网格信任的不确定性建模及其管理研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网格的研究起源于现代科学探索中对于高性能计算、海量数据处理和昂贵科学资源灵活共享的需求。其核心是分布式计算与资源管理,本质是实现大规模多方位资源的协同共享与虚拟化,以期实现加速应用程序处理、开发基于虚拟组织的创新性应用的目的。由此产生的问题是:网格在保证资源所有者控制资源并保持对他人的机密性情况下如何提高共享资源的质量?要从根本上解决这个问题,信任及其管理技术至关重要。其实信任一直都在支持人类或组织之间的协作。如果说信任是人类离线交互的基础,那么它也必然能成为基于网络的在线交互基础。因为通过计算机网络和分布式系统进行的交互仅仅是人类交互的扩展。本文据此认为,应该让信任成为网格计算的一个全新的度量尺度,并因此需要有迁移人类信任推理机制到网格为代表的分布式计算系统的能力。
     论文从信息安全技术的发展脉络入手,分析了信息安全的核心由安全性到可信性转变,继而形成以信任理论和行为监管为核心的可信计算安全新理念的必然趋势,重点关注应用层面交互环境中实体本身的主观可信,即基于有效的信任评估和管理机制支撑可信计算。本文以信任理论的基础研究为核心,采用理论分析与应用研究相结合的方法,研究了以网格计算和P2P计算相互融合的虚拟基础平台环境中的信任管理和信任决策问题。对照国内外相关研究现状,本文的主要工作内容和创新成果包括:
     (一)对网格环境的安全和信任管理需求及研究进展水平进行了的全面总结,论证了利用信任机制解决网格安全问题的必要性和可行性。
     (二)从社会和计算安全两个角度的信任概念出发,阐述了信任基本性质以及信任和安全间的辨证关系;将计算机网络和分布式系统构成的虚拟世界视为人类交互地扩展,因而可以应用信任机制解决安全问题;系统总结了网格的安全和信任管理需求,强调信任模拟中信任社会属性的基础性地位。并在信任证据管理、信任推荐、信任社区构建以及可信决策等多个层面上体现对社会信任机制的运用,从而使本文的研究与大多数采用精确数学模拟信任的工作区别开来;
     (三)运用未确知数学方法对网格信任进行建模,重点考虑了基于历史交互记录模式的信任建立、信任度评估和信任决策问题,区分了行为和状态等多种因素造成的不确定性,用所有可能的取值区间和该取值的可信度描述和处理之,将不确定性作为主线贯穿于信任的建模、评估和决策全过程。
     (四)设计了一个以提高信任决策有效性为重心的信任管理框架,它采用定制网格服务的方式让信任遍布整个网格环境,并且依托信任社区和信任管理基础设施共同实现了信任管理。该框架与具体的应用逻辑相分离以方便具体实现。
     (五)实现了一个网格信任管理原型系统,实验模拟了信任管理框架的实际运行效果。所设计的网格信任管理框架原型系统为资源选择、授权决策、访问控制等局部问题提供了可操作性强而且统筹兼顾的实践依据。
     本文的研究成果是对解决基于网络的分布式环境中的信任与安全问题进行地有益尝试。而未确知数学理论在该领域的应用必将为信任评估提供一种新的方法,对将来的进一步研究具有一定的指导意义。
The grid research originates from the demand of modern science for high performance computing, massive data processing and sharing of expensive scientific resources flexibly. The essence of grid is to achieve the large-scale and multi-faceted collaborative sharing of resource and virtualization, in order to attain the objective of accelerating the program process, developing innovative application based on virtual organizations. The resulting problem is how does grid improve the quality of shared resources as far as the resource owners keeping control of their own resources, and maintain the confidentiality to others? To this end, trust and its management is growing in importance. In fact, trust mechanism has always been in support of the collaboration among human and organizations. Since trust is the basis of human interaction offline, it is also bound to be the foundation for online interaction. Which leads to the conclusion of that, trust has become a new metric for grid. People need the ability to transfer the human trust reasoning into the distributed computing system, such as grid.
     This dissertation starts with the development vein of information security technology, firstly analyses the transition of information security paradigm from security to trustworthiness, and then the inevitable trend for the new idea of Trusted Computing, whose core is trust theory and behaviors monitor. The attentive focus is the subjective credibility of interactive entity itself in applicable level, i.e., to support Trusted Computing based on effective trust evaluation and management mechanisms. The fundamental research of trust theory is taken for centralization, and the methodology we adopt is the combination of theoretical analysis with applied research, the issue we focused on is trust management and decision-making under the virtual integration platform that compromises the merits of grid computing and P2P computing. Comparing with the State of the art survey on trust and security in Grid computing home and abroad, the main research contents and innovation achievements of this dissertation are as follows:
     Ⅰ.The overall survey on the demand for security and trust management, and the state of the art of it is given under Grid environment, then the necessity and feasibility of using trust mechanism to resolve the issue of grid security is demonstrated.
     Ⅱ. The dialectical relation between trust and security is made a clear, from the point of view of trust definition and basic property that comes from social and computer sciences. The virtual worlds that composed of computer network and distributed system were treated as the extension of human interaction, and then trust mechanism can be applied to solve grid security issues. The important role of social attribute of trust was emphasized; it is the basis for all trust modeling. The main distinction between our research and others that we surveyed is the characteristics of excessive formalization, due to the classical mathematics they used.
     Ⅲ. The unascertained mathematics that can deal with multiple uncertainties is used to model grid trust for the first time. We focus on the behavior-based (historical interactive record) trust establishment, evaluation and decision-making, and distinguish uncertainty caused by behavior factor or status ones. All possible value intervals and their corresponding trust degree are used to cope with uncertainty. In the course of trust evaluation, not only the evaluation results can be quantified, but also all the information and the subjective trust degree can be shown. Uncertainty is the main line during the whole course of trust modeling, evaluation and decision-making.
     Ⅳ. The grid trust management framework(GTMF) is separated from the specific application logic by means of customization grid service. It was trust community and trust management infrastructure that we rely on to realize the effective trust management. Within this framework, security is achieved at a higher level, while the quality of grid non-trivial services can be ensured at the same time. The main design emphasis of GTMF is to raise the efficiency of trust based decision-making by means of the overall evaluation that relying on unascertained measurement, rather than blindly chasing the precision computing of (global) trust value.
     Ⅴ. A grid trust management prototype is successfully brought about in this thesis. The actual effect of GTMF was simulated by experiment, and the results show that, the proposed method is not only workable, but also can provide operable and overall consideration practice basis for such issues as grid resources choice, authorization decision-making and access control etc. other local that can be integrated and operable in accordance with the practice.
     The result of research in this dissertation has made valuable contributions to the trust and security issues in Web-based distributed environment. And the introduction of unascertained mathematics has brought about a new way for trust modeling and evaluation, which is useful to both the theory and practice of study further.
引文
1 http://www.technologyreview.com/articles/emerging2003.asp
    15 http://www-900.ibm.com/developer Works/cn/java/j-p2p
    16 http://zuni.cs.vt.edu/publications/draft-ggf-lorch-grid-security-version0.pdf
    [1]都志辉,陈渝,刘鹏.网格计算.北京:清华大学出版社,2002:60-73
    [2]Beulah Kurian Alunkal. Grid Eigen Trust:A Framework for Computing Reputation in Grids. Dept. of Computer Science, Graduate College of Illinois Institute of Technology. MS thesis,2003
    [3]Ian Foster, Carl Kesselman, Steven Tuecke. The Anatomy of the Grid:Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications, R. Sakellariou et al. (Eds.):Euro-Par 2001:1-4
    [4]Klaus Krauter, Rajkumar Buyya, Muthucumaru Maheswaran. A Taxonomy and Survey of Grid Resource Management Systems. Software Practice and Experience.2002,32(2):135-164
    [5]朱峻茂,杨寿保,樊建平等.Grid与P2P混合计算环境下基于推荐证据推理的信任模型.计算机研究与发展.2005,42(05):797-803
    [6]李伟,徐志伟,唐志敏等.国家高性能计算环境的设计与实现.中科院计算所研究报告.2000
    [7]徐志伟,李晓林,游赣梅.织女星信息网格的体系结构研究.计算机研究与发展.2002,39(8):948-951
    [8]I. Foster, C. Kesselman, G. Tsudik. A security architecture for computational grids. In Proc.5th ACM Conf. on Computer and Communications Security.1998:83-92
    [9]M. Surridge. A rough guide to grid security. Technical report. IT Innovation Centre. V1.la,2002
    [10]Howard Chivers. Grid Security:Problems and Potential Solutions. In Proc. of the 3rd Intel. Workshop on Policies for Distributed Systems and Networks.2002.
    [11]Wang Jianbo, He Dake, Yang Shuyuan. Security issues in National High Performance Computing Environment. In Procs. of Parallel and Distributed Computing, Applications & Technologies, (Chengdu,China).2003:227-230
    [12]M. Humphrey, M. R. Thompson. Security Implications of Typical Grid Computing Usage Scenarios. In Proc. of the 10th Int'l Symposium on High Performance Distributed Computing. San Francisco, CA. August,2001:7-9
    [13]屈延文.软件行为学.北京:电子工业出版社,2004
    [14]I. Foster, C. Kesselman, G. Tsudik etc. A Security Architecture for Computational Grids. In Proc. of 5th ACM Conf. on Computer and Communication Security. 1998:83-92
    [15]V. T. R. K. Jeffrey Dwoskin, Sujoy Basu. Scoping security issues for interactive grids. in 37th Annual Asilomar Conference on Signals, Systems, and Computers. Pacific Grove, California. November,2003:9-12
    [16]J. Novotny, S. Tuecke, V. Welch. An Online Credential Repository for the Grid: MyProxy. In Proceeding of 10th IEEE International Symposium on High Performance Distributed Computing. IEEE Press:San Francisco, August 2001
    [17]Pearlman L., Welch V., Foster I., et al. The Community Authorization Service: Status and Futures. Computing in High Energy Physics (CHEP03). La Jolla, Ca, USA.2003:1-9
    [18]Alfieri et al. VOMS:an Authorization System for Virtual Organizations.1st European Across Grids Conf., Santiago de Compostela,2003:13-14
    [19]Marsh, S. Formalising Trust as a Computational Concept. Depart. of Mathematics and Computer Science, Univ. of Stirling. PhD thesis.1994
    [20]M. Blaze, J. Feigenbaum, J. Ioannidis etc. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming:Security Issues for Mobile and Distributed Objects, Vitek Jensen eds.,Springer-Verlag, NY, USA, 1999:185-210
    [21]S. Gar_nkel. PGP:Pretty Good Privacy. Sebastopol, CA:O'Reilly & Associates. Inc.1995. ISBN 1-56592-098-8
    [22]Farag Azzedin, Muthucumaru Maheswaran. Towards Trust-Aware Resource Management in Grid Computing Systems. In 2nd IEEE International Symposium on Cluster Computing and the Grid, Berlin, Germany. May 2002:21-24
    [23]B. Blakeley. The Emperor's old armor. In Proc. of Workshop on New Security Paradigms, Lake Arrowhead, CA.1996:2-16
    [24]B. Wulf. A Grand Challenge in Information Security. Keynote Address #1, NSF Cyber Trust PI Meeting and Research Directions Workshop, Baltimore, Aug.2003
    [25]苏锦钿,郭荷清,高英.基于主观逻辑的Web服务信任模型.华南理工大学学报.2005,33(10):23-28
    [26]M.D. Abrams, M.V. Joyce. Trusted Computing Update. Computers and Security. 1995,14(1):57-68
    [27]Morrie Gasser, Andy Goldstein, Charlie Kaufman etc. The Digital Distributed System Security Architecture. In Proceedings of the 1989 National Computer Security Conference.1989:305-319
    [28]Butler Lampson, Martin Abadi, Michael Burrows etc. Authentication in distributed systems:Theory and practice. ACM Transactions on Computer Systems.1992,10(4):265-310
    [29]L. Gong. A secure identity-based capability system. In Proceedings of the IEEE Symposium on Security and Privacy. Los Angeles, CA. IEEE Computer Society Press.1989:55-63
    [30]J. A. Bull, L. Gong, K. R. Sollins. Towards security in an open systems federation. In European Symposium on Research in Computer Security,1992:3-20
    [31]C. B. Neuman. Proxy-based authorization and accounting for distributed systems. In 13th Int'l. Conf. on Distributed Computing Systems.1993:283-291
    [32]R. Hayton, J. Bacon, K. Moody. OASIS:Access control in an open distributed environment. In Proceedings of IEEE Symposium on Security and Privacy. Oakland,CA, IEEE Computer Society Press,1998:3-14
    [33]R. Housley, W. Ford, W. Polk etc. Internet X.509 public key infrastructure certificate and CRL profile. RFC2459,1999
    [34]Tuecke S, Welch V, Engert D, Pearlman L, Thompson M. Internet X.509 Public Key Infrastructure (PKI) proxy certificate profile. RFC 3820. IETF, June 2004
    [35]M.R. Thompson, K.R. Jackson. Grid Resource Management:State of the Art and Future Trends, chapter 5:security issues of Grid resource management, Kluwer Academic, Boston,2003:53-69.
    [36]W. Johnston, S. Mudumbai, M. Thompson. Authorization and attribute certificates for widely distributed access control. In Proc. of 7th IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises. Stanford, Los Alamitos, CA. IEEE Computer Society Press,1998
    [37]R. Butler, V. Welch, D. Engert, I. Foster etc. A national-scale authentication infrastructure. IEEE Computer.2000,33(1):60-66
    [38]Wei Jie, Zhenghong Huang, Daw, MD. etc. Secure Access to Grid Information Service Using Shibboleth and PERMIS. E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services,2007:297-304
    [39]刘鹏,刘欣,陈钟.信任管理研究综述.计算机工程与应用.2004,43(1):39-43
    [40]徐锋,吕建.Web安全中的信任管理研究与进展.软件学报.2002,13(11):2057-2064
    [41]Blaze M, Feigenbaum Jand, Lacy J. Decentralized trust management. In Proceedings of the 17th Symposium on Security and Privacy, IEEE Computer Society Press.1996:164-173
    [42]Y.-H. Chu, J. Feigenbaum, B. LaMacchia et al. REFEREE:Trust management for web applications. Computer Networks.1997,29(13):953-964
    [43]Ninghui Li, Benjamin N, Joan Feigenbaum. A practically implementable and tractable Delegation Logic. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press.2000:27-42
    [44]Ninghui Li, J. C. Mitchell, W. H. Winsborough. Design of a role-based trust management framework. IEEE Symposium on Security and Privacy. Los Angeles, CA, IEEE Computer Society Press.2002:114-130
    [45]Freudenthal E, Pesin T, Port L et al. dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments. In Proceedings of 22nd International Conference on Distributed Computing Systems.2002:411-420
    [46]P. Resnick and J. Miller. PICS:Internet Access Controls without Censorship. Communications of the ACM.1996,39:87-93
    [47]D. Gambetta. Can we trust trust? in Trust:Making and Breaking Cooperative Relations, chapter.13, New York, NY:Basil Blackwell,1988:213-237
    [48]L. Mui, M. Mohtashemi, and A. Halberstadt. A computational model of trust and reputation. In Proceedings of the 35th Hawaii International Conference on System Sciences, Hawaii,2002:2431-2439
    [49]Marco Carbone, Mogens Nielsen, Vladimiro Sassone. A formal model for trust in dynamic networks. In Proceedings of the International Conference on Software Engineering and Formal Methods,2003:54-63
    [50]Kagal, L., Finin, T., Joshi, A. Trust-based security in pervasive computing environments. IEEE Computer. Volume 34,2001:154-157
    [51]Gray, E., O'Connell, P., Jensen, etc. Towards a framework for assessing trust-based admission control in collaborative ad hoc applications. Dept. of Computer Science, Trinity College Dublin, Technical Report 66, dec 2002
    [52]D. Povey. Developting Electronic Trust Polices Using a Risk Management Model. In Proc. of CQRE Congress.1999:1-16
    [53]A. Josang. The right type of trust for distributed systems. In Proceedings of ACM Workshop on New Security Paradigms.1996:1-13
    [54]B. Shneiderman. Designing trust into online experiences. Communications of the ACM.2000, vol.43:57-59
    [55]D. W. Manchala. E-commerce trust metrics and models. IEEE Internet Computing. 2000,4(2):36-44
    [56]T. Grandison, M. Sloman. A survey of trust in Internet applications. IEEE Communications Surveys & Tutorials.2000,3(4):2-16
    [57]A. Abdul-Rahman, S. Hailes. Using recommendations for managing trust in distributed systems. in Proc. IEEE Malaysia International Conference on Communication. Kuala Lumpur, Malaysia.1997:1870-1874
    [58]A. Abdul-Rahman, S. Hailes. A distributed trust model. In Proceedings of the ACM Workshop on New Security Paradigms, (Cumbria, U.K.). ACM SIGSAC, ACM Press.1997:48-60
    [59]P.Resnick, R.Zeckhauser, E. Friedman etal.Reputation systems. Communications of the ACM, vol.43, Dec.2000:45-48
    [60]J. S. Olson, G. M. Olson. I2i trust in e-commerce. Communications of the ACM, vol.43,2000:41-44
    [61]F. Fukuyama. Trust:The Social Virtues and the Creation of Prosperity. New York, NY:Free Press, June 1996. ISBN 0684825252.
    [62]B. Christianson, W. S. Harbison. Why isn't trust transitive? In Proc.4th Intl. Security Protocols Conference.1996:171-176
    [63]McKnight, D. H., Chervany, N. L. The Meanings of Trust. University of Minnesota MIS Research Center Working Paper series,1996. Available at: http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf
    [64]Sunan Shen, Shaohua Tang. Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation. International Conference on Computational Intelligence and Security.2008, Volume 1:399-404
    [65]Uwe G. Wilhelm, Levente Butty'an, Sebastian Staamann. On the problem of trust in mobile agent systems. In Symposium on Network and Distributed System Security. Internet Society.1998:1-11
    [66]张书钦.对等网络中信任管理研究.哈尔滨工程大学博士学位论文,2005:45-68
    [67]M. Abadi, M. Burrows, B. Lampson, G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems. 1993, vol.15:706-734
    [68]M. Burrows, M. Abadi, R. Needham. A logic of authentication. ACM Transactions on Computer Systems.1990,vol.8:18-36
    [69]Yun Ding, Patrick Horster, Holger Petersen. A new approach for delegation using hierarchical delegation tokens. In Communications and Multimedia Security. 1996:128-143
    [70]B. Crispo. Delegation of responsibilities. in Proc.6th International Security Protocols Workshop, Cambridge, UK. Springer-Verlag,1998:118-130
    [71]Andrew J. I. Jones, Babak S. Firozabadi. On the characterisation of a trusting agent. In Workshop on Deception, Trust and Fraud in Agent Societies,2000.
    [72]Adun Josang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems.2001,9(3):279-311
    [73]Hanif Durad, M.H., Yuanda Cao. A vision for the trust managed grid. In 6th IEEE International Symposium on Cluster Computing and the Grid Workshops,2006. Volume 2:11-34
    [74]R. Alfieri et al. Managing Dynamic User Communities in a Grid of Autonomous Resources. Proc. of Computing in High Energy and Nuclear Physics. La Jolla, Ca, USA.2003:1-7
    [75]A. Grimshaw, A. Ferrari, F. Knabe etc. Legion:An Operating System for Wide-Area Computing. IEEE Computer.1999,32(5):29-37
    [76]L. Pearlman, C. Kesselman, V. Welch et al. The Community Authorization Service: Status and Future. Conference on Computing in High Energy and Nuclear Physics. La Jolla, California.2003:1-9
    [77]T. Hacker, B. Athey. A Methodology for Account Management in Grid Computing Environments. In Proc.2nd Int'l. Workshop on Grid Computing. Denver, USA. 2001:133-144
    [78]N. H. Kapadia, R.J. Figueiredo, J. Fortes. Enhancing the Scalability and Usability of Computational Grids via Logical User Accounts and Virtual File Systems. in Proc. of 10th Heterogeneous Computing Workshop, San Francisco.2001:768-775
    [79]Lepro R., Cardea. Dynamic Access Control in Distributed Systems. NASA Technical Report, NAS-03-020.2003
    [80]Markus Lorch, David Adams, D. Kafura etc. The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments. In Proceedings of the Fourth International Workshop on Grid Computing (GRID'03). 17 November 2003, Phoenix, AR, USA
    [81]Markus Lorch, PRIMA-Privilege Management and Authorization in Grid Computing Environments. Ph.D. Dissertation, Department of Computer Science, Virginia Technology University.2004
    [82]L.M. Camarinha-Matos, H. Afsarmanesh. A Roadmap for Strategic Research on Virtual Organizations.Proceedings of IFIP Working Conference on Virtual Enterprises. Lugano, Switzerland.2003:33-46
    [83]Ian Foster, Carl Kesselman (eds.). The Grid:Blueprint for a New Computing Infrastructure. Morgan Kaufmann,1999. Chapter 3
    [84]Syed Naqvi, Michel Riguidel. Threat Model for Grid Security Services. In Proc. of the European Grid Conference.2005
    [85]Pallavi Phene. Secure access mechanisms for Grids. Available at http:// www2.cs.uh.edu/-phene/papers/SecureAccessMechanismsforGrids.pdf
    [86]F. A. Maheswaran, Muthucumaru Maheswaran. Evolving and managing trust in grid computing systems. In Proceedings of the 2002 IEEE Canadian Conference on Electrical Computer Engineering.2002, vol.3:1424-1429
    [87]Audun Josang, R. Ismail, C. Boyd. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems.2007,43(2):618-644
    [88]L. Rasmusson, S. Janssen. Simulated Social Control for Secure Internet Commerce. In Proc. of New Security Paradigms Workshop. Lake Arrowhead, CA. ACM.1996:1-18
    [89]T Beth, M Borcherding, B Klein. Valuation of trust in open networks. In Proc.3rd Symposium on Research in Computer Security.1994:3-18
    [90]A.E.Arenas, I. Djordjevic, T. Dimitrakos,etc. Towards Web Services Profiles for Trust and Security in Virtual Organisations. Proc.6th IFIP Working Conf. Virtual Enterprises.2005:26-28
    [91]Leszek Lilien. Developing Pervasive Trust Paradigm for Authentication and Authorization. CERIAS Tech Report, Center for Education and Research in Information Assurance and Security, Purdue University.2004:18-22
    [92]Marcim Adamski, Alvaro Arenas, Angelos Bilas etc. Trust and Security in Grids: A State of the Art. CoreGRID White Papers(WHP-0001).2008:1-33
    [93]D. Gefen, V. S. Rao, N. Tractinsky. The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce:The Need for Clarifications. In Procs. of 36th Hawaii International Conference on System Science.2003:1-10
    [94]李文娟,工晓东,傅仰耿等.几种网格信任模型的研究.福州大学学报.2006,34(2):189-193
    [95]A. Abdul-Rahman, S. Hailes. Supporting trust in virtual communities. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.2000, vol.1:1-9
    [96]Farag Azzedin, Muthucumaru Maheswaran. A Trust Brokering System and Its Application to Resource Management in Public Resource Grids. In Proceedings of 18th International Conference on Parallel and Distributed Processing Symposium.2004:22-31
    [97]王东安,徐浩,南凯等.基于推荐的网格计算的信任模型.计算机应用研究.2006(2):96-99
    [98]干志勤,曾国荪.网格环境下的基于行为的信任评估模型.计算机应用与软 件.2005,22(2):62-64
    [99]王莉苹,杨寿保.网格环境中的一种信任模型.计算机工程与应用.2004,40(23):50-53
    [100]Ching Lin, Vijay Varadharajan, Yan Wang etc. Enhancing Grid Security with Trust Management. Procs. of IEEE International Conference on Services Computing. Shanghai, China.2004:303-310
    [101]林剑柠,吴慧中.基于主观逻辑理论的网格信任模型分析.计算机研究与发展.2007,44(8):1365-1370
    [102]S. Song, K. Hwang. Fuzzy trust integration for security enforcement in grid computing. In Proc. of International Symposium on Network and Parallel Computing (NPC'04). Wuhan, China.2004:9-21
    [103]L. Hui, P. Qinke, S. Junyi, H. Baosheng. A mission-aware behavior trust model for grid computing systems. In Proc. of International Workshop on Grid and Cooperative Computing.2002:896-908
    [104]Justin R.D. Dyson, Nathan E. Griffiths, Helene N. Lim etc. Trusting Agents for Grid Computing. In Proc. of International Conference on Systems, Man and Cybernetics. IEEE Press.2004:3187-3192
    [105]M. Thompson, et.al. CA-based Trust Model for Grid Authentication and Identity Delegation. Grid Certificate Policy Working Group. Open Grid Forum,2002
    [106]Gui Xiaolin, Xie Bing, Li Yinan etc. Study on the Behavior-based Trust Model in Grid Security System. IEEE Intel. Conf. on Services Computing,2004:506-509
    [107]Beulah Kurian Alunka, Ivana Veljkovic, Gregor von Laszewski et al. Reputation based Grid Resource Selection. In Proceedings of International Conference on Computer Science and Software Engineering.2008,vol.3:58-61
    [108]Sepandar D. Kamvar, Mario T. Schlosser, Hector GarciaMolina. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of 12th International WWW Conference.2003:640-651
    [109]Tie Yan Li, HuaFei Zhu, Kwok-Yan Lam. A Novel Two-Level Trust Model for Grid. Lecture Notes in Computer Science. Berlin:Springer,2003:214-225
    [110]Brian Matthews, Juan Bicarregui, Theo Dimitrakos. Building Trust on the GRID.Trust Issues Underpinning Scalable Virtual Organisations. ERCIM workshop:'The Role of Trust in e-Business', in conjunction with IFIP IEEE conference.2003:1-3
    [111]Susan D. Boon, John G. Holmes. The dynamics of interpersonal trust:resolving uncertainty in the face of risk. Robert A. Hinde and Jo Groebel, editors, Cooperation and Prosocial Behaviour. Cambridge Univ. Press,1991
    [112]Yanqun Zhang, Qianping Wang, Chen Zhang. Research of Trust Model based on Autonomous Domain. In Proc. of 1st International Symposium on Pervasive Computing and Applications.2006:567-570
    [113]Guha R, Kumar R, Raghavan P. Propagation of trust and distrust. In Procs. of the 13th intl. conf. on World Wide Web. New York, USA.2004:403-412
    [114]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究.软件学报.2003,14(8):1401-1408
    [115]Huynh, T.D., Jennings, N.R. Shadbolt, N. Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems. In Proceedings of 7th Intel. Workshop on Trust in Agent Societies, New York, USA,2004:62-77
    [116]唐文.基于模糊集合理论的信任管理研究.北京大学博士论文,2003:26-45
    [117]刘开第,曹庆奎,庞彦军.基于未确知集合的故障诊断方法.自动化学报.2004,30(5):747-756
    [118]庞彦军,刘开第,张博文.综合评价系统客观性指标权重的确定方法.系统工程理论与实践.2001,21(8):37-42
    [119]Anind K. Dey. Providing Architectural Support for Building Context-Aware Applications. PhD thesis, Georgia Institute of Technology.2002
    [120]Li Xiong, Ling Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In Proc. of the 4th ACM conference on Electronic commerce. San Diego, CA, USA. ACM Press.2003:228-229
    [121]Dhiraj K.Pradham. Fault Tolerant Computer System Design. Prentice Hall,1996
    [122]周明辉,梅宏,焦文品.基于中间件的可定制信任管理框架.电子学报.2005,33(5):820-826
    [123]J. R. Douceur. The Sybil Attack. In Proc. of 1st International Workshop on P2P System. Springer-Verlag Press.2002:251-260
    [124]He Dake, Wang Jianbo, Zheng Yu. User Authentication Scheme Based on Self-certified Public-key for Next Generation Wireless Network. Int'l Symposium on Biometrics and Security Technologies. Islamabad, Pakistan.2008:1-8
    [125]Wang Rongbin, Chen Shuyu, Li Jing. GADAM:An Authorization Model Based on Attribute Delegation in Grid. Workshop on Power Electronics and Intelligent Transportation System.2008:546-550
    [126]Rita Chen, William Yeager. Poblano:A distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems, August 2001. Available at: http://www.jxta.org/docs/trust.pdf
    [127]Grandison T. Trust Management for Internet Applications. PhD Thesis. Department of Computing, University of London.2003
    [128]Xudong Ni, Junzhou Luo, Aibo Song. A Trust Degree Based Access Control for Multi-domains in Grid Environment. In Procs. of 11th International Conference on Computer Supported Cooperative Work in Design.2007:864-869
    [129]Terstyanszky, G., Kiss, T., Delaitre, T. etc. Service-Oriented Production Grids and User Support. In Procs. of 7th IEEE/ACM International Conference on Grid Computing.2006:323-324
    [130]Bruce Christianson, William S. Harbison. Why isn't trust transitive? In Proceedings of the Security Protocols International Workshop. University of Cambridge,1996:Lecture Notes in Computer Science.1997, Vol.1189:171-176
    [131]Yiyu Yu, Junhua Tang, Liming Hao etc. A Grid Trust Model Based On MADM Theory. IEEE Global Telecommunications Conference.2008:1-5
    [132]曲向丽.网格环境下互信机制关键技术研究.国防科技大学博士论文.2006:57-62
    [133]D.Prashant. PRIDE:Peer-to-Peer Reputation Infrastructure for Decentralized Environments.13th Int'l WWW Conference. New York, USA.2004:480-481
    [134]Elizabeth Gray, Jean-Marc Seigneur, Yong Chen etc. Trust Propagation in Small Worlds. iTrust 2003:239-254
    [135]袁时金.信任管理关键技术研究.复旦大学博士学位论文.2004:62-68
    [136]Xudong Ni, Junzhou Luo. A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations.22nd International Conference on Advanced Information Networking and Applications 2008:100-105
    [137]Yan Sun, Wei Yu, Zhu Han, Liu, etc., Trust modeling and evaluation in ad hoc networks. Global Telecommunications Conference. IEEE Press.2005. Vol.3:1-10
    [138]黄辰林.动态信任关系建模和管理技术研究.国防科技大学博士论文.2005:12-36
    [139]刘开第,庞彦军,吴和琴等.信息及其数学表达.系统工程理论与实践.1999,8:91-93
    [140]工光远.工程软件设计理论.北京:科学出版社.1992
    [141]邓聚龙.灰色系统理论教程。武汉:华中理工大学出版社,1990
    [142]工光远.未确知信息及其数学处理.哈尔滨建工学院学报,1990,23(4):1-9
    [143]刘开弟,吴和琴,庞彦军.不确定信息数学处理及应用.北京:科学出版社.1999
    [144]刘开第,吴和琴,庞彦军.盲数可信度的概念及BM模型.运筹与管理.7(4),1998
    [145]吴华英.未确知数学在工程管理中的应用.数量经济技术研究,2000(2)
    [146]刘开第,庞彦军,吴和琴等.模糊隶属度定义中隐含的问题.系统工程理论与实践.2000,20(1):110-112
    [147]庞彦军,刘开第,刘军等.模糊数学中“取大取小”运算引发的问题.系统工程理论与实践.2001,9:98-101
    [148]Yunfa Li, Xiangha Xu, Jian Wan etc. An Authentic Measurement Mechanism of Service for Trusted Grid. The 3rd China Grid Annual Conference.2008:167-173
    [149]Almenarez F, Marin A, Diaz D etc. Developing a model for trust management in pervasive devices. In Proc. of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security (Bob Werner edited.). Washington: IEEE Computer Society Press.2006:267-272

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700