R, Niu J, Zhang G. CBTM: A trust model with uncertainty quantification and reasoning for perva-sive computing[M]//. In: Parallel and Distributed Processing and Applications[C]. Berlin: Springer,2005:541–552.
    [53] Das A, Islam M M. Securedtrust: A dynamic trust computation model for secured communicationin multiagent systems[J]. Dependable and Secure Computing, IEEE Transactions on,2012,9(2):261–274.
    [54] Zhenzhen C, Wenzhong T. A Behavior-Based Dynamic Trust Model of Virtual Organization[A]. In:Information Science and Engineering (ISISE),2010International Symposium on[C]. Hangzhou, Chi-na,2010:391–395.
    [55]黄辰林,王志英.动态信任关系建模和管理技术研究[D]:[PhD Thesis].长沙:国防科学技术大学,2005.
    [56] Perc M, Szolnoki A. Coevolutionary games-A mini review[J]. BioSystems,2010,99:109–125.
    [57] Zadeh L A. Review of a mathematical theory of evidence[J]. AI magazine,1984,5(3):81.
    [58] Rasmusson L, Jansson S. Simulated social control for secure Internet commerce[A]. In: Proceedingsof the1996workshop on New security paradigms[C]. Lake Arrowhead, CA, USA,1996:18–25.
    [59]金瑜,古志民.对等网中基于声誉的信任关键问题综述[J].小型微型计算机系统,2007,28(9):1604–1609.
    [60] Chang J, Wang H, Gang Y. A dynamic trust metric for P2P systems[A]. In: Grid and CooperativeComputing Workshops,2006. GCCW’06. Fifth International Conference on[C]. Changsha,2006:117–120.
    [61]冯景瑜.开放式P2P网络环境下的信任管理技术研究[D]:[PhD Thesis].西安:西安电子科技大学,2011.
    [62] Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system[A]. In: Proceedings ofthe tenth international conference on Information and knowledge management[C]. Atlanta, Georgia,USA,2001:310–317.
    [63] Liang Z, Shi W. PET: A personalized trust model with reputation and risk evaluation for P2P re-source sharing[A]. In: System Sciences,2005. HICSS’05. Proceedings of the38th Annual HawaiiInternational Conference on[C]. Hawaii, USA,2005:201b–201b.
    [64]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401–1408.
    [65]张光华,张玉清. P2P网络信任管理研究综述[J].计算机科学,2010,37(9):6–12.
    [66] Xiong L, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communi-ties[J]. Knowledge and Data Engineering, IEEE Transactions on,2004,16(7):843–857.
    [67] Rahbar A, Yang O. Powertrust: A robust and scalable reputation system for trusted peer-to-peer com-puting[J]. Parallel and Distributed Systems, IEEE Transactions on,2007,18(4):460–473.
    [68] Zhou R, Hwang K, Cai M. Gossiptrust for fast reputation aggregation in peer-to-peer networks[J].Knowledge and Data Engineering, IEEE Transactions on,2008,20(9):1282–1295.
    [69]田春岐,江建慧,胡治国, et al.一种基于聚集超级节点的P2P网络信任模型[J].计算机学报,2010,33(2):345–355.
    [70] XiaH,JiaZ,JuL,etal. Trustmanagementmodelformobileadhocnetworkbasedonanalytichierarchyprocess and fuzzy theory[J]. Wireless Sensor Systems, IET,2011,1(4):248–266.
    [71] J sang A. The consensus operator for combining beliefs[J]. Artificial Intelligence,2002,141(1):157–170.
    [72] Voss M, Heinemann A, Muhlhauser M. A privacy preserving reputation system for mobile informa-tion dissemination networks[A]. In: Security and Privacy for Emerging Areas in CommunicationsNetworks,2005. SecureComm2005. First International Conference on[C]. Athens, Greece,2005:171–181.
    [73] Duma C, Shahmehri N, Caronni G. Dynamic trust metrics for peer-to-peer systems[A]. In: DatabaseandExpertSystemsApplications,2005.Proceedings.SixteenthInternationalWorkshopon[C]. Copen-hagen, Denmark,2005:776–781.
    [74] Feldman M, Papadimitriou C, Chuang J, et al. Free-riding and whitewashing in peer-to-peer system-s[A]. In: Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives innetworked systems[C]. Portland,2004:228–236.
    [75] Douceur J R. The sybil attack[M]//. In: Peer-to-peer Systems[C]. Berlin: Springer,2002:251–260.
    [76] Yang Y, Feng Q, Sun Y L, et al. Reptrap: a novel attack on feedback-based reputation systems[A]. In:Proceedings of the4th international conference on Security and privacy in communication network-s[C]. Istanbul, Turkey,2008:8.
    [77] Lou X, Hwang K. Collusive piracy prevention in P2P content delivery networks[J]. Computers, IEEETransactions on,2009,58(7):970–983.
    [78] Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation system-s[J]. ACM Computing Surveys (CSUR),2009,42(1):1.
    [79] Carchiolo V, Longheu A, Malgeri M, et al. A distributed algorithm for personalized trust evaluationin social networks[M]//. In: Intelligent Distributed Computing IV[C]. Tangier, Morocco: Springer,2010:99–108.
    [80] Li W, Joshi A, Finin T. Sat: an svm-based automated trust management system for mobile ad-hocnetworks[A]. In: MILITARY COMMUNICATIONS CONFERENCE,2011-MILCOM2011[C]. Bal-timore,USA,2011:1102–1107.
    [81] Quinlan J R. Induction of decision trees[J]. Machine learning,1986,1(1):81–106.
    [82] Urbano J, Rocha A P, Oliveira E. Trust-based selection of partners[M]//. In: E-Commerce and webtechnologies[C]. Berlin Heidelberg: Springer,2011:221–232.
    [83] Zolfaghar K, Aghaie A. Mining trust and distrust relationships in social web applications[A]. In:Intelligent Computer Communication and Processing (ICCP),2010IEEE International Conferenceon[C]. Cluj-Napoca, Romania,2010:73–80.
    [84] Borzymek P, Sydow M, Wierzbicki A. Enriching trust prediction model in social network with userrating similarity[A]. In: Computational Aspects of Social Networks,2009. CASON’09. InternationalConference on[C]. Fontainebleau, France,2009:40–47.
    [85] Ma S, He J. A Multi-Dimension Dynamic Trust Evaluation Model Based on GA[A]. In: IntelligentSystems and Applications (ISA),20102nd International Workshop on[C]. Wuhan, China,2010:1–4.
    [86]陈菲菲,桂小林.基于机器学习的动态信誉评估模型研究[J].计算机研究与发展,2007,44(2):223–229.
    [87] Engelbrecht A P. Computational intelligence: an introduction[M]. USA: wiley,2007.
    [88] Luger G F. Artificial intelligence: Structures and strategies for complex problem solving[M]. USA:Addison Wesley Longman,2005.
    [89] Holland J H. A mathematical framework for studying learning in classifier systems[J]. Physica D,1986,2(1-3):307–317.
    [90] Bernstein D S, Feng Z, Levine B N, et al. Adaptive peer selection[M]//. In: Peer-to-Peer SystemsII[C]. Berkeley, CA, USA: Springer,2003:237–246.
    [91] Zegura E W, Ammar M H, Fei Z, et al. Application-layer anycasting: a server selection architectureanduseinareplicatedWebservice[J]. Networking, IEEE/ACMTransactionson,2000,8(4):455–466.
    [92] ShreedharM,VargheseG. Efficientfairqueuingusingdeficitround-robin[J]. Networking,IEEE/ACMTransactions on,1996,4(3):375–385.
    [93] JannottiJ,GiffordDK,JohnsonKL,etal. Overcast: reliablemulticastingwithonoverlaynetwork[A].In: Proceedings of the4th conference on Symposium on Operating System Design&Implementation-Volume4[C]. Berkeley, CA, USA,2000:14–14.
    [94] Chawathe Y D. Scattercast: an architecture for internet broadcast distribution as an infrastructureservice[D]:[PhD Thesis]. USA: University of California,2000.
    [95] J sang A, Ismail R. The beta reputation system[A]. In: Proceedings of the15th bled electroniccommerce conference[C]. Bled, Slovenia,2002:41–55.
    [96] Xu H L, Wu X, Li X, et al. Comparison study of Internet recommendation system[J]. Journal ofsoftware,2009,20(2):350–362.
    [97] Shardanand U, Maes P. Social information filtering: algorithms for automating “word of mouth”
    [A]. In: Proceedings of the SIGCHI conference on Human factors in computing systems[C]. Denver,Colorado, USA,1995:210–217.
    [98] Goldberg D, Nichols D, Oki B M, et al. Using collaborative filtering to weave an informationtapestry[J]. Communications of the ACM,1992,35(12):61–70.
    [99] Wang J, Yin J, Liu Y, et al. Trust-based collaborative filtering[A]. In: Fuzzy Systems and KnowledgeDiscovery(FSKD),2011EighthInternationalConferenceon[C]. Shanghai,China,2011.4:2650–2654.
    [100] Ziegler C N, Lausen G. Analyzing correlation between trust and user similarity in online communi-ties[M]//. In: Trust management[C]. Oxford, UK: Springer,2004:251–265.
    [101] Avesani P, Massa P, Tiella R. A trust-enhanced recommender system application: Moleskiing[A]. In:Proceedings of the2005ACM symposium on Applied computing[C]. Santa Fe, New Mexico, USA,2005:1589–1593.
    [102] MasoudM,HamidS,Reza,MahdiS. TrustEvaluationUsingItemsRatingsinOnlineCommunities[A].In:20th Iranian Conference on Electrical Engineering,(ICEE2012)[C]. Tehran, Iran,2012:780–783.
    [103] Yang X, Guo Y, Liu Y. Bayesian-inference based recommendation in online social networks[A]. In:INFOCOM,2011Proceedings IEEE[C]. Shanghai, China,2011:551–555.
    [104] Yubo J, Hao C, Chengwei H. A Collaborative Filtering Recommendation Algorithm Based on Us-er Trust Model[A]. In: Networking and Distributed Computing (ICNDC),2010First InternationalConference on[C]. Hangzhou, China,2010:213–217.
    [105] Guha R, Kumar R, Raghavan P, et al. Propagation of trust and distrust[A]. In: Proceedings of the13thinternational conference on World Wide Web[C]. New York, USA,2004:403–412.
    [106] Resnick P, Zeckhauser R. Trust among strangers in Internet transactions: Empirical analysis of eBay’sreputation system[J]. Advances in applied microeconomics,2002,11:127–157.
    [107] Herlocker J L, Konstan J A, Terveen L G, et al. Evaluating collaborative filtering recommender sys-tems[J]. ACM Transactions on Information Systems (TOIS),2004,22(1):5–53.
    [108] Quercia D, Hailes S, Capra L. Lightweight distributed trust propagation[A]. In: Data Mining,2007.ICDM2007. Seventh IEEE International Conference on[C]. Omaha, Nebraska, USA,2007:282–291.
    [109] Massa P, Avesani P. Trust-aware collaborative filtering for recommender systems[M]//. In: On theMove to Meaningful Internet Systems2004: CoopIS, DOA, and ODBASE[C]. Agia Napa, Cyprus:Springer,2004:492–508.
    [110] PatilVA,RaghaL. Comparingperformanceofcollaborativefilteringalgorithms[A]. In: Communica-tion,Information&ComputingTechnology(ICCICT),2012InternationalConferenceon[C]. Mumbai,India,2012:1–6.
    [111] Nowak M A. Five rules for the evolution of cooperation[J]. science,2006,314(5805):1560–1563.
    [112] Kreps D M. A course in microeconomic theory[M]. Vol.41. USA: Princeton University Press Prince-ton,1990.
    [113] Henrich J, Boyd R, Bowles S, et al. In search of homo economicus: behavioral experiments in15small-scale societies[J]. The American Economic Review,2001,91(2):73–78.
    [114] Wilson D S, Sober E. Reintroducing group selection to the human behavioral sciences[J]. Behavioraland Brain Sciences,1994,17(4):585–607.
    [115] Hamilton W D. The genetical evolution of social behaviour. I[J]. Journal of theoretical biology,1964,7(1):1–16.
    [116] Trivers R L. The evolution of reciprocal altruism[J]. Quarterly review of biology,1971,46:35–57.
    [117] Axelrod R, Hamilton W D. The evolution of cooperation[J]. Science,1981,211(4489):1390–1396.
    [118] Alexander R D. The biology of moral systems[M]. New York, USA: Aldine de Gruyter,1987.
    [119] Chen Y, Liu K R. Indirect reciprocity game modelling for cooperation stimulation in cognitive net-works[J]. Communications, IEEE Transactions on,2011,59(1):159–168.
    [120] Nowak M A, Sigmund K. Evolution of indirect reciprocity by image scoring[J]. Nature,1998,393(6685):573–577.
    [121] Riolo R L, Cohen M D, Axelrod R. Evolution of cooperation without reciprocity[J]. Nature,2001,414(6862):441–443.
    [122] Ohtsuki H, Iwasa Y, et al. The leading eight: social norms that can maintain cooperation by indirectreciprocity[J]. Journal of Theoretical Biology,2006,239(4):435–444.
    [123] Golle P, Leyton-Brown K, Mironov I, et al. Incentives for sharing in peer-to-peer networks[M]//. In:Electronic Commerce[C]. Heidelberg, Germany: Springer,2001:75–87.
    [124] Zhong S, Li L E, Liu Y G, et al. On designing incentive-compatible routing and forwarding pro-tocols in wireless ad-hoc networks: an integrated approach using game theoretic and cryptographictechniques[J]. Wireless networks,2007,13(6):799–816.
    [125] Marti S, Giuli T J, Lai K, et al. Mitigating routing misbehavior in mobile ad hoc networks[A]. In:International Conference on Mobile Computing and Networking: Proceedings of the6th annual inter-national conference on Mobile computing and networking[C]. New York, NY, USA,2000.6:255–265.
    [126] Buchegger S, Le Boudec J Y. Performance analysis of the CONFIDANT protocol[A]. In: Proceedingsof the3rd ACM international symposium on Mobile ad hoc networking&computing[C]. Lausanne,Switzerland,2002:226–236.
    [127] Nowak M A. Evolutionary dynamics: exploring the equations of life[M]. USA: Harvard UniversityPress,2006.
    [128] Tian L, Li M, Sun W, et al. Evolution of Cooperation Based on Reputation on Dynamical Network-s[A]. In: Trust, Security and Privacy in Computing and Communications (TrustCom),2012IEEE11thInternational Conference on[C]. Liverpool, UK,2012:1399–1404.
    [129] Ellis T, Yao X. Evolving cooperation in the non-iterated prisoner’s dilemma: A social networkinspired approach[A]. In: Evolutionary Computation,2007. CEC2007. IEEE Congress on[C]. Singa-pore,2007:736–743.
    [130]陈卓,蔡云泽,许晓鸣.移动博弈者之间基于信誉的伙伴选择机制研究[A]. In: Proceedings of the30th Chinese Control Conference[C]. Yantai, China,2011:910–915.
    [131] Cardillo A, Gómez-Garde es J, Vilone D, et al. Co-evolution of strategies and update rules in theprisoner’s dilemma game on complex networks[J]. New Journal of Physics,2010,12(10):103034.
    [132] Szabó G, T ke C. Evolutionary prisoner’s dilemma game on a square lattice[J]. Physical Review E,1998,58(1):69–73.
    [133] Niazi M, Hussain A. Agent-based tools for modeling and simulation of self-organization in peer-to-peer,adhoc,andothercomplexnetworks[J]. CommunicationsMagazine,IEEE,2009,47(3):166–173.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700