用户名: 密码: 验证码:
P2P环境下演化的信誉系统及其关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
当前,P2P系统的安全和可用性问题已经成为制约P2P技术发展和应用的最大障碍之一,面对大量存在的恶意和自私行为,P2P的信任风险正急剧增大。信誉系统提供了一种有效的机制,它能够抑制节点的恶意行为,并激励节点积极参与交易,从而为P2P系统构建一个运行平稳、安全高效的网络环境。
     为了让信誉系统适应P2P系统的演化,在复杂多变的动态环境下仍能保证其有效性,从而最终促进P2P系统的进化,本文以P2P文件共享系统为背景,在深入分析P2P系统演化性的基础上,结合当前信誉系统研究的理论成果和不足,我们提出紧密相关的两个研究问题:如何构建有效的信任评估模型,以及如何调节信任评估模型参数和结构以提高其适应性的问题。围绕解决上述问题,本文主要的研究工作和成果如下。
     (1)提出了一种演化的信誉系统并构建了其框架
     鉴于P2P系统与生态系统的相似性,本文借鉴网络社会学和生态学的相关理论,提出了P2P社会生态系统的概念,并构建了一种基于“大分布、小分布”的混合式架构的演化的信誉系统ERS。
     (2)提出一种基于种群进化的信任认知模型PATrust
     P2P系统中节点间的信任关系一定程度上反映了人类社会中的人际信任关系,而人际信任的构建与维护则是一个演化的认知过程。鉴于此,我们跳出传统信任评估模型的建模思路,从生态系统的种群进化中得到启发,结合社会认知论的相关理论和方法,借鉴人类良好的认知习惯和丰富的认知经验,提出了一种基于种群进化的信任认知模型PATrust。PATrust采用选择、交叉和变异三种进化策略实现了对信任的有效认知。模型还引入了一种基于“言行一致”的单次交易满意度计算模型和推荐信息协同过滤机制,前者一定程度上降低了单次交易满意度计算的主观性;后者较大改善了推荐信息过滤和推荐信任值评估的效率和准确性。仿真分析表明,与经典的信任评估模型EigenTrust和P2PRep相比,PATrust在收敛水平、整体适应度(整体交易成功率)方面均有较大提高,并能更有效地抑制更广泛类型的恶意节点,特别是具有适应能力的恶意节点的攻击行为。
     (3)提出一种基于元认知的PATrust参数适应性调节模型
     现有的一些信任评估模型一般采用在模型中引入确定性参数的方法实现模型在运行时的自适应调节,但是该方法存在参数设置的合理性有待验证、难以动态调节等方面的问题。针对该问题,我们借鉴认知调节和模糊逻辑控制原理,并利用人类在认知调节方面的丰富经验和良好习惯,为PATrust设计了一个基于元认知的参数适应性调节模型MARM。通过实时监测节点信任认知活动的进展,MARM能适时地对PATrust的参数进行动态调节。仿真分析表明,MARM调节下的PATrust在动态环境中表现出良好的性能。
     (4)提出一种基于集群的PATrust结构适应性调节模型
     鉴于现有基于分布式架构的信任评估模型在复杂性,通信、存储和计算代价,信任值收敛方面存在的问题,以及当前基于“大分布、小集中”的混合式架构的信任评估模型的不足,为改善PATrust的结构适应性,我们从生态系统的集群效应得到启发,提出一种新的基于集群的信任认知模型CBTrust。CBTrust通过基于集群的信任认知和向心力驱动的集群演化管理的相互作用,在获得良好激励效果的同时,也改进了信任认知模型的性能,降低了通信、存储和计算代价。仿真分析表明,相对于PATrust而言,CBTrust的性能得到了极大改善;通过集群演化管理,CBTrust还能有效激励节点积极参与交易。此外,抵御针对CBTrsut的攻击的能力的仿真也表明,CBTrust具有一定的健壮性。
Currently,the security and availability problems of Peer-to-Peer(P2P) systems are becoming one of the biggest obstacles which Constraint the development and application of P2P technology, as there are lots of malicious and selfish behavior here, the trust risk for P2P is now rapidly increasing. In order to build a smooth running, secure and efficient network environment for P2P systems, the reputation system provides an effective mechanism, which can inhibit the peers' malicious behavior, and incent them to actively participate into the transaction.
     In order to make the reputation system to adapt to the evolution of P2P systems, and can still ensure and improve its effectiveness in complex dynamic environment, and ultimately promotes the anagenesis of P2P systems. In view of this, under the background of P2P file sharing system, and on the basis of in-depth analyzing of the evolution of P2P systems, and with the current theoretical achievements and shortcomings, two closely related research questions are proposed in our thesis: how to build a more natural and more reasonable trust evaluating model; and how to adaptively regulate the parameter and structure of trust evaluating model. To solve those questions above, our work in this paper can be briefly introduced as following.
     (1)An Evolutive Reputation System and its Framework
     In view of the similarity between P2P systems and ecosystem, and by using the related theories of Network Society and Ecology for reference, the concept of P2P social ecosystem (P2PSE) is proposed, where this paper presents an evolutive reputation system (ERS) based on hybrid architecture with the characteristics of "distributed in the whole, whereas distributed in the cluster".
     (2) A Population Anagenesis based Trust Cognition Model
     As the trust relationship between peers in P2P system to some extent reflects the interpersonal trust relationship in human society, and the build and maintenance of interpersonal trust is an evolutive cognitive process. In view of this, through thinking out of the traditional modeling for trust evaluating, and being inspired by the population anagenesis of ecological systems, and being associated with social cognitive theory and related method, a population anagenesis based trust cognition model (PATrust) is proposed. The main contributions of the PATrust include: good cognitive habits and rich cognitive experience of human beings are effectively utilized; three evolutionary strategies, i.e. selection, crossover and mutation are introduced so as to effectively cognize the peer's trust; in order to reduce the subjectivity of the calculating of transaction satisfaction degree (TSD), a model for calculating TSD based on "practise what you preach" is proposed; through introducing the mechanism of collaborative filtering for recommendations, the Efficiency and accuracy of recommendation filtering and the recommending trust value evaluating are greatly improved.
     Our experiments show that the PATrust outperforms the traditional trust evaluating model, such as the EigenTrust and P2PRep, in terms of both Convergence and total fitness degree, and that our model can more effectively inhibit a broader type of malicious behavior, especially the attack behavior performed by some adaptable malicious peers.
     (3)A Metacognition-based Adaptive Regulating Model for the parameter of PATrust
     In order to improve the adaptability of trust evaluating model, some existing models commonly utilize approaches by introducing the deterministic parameters, however, those approaches still have problems, such as: the rationality of parameter setting needs to validate; it's hard to dynamically adjust the parameters at runtime. As a result, from the perspective of cognitive regulation and fuzzy logic control, and through using the good habits and rich experience of human beings in cognitive regulation, a metacognition-based adaptive regulating model for the parameter of PATrust (MARM) is proposed.
     Our experiments show that the PATrust with MARM outperforms the PATrust without MARM in dynamic environment.
     (4) A Cluster-based Adaptive Regulating Model for the structure of PATrust Most existing distributed architecture-based trust evaluating models have limitation in the complexity, the cost of communication, storage and computation, and the convergence of trust value. Furthermore, the trust evaluating models based on hybrid architecture with characteristics of "distributed in the whole, whereas centralized in the cluster" also have their limitation. We propose a cluster-based trust cognitive model (CBTrust). Through the interaction between the cluster-based trust cognition and centripetal force-based Cluster Evolution Management, the main contributions of the CBTrust include: the performance of trust cognitive model is improved; good incentive effect for peers is also obtained.
     Our experiments show that the performance of the CBTrust is greatly improved while comparing with the PATrust, and the CBTrust can effectively incent the peers to actively participate into the transaction, and the CBTrust is robust to resist the attack aimed at the CBTrust itself.
引文
[1] PPLive Inc. PPLive[EB/OL].2004. Available at http://www.pplive.com/.
    [2] PPStream Inc. PPStream[EB/OL].2005. Available at http://www.ppstream.com/.
    [3] Liao X, Jin H, Liu Y, et al. Anysee: Peer-to-peer live streaming[C].Proceedings of IEEE INFOCOM, 2006.
    [4] Zhang X, Liu J, Li B, et al. CoolStreaming/DONet: A data-driven overlay network for efficient live media streaming[C].Proceedings of IEEE INFOCOM, Citeseer, 2005.
    [5] Good N S, Krekelberg A. Usability and privacy: a study of Kazaa P2P file sharing[C].Proceedings of the SIGCHI conference on Human factors in computing systems, ACM, 2003.
    [6] Lime Wire LLC. Rfc-Gnutella 0.6[S]. 2002.
    [7] Brilliant Digital Entertainment I. KaZaA media desktop[EB/OL].2002. Available at http://www. kazaa.com.
    [8] Bittorrent Inc. Bittorrent[EB/OL].2001. Available at http://www.bittorrent.com.
    [9] Napster Inc. Napster Website1999. www.napster.com.
    [10]刘琼,徐鹏,杨海涛, et al. Peer-to-Peer文件共享系统的测量研究[J].软件学报. 2006, 17(10): 2131-2140.
    [11] Anderson D P, Cobb J, Korpela E, et al. SETI@ home: an experiment in public- resource computing[J]. Communications of the ACM. 2002, 45(11): 61.
    [12] Siemion A, Von Korff J, Mcmahon P, et al. New SETI sky surveys for radio pulses[J]. Acta Astronautica. 2010.
    [13] Pande V. Folding@ home[EB/OL].2000. Available at http://www.stanford.edu/ group/pandegroup/Cosm.
    [14] Planetary Society. seti@home project home page[EB/OL].1999.Available at http://setiathome. ssl.berkeley.edu/.
    [15] Olson A. FightAIDS@ Home: Accelerate AIDS Research by Deploying Global "Grid" of Distributed Computing Power[EB/OL].Available at http://fightaids athome. scripps.edu.
    [16] Beberg A L, Ensign D L, Jayachandran G, et al. Folding@ home: Lessons From Eight Years of Volunteer Distributed Computing[J]. Distributed Computing. , 4: 5.
    [17] Rowstron A, Druschel P. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility[J]. ACM SIGOPS Operating Systems Review. 2001, 35(5): 201.
    [18] Kubiatowicz J, Bindel D, Chen Y, et al. Oceanstore: An architecture for global-scale persistent storage[J]. ACM SIGARCH Computer Architecture News. 2000, 28(5): 190-201.
    [19]鞠大鹏,黎明,胡进锋, et al.一种P2P环境下的B+树索引管理算法[J].计算机研究与发展. 2005, 42(8).
    [20] Suel T, Mathur C, Wu J W, et al. Odissea: A peer-to-peer architecture for scalable web search and information retrieval[C].Proceedings of the International Workshop on the Web and Databases, Citeseer, 2003.
    [21] Waterhouse S. JXTA search: Distributed search for distributed networks[R]. Sun Microsystems Inc, 2001.
    [22]韦冬.对等网络文件共享系统中的信誉机制研究[D].中国科学技术大学,2009.
    [23]刘凤鸣. P2P服务环境中基于社会网络的信任计算研究[D].上海:东华大学, 2008.
    [24]王小峰.信任管理的策略表示与量化模型研究[D].长沙:国防科学技术大学, 2009.
    [25] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C].Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1996.
    [26] J?sang A. Prospectives for Online Trust Management[J]. IEEE Transactions on Knowledge and Data Engineering. 2007.
    [27] Samreen A, Hussain S. Trust management and incentive mechanism for P2P networks: Survey to cope challenges[C].Proceedings of IEEE International Multitopic Conference, 2008. , 2008.
    [28] Zhou R, Hwang K. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems. 2007, 18(4): 460-473.
    [29] Ruohomaa S, Kutvonen L, Koutrouli E. Reputation management survey[C]. Proceedings of The Second International Conference on Availability, Reliability and Security,ARES 2007. , 2007.
    [30] Liang J, Naoumov N, Ross K W. The index poisoning attack in p2p file sharing systems[C].Proceedings of IEEE INFOCOM, Citeseer, 2006.
    [31]黄全能,宋佳兴,刘卫东, et al.对等网络信誉机制研究综述[J].小型微型计算机系统. 2006, 27(7): 1175-1181.
    [32] Srivatsa M, Xiong L, Liu L. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks[C].Proceedings of the 14th international conference on World Wide Web, ACM, 2005.
    [33] Song S, Hwang K, Zhou R, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing. 2005, 9(6): 24-34.
    [34] Xiong L, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE transactions on Knowledge and Data Engineering. 2004, 16(7): 843-857.
    [35] Lee S, Sherwood R, Bhattacharjee S. Cooperative peer groups in NICE[C]. Proceedings of IEEE INFOCOM, Citeseer, 2003.
    [36] Kamvar S D, Schlosser M T, Garcia-Molina H. The eigentrust algorithm for reputation management in p2p networks[C].Proceedings of the 12th international conference on World Wide Web, ACM, 2003.
    [37] Cornelli F, Damiani E, Di Vimercati S, et al. Choosing reputable servents in a P2P network[C].Proceedings of the 11th international conference on World Wide Web, ACM New York, NY, USA, 2002.
    [38] Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system[C]. Proceedings of the tenth international conference on Information and knowledge management, ACM, 2001.
    [39] Novotny M, Zavoral F. Matrix Model of Trust Management in P2P Networks[C]. Proceedings of the 3rd International Conference on Research Challenges in Information Science (RCIS 2009), Fez, MOROCCO: 2009.
    [40] Cai B A, Li Z S, Cheng Y, et al. Trust Decision Making in Structured P2P Network[C].Proceedings of International Conference on Communication Software and Networks, Macau, PEOPLES R CHINA: 2009.
    [41] Cai L, Rojas-Cessa R. Bounding Virus Proliferation in P2P Networks with aDiverse-Parameter Trust Management Scheme[J]. Ieee Communications Letters. 2009, 13(10): 812-814.
    [42] Cai L, Rojas-Cessa R. Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme[C].Proceedings of IEEE Sarnoff Symposium 2009, Princeton, NJ: 2009.
    [43] Marmol F G, Perez G M, Skarmeta A F G. TACS, a Trust Model for P2P Networks[J]. Wireless Personal Communications. 2009, 51(1): 153-164.
    [44] Wu X, He J S, Xu F, et al. A Distributed Decision-Making Mechanism for Wireless P2P Networks[J]. Journal of Communications and Networks. 2009, 11(4): 359-367.
    [45] Wang L, Hu G X, Liu L Q. Using domain trust and Trusted evaluation for building self-organized p2p semantic community[C].Proceedings of International Workshop on Education Technology and Training/International Workshop on Geoscience and Remote Sensing (ETT and GRS 2008), Shanghai, PEOPLES R CHINA: 2009.
    [46] Hu J L, Wu Q Y, Zhou B. SPTM: A Security Protocol for Protecting the P2P Trust Information Management[C].Proceedings of International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA: 2009.
    [47] Fedotova N, Veltri L. Reputation management algorithms for DHT-based peer-to- peer environment[J]. Computer Communications. 2009, 32(12): 1400-1409.
    [48] Wang Y, Wang R C, Han Z J. Dynamical Trust Construction Schema with Fuzzy Decision in P2P Systems[J]. Chinese Journal of Electronics. 2009, 18(3): 417-421.
    [49] Yang X H, Dantu R, Wijesekera D. Achieving Peer-to-peer Telecommunication Services through Social Hashing[C].Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV: 2009.
    [50] Cai B A, Li Z S, Fu D, et al. Structured Topology for Trust in P2P Network[C]. Proceedings of the 2nd International Workshop on Knowledge Discovery Data Mining, Moscow, RUSSIA: 2009.
    [51] Chen K, Hwang K, Chen G. Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks[J]. Ieee Transactions on Parallel and Distributed Systems. 2009, 20(1): 83-96.
    [52]李勇军,代亚非.对等网络信任机制研究[J].计算机学报. 2010, 33(390-405).
    [53]常俊胜,王怀民,尹刚. DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报. 2006, 29(8): 1301-1307.
    [54] Song S, Hwang K, Kwok Y K. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling[J]. IEEE Transactions on Computers. 2006: 703-719.
    [55] Weng J, Miao C, Goh A. A Robust Reputation System for the Grid[C].Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, IEEE Computer Society, 2006.
    [56] Wang Y, Singh M P. Trust representation and aggregation in a distributed agent system[C].Proceedings of International Conference on Artificial Intelligence (AAAI), 2006.
    [57] Yu B, Singh M P. Detecting deception in reputation management[C].Proceedings of the second international joint conference on Autonomous agents and multiagent systems, ACM, 2003.
    [58]黄厚宽,张伟.多Agent系统中信任和信誉系统研究综述[J].计算机研究与发展. 2008, 45(7): 1151-1160.
    [59] Kuter U, Golbeck J. Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models[C].Proceedings of the National Conference on Artificial Intelligence, Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2007.
    [60] Golbeck J, Hendler J. Inferring binary trust relationships in web-based social networks[J]. ACM Transactions on Internet Technology (TOIT). 2006, 6(4): 529.
    [61] Stern D H, Herbrich R, Graepel T. Matchbox: Large scale online Bayesian recommendations[C].Proceedings of the 18th international conference on World wide web, New York, NY, USA: ACM , 2009.
    [62] Chen W Y, Zhang D, Chang E Y. Combinational collaborative filtering for personalized community recommendation[C].Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining: ACM, 2008.
    [63] Rubin S, Christodorescu M, Ganapathy V, et al. An auctioning reputation system based on anomaly[C].Proceedings of the 12th ACM conference on Computer and communications security, ACM, 2005.
    [64] Liang J, Kumar R, Xi Y, et al. Pollution in p2p file sharing systems[C].Proceedings of IEEE INFOCOM, Citeseer, 2005.
    [65]纪雯.对等环境下信誉机制的若干关键问题研究[D].合肥:中国科学技术大学, 2009.
    [66] Manjoo F. Gnutella bandwidth bandits[J]. Salon. com, August. 2002, 8.
    [67]路卫娜.开放网络环境中的激励机制研究[D].中国科学技术大学, 2009.
    [68] Adar E, Huberman B A. Free riding on gnutella[J]. First Monday. 2000, 5(10): 2-23.
    [69] Plissonneau L, Costeux J L, Brown P. Analysis of peer-to-peer traffic on ADSL[J]. Passive and Active Network Measurement. 2005: 69-82.
    [70] Sen S, Wang J. Analyzing peer-to-peer traffic across large networks[C].Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, ACM, 2002.
    [71] Seamons K E, Winslett M, Yu T, et al. Requirements for policy languages for trust negotiation[C].Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, 2002.
    [72] Resnick P, Kuwabara K, Zeckhauser R, et al. Reputation systems[J]. Communica- tions of the ACM. 2000, 43(12): 45-48.
    [73] J?sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems. 2007, 43(2): 618-644.
    [74] Marti S, Garcia-Molina H. Limited reputation sharing in P2P systems[C]. Proceedings of the 5th ACM conference on Electronic commerce, New York: ACM Press, 2004.
    [75] Yu B, Singh M P, Sycara K. Developing trust in large-scale peer-to-peer systems[C].Proceedings of the 2004 IEEE First Symposium on Multi-Agent Security and Survivability, Los Alamitos: IEEE Press, 2004.
    [76] Damiani E, Paraboschi S, Samarati P, et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks[C].Proceedings of the 9th ACM conference on Computer and communications security, NY, USA: ACM New York, 2002.
    [77]窦文,王怀民,贾焰, et al.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报. 2004, 15(4): 572-583.
    [78] Milgram S. The small world problem[J]. Psychology today. 1967, 2(1): 60-67.
    [79] Watts D J, Strogatz S H. Collective dynamics of‘small-world’networks[J]. Nature. 1998, 393(6684): 440-442.
    [80] Girvan M, Newman M. Community structure in social and biological networks[J]. Proceedings of the National Academy of Sciences. 2002, 99(12): 7821.
    [81]冯沁原,代亚非. P2P网络信任机制综述[J].中国计算机学会通讯. 2007, 3(3): 31-40.
    [82] Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation systems[J]. ACM Computing Surveys. 2008, 42(1): 1-31.
    [83] Angiulli F, Basta S, Pizzuti C. Distance-based detection and prediction of outliers [J]. IEEE transactions on knowledge and data engineering. 2006: 145-160.
    [84] Duma C, Shahmehri N, Garonni G. Dynamic trust metrics for peer-to-peer systems[C].Proceedings of the 2nd International Workshop on P2P Data Management,Security and Trust, Copenhagen, Denmark: 2005.
    [85]李小勇,桂小林.动态信任预测的认知模型[J].软件学报. 2010, 21(1): 163-176.
    [86]石志国,刘冀伟,王志良.基于时间窗反馈机制的动态P2P信任模型[J].通信学报. 2010, 31(2).
    [87] Guo L, Yang S, Wang J, et al. Trust model based on similarity measure of vectors in P2P networks[C].Proceedings of the 4th International Conference on Grid and Cooperative Computing, Beijing,China: 2005.
    [88]金瑜,古志民,顾进广, et al.一种对等网中基于相互信任的两层信任模型[J]. Journal of Software. 2009, 20(7): 1909-1920.
    [89]唐扬斌,王怀民,常俊胜.自组织虚拟计算环境中的组信誉机制[J]. Journal of Software. 2007, 18(8): 1968-1986.
    [90]田慧蓉,邹仕洪,王文东, et al. P2P网络层次化信任模型[J].电子与信息学报. 2007, 29(011): 2560-2563.
    [91]田春岐,江建慧,胡治国, et al.一种基于聚集超级节点的P2P网络信任模型[J].计算机学报. 2010, 33(2): 346-355.
    [92] Mekouar L, Ireqi Y, Boutaba R. A reputation management and selection advisor schemes for peer-to-peer systems[C].Proceedings of the 15th lFIP/IEEE International Workshop on Distributed Systems: Operations&Management, CA,USA: 2005.
    [93]窦文.信任敏感的P2P拓扑构造及其相关技术研究[D].湖南长沙:国防科学技术大学, 2003.
    [94]张骞,张霞,刘积仁, et al.一种有效的Peer-to-Peer自适应拓扑进化协议[J].软件学报. 2007, 18(2): 400-411.
    [95]田慧蓉,邹仕洪,王文东, et al.激励一致的自适应P2P拓扑构造[J].软件学报. 2006, 17(4): 845-853.
    [96] Condie T, Kamvar S D, Garcia-Molina H. Adaptive Peer-to-Peer Topologies[C]. Proceedings of the Fourth International Conference on Peer-to-Peer Computing, IEEE Computer Society, 2004.
    [97] Marsh S P. Formalising trust as a computational concept[D]. Stirling: University of Stirling, 1994.
    [98] Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system[C]. Proceedings of the tenth international conference on Information and knowledgemanagement, ACM, 2001.
    [99]孙伟,赵建芳.信任研究的哲学思考[J].石家庄学院学报. 2006, 8(2).
    [100] Gambetta D. Can we trust trust[J]. Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford. 2000: 213-237.
    [101] Gambetta D. Trust: Making and breaking cooperative relations[M]. New York: Basil Blackwell , 1990.
    [102] Castelfranchi C, Falcone R. Social trust: A cognitive approach[J]. Trust and deception in virtual societies. 2002: 55-90.
    [103] J?sang A, Keser C, Dimitrakos T. Can we manage trust?[J]. Trust Management. 2005: 93-107.
    [104] Almenarez F, Marin A, Diaz D, et al. A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications[C].Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications, Hong Kong, PEOPLES R CHINA: 2008.
    [105] Fang Q, Ji Y, Wu G X. A Run-Length Coding Based Dynamic Trust Model in P2P Network[C].Proceedings of International Conference on Computational Intelligence and Security, Suzhou, PEOPLES R CHINA: 2008.
    [106] Di Stefano A, Morana G, Zito D. QoS aware services discovery in a P2P Grid environment[C].Proceedings of the 2nd International Conference on Pervasive Computing and Applications, Vols 1 and 2, Birmingham, ENGLAND: 2007.
    [107] Yang C, Liu J, Sui A, et al. A digital rights management architecture for multimedia in P2P[C].Proceedings of the 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Nanjing, PEOPLES R CHINA: 2007.
    [108] Jiang T, Baras J S. Trust evaluation in anarchy: A case study on autonomous networks[C].Proceedings of IEEE INFOCOM 2006 Conference/25th IEEE International Conference on Computer Communications, Barcelona, SPAIN: 2006.
    [109] Aringhieri R, Bonomi D. A simulation model for trust and reputation system evaluation in a P2P network[C].Proceedings of the 9th International Conference on Dortmund Fuzzy Days, Dortmund, GERMANY: Springer-Verlag Berlin, 2006.
    [110] Rotter J B. A new scale for the measurement of interpersonal trust[J]. Journal of personality. 1967, 35(4): 651-665.
    [111] Abdul-Rahman A, Hailes S. Supporting trust in virtual communities[C]. Proceedings of International Conference on System Sciences, Hawaii: 2000.
    [112] Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation[C].Proceedings of the 35th Hawaii International Conference on System Sciences, Citeseer, 2002.
    [113] Chang E, Dillon T, Hussain F, et al. Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence[J]. Ubiquity. 2006, 7: 29.
    [114]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报. 2007, 18(6): 1510-1521.
    [115] Curtis N, Safavi-Naini R, Susilo W. X2rep: Enhanced trust semantics for the xrep protocol[C].Proceedings of the 2nd conference of Applied Cryptography and Network Security, Berlin, Heidelberg: Springer-Verlag, 2004.
    [116] Guha R, Kumar R, Raghavan P, et al. Propagation of trust and distrust[C].Proceedings of the 13th international conference on World Wide Web, ACM, 2004.
    [117]张骞,张霞,文学志, et al. Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报. 2006, 17(001): 96-107.
    [118] [118]李景涛,荆一楠,肖晓春, et al.基于相似度加权推荐的P2P环境下的信任模型[J]. Journal of Software. 2007, 18(1): 157-167.
    [119] Nandi A, Ngan T W, Singh A, et al. Scrivener: Providing incentives in cooperative content distribution systems[J]. Middleware 2005. 2005: 270-291.
    [120] Abdul-Rahman A, Hailes S. Supporting trust in virtual communities[C].Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Los Alamitos: Published by the IEEE Computer Society, 2000.
    [121] Cahill V, Gray E, Seigneur J M, et al. Using trust for secure collaboration in uncertain environments[J]. IEEE Pervasive Computing. 2003, 2(3): 52-61.
    [122] Carbone M, Nielsen M, Sassone V. A formal model for trust in dynamic networks[C].Proceedings of First International Conference on Software Engineering and Formal Methods, 2003.
    [123] Liang Z, Shi W. PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing[C].Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Piscataway: IEEE Computer Society, 2005.
    [124]姜守旭,李建中,联系人.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报. 2007, 18(10): 2551-2563.
    [125] Krukow K, Nielsen M. From simulations to theorems: A position paper on research in the field of computational trust[R]. , 2007.
    [126] Despotovic Z, Aberer K. P2P reputation management: Probabilistic estimation vs. social networks[J]. Computer Networks. 2006, 50(4): 485-500.
    [127] J?sang A. A logic for uncertain probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2001, 9(3): 279-311.
    [128] J?sang A. Trust-based decision making for electronic transactions[C]. Proceedings of the 4th Nordic Workshop on Secure Computer Systems (NORDSEC’99), Stockholm University, Sweden: Citeseer, 1999.
    [129] Yu B, Singh M P. An evidential model of distributed reputation management[C]. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, ACM, 2002.
    [130] Manchala D W. Trust metrics, models and protocols for electronic commerce transactions[C].Proceedings of the 18th International Conference on Distributed Computing Systems, Los Vaqueros: IEEE Computer Society, 1998.
    [131] Sabater J, Sierra C. REGRET: reputation in gregarious societies[C]. Proceedings of the fifth international conference on Autonomous agents, Montreal, Canada: ACM, 2001.
    [132] Sabater J, Sierra C. Reputation and social network analysis in multi-agent systems[C].Proceedings of the first international joint conference on Autonomous agents and multiagent systems, ACM, 2002.
    [133] Sabater J, Sierra C. Social regret, a reputation model based on social relations[J]. ACM SIGecom Exchanges. 2001, 3(1): 56.
    [134] Aringhieri R, Damiani E, Di Vimercati S, et al. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems[J]. Journal of the American Society for Information Science and Technology. 2006, 57(4): 528-537.
    [135] Song S, Hwang K, Zhou R, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing. 2005, 9(6): 24-34.
    [136] Griffiths N. A fuzzy approach to reasoning with trust, distrust and insufficient trust[C].Proceedings of the 10th International Workshop on Cooperative Information, Heidelberg: Springer-Verlag, 2006.
    [137] Schmidt S, Steele R, Dillon T S, et al. Fuzzy trust evaluation and credibility development in multi-agent systems[J]. Applied Soft Computing. 2007, 7(2): 492-505.
    [138]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报. 2003, 14(8): 1401-1408.
    [139]徐兰芳,胡怀飞,桑子夏, et al.基于灰色系统理论的信誉报告机制[J].软件学报. 2007, 18(7): 1730-1737.
    [140]黄海生,王汝传.基于隶属云理论的主观信任评估模型研究[J].通信学报. 2008, 29(4).
    [141]李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展. 1995, 32(006): 15-20.
    [142]李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学. 2004, 6(008): 28-34.
    [143] He R, Niu J, Zhang G. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing[C].Proceedings of the 3rd International Symposium on Parallel and Distributed Processing and Applications—ISPA 2005 Workshops, Berlin: Heidelberg:Springer-Verlag, 2005.
    [144] He R, Niu J, Hu K. A novel approach to evaluate trustworthiness and uncertainty of trust relationships in peer-to-peer computing[C].Proceedings of the 5th International Conference on Computer and Information Technology, Los Vaqueros: IEEE Computer Society, 2005.
    [145] Altman A, Tennenholtz M. Axiomatic foundations for ranking systems[J]. Journal of Artificial Intelligence Research. 2008, 31(1): 473-495.
    [146] Altman A, Tennenholtz M. An axiomatic approach to personalized ranking systems[J]. Journal of the ACM (JACM). 2010, 57(4): 1-35.
    [147] Cheng A, Friedman E. Sybilproof reputation mechanisms[C].Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, ACM, 2005.
    [148] Cheng A, Friedman E. Manipulability of PageRank under sybil strategies[C].Proceedings of First Workshop on the Economics of Networked Systems (NetEcon06), Citeseer, 2006.
    [149]唐扬斌.虚拟计算环境下的组信誉与激励机制研究[D].湖南长沙:国防科学技术大学, 2003.
    [150] Marti S, Garcia-Molina H. Limited reputation sharing in P2P systems[C]. Proceedings of the 5th ACM conference on Electronic commerce, ACM, 2004.
    [151] Marti S, Garcia-Molina H. Taxonomy of trust: Categorizing P2P reputation systems[J]. Computer Networks. 2006, 50(4): 472-484.
    [152] J?sang A, Ismail R. The beta reputation system[C].Proceedings of the 15th Bled Electronic Commerce Conference, Citeseer, 2002.
    [153] Mui L, Mohtashemi M, Ang C. A probabilistic rating framework for pervasive computing environments[C].Proceedings of the MIT Student Oxygen Workshop (SOW’2001), 2001.
    [154] Mui L, Mohtashemi M, Ang C, et al. Ratings in distributed systems: A bayesian approach[C].Proceedings of the Workshop on Information Technologies and Systems (WITS), Citeseer, 2001.
    [155] Whitby A, J?sang A, Indulska J. Filtering out unfair ratings in bayesian reputation systems[J]. The Icfain Journal of Management Research. 2005, 4(2): 48-64.
    [156] Despotovic Z, Aberer K. Probabilistic prediction of peers' performance in P2P networks[J]. Engineering Applications of Artificial Intelligence. 2005, 18(7): 771-780.
    [157]邓聚龙.灰色系统[M].国防工业出版社, 1985.
    [158] Page L, Brin S, Motwani R, et al. The pagerank citation ranking: Bringing order to the web[R]. Stanford Digital Library Technologies Project, 1998.
    [159] Ziegler C N, Lausen G. Spreading activation models for trust propagation[C]. Proceedings of 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004.
    [160] Levien R. Attack Resistant Trust Metrics[D]. University of California, 2004.
    [161] Yang B, Molina H J. Micropayments for Peer-to-Peer Systems[C].Proceedings of the 10th ACM Conference on Computer and Communications Security, ACM Press, 2003.
    [162] Philippe G, Kevin L B, Hya M, et al. Incentives for Sharing in Peer-to-Peer Networks[C].Proceedings of the ACM Conference on Electronic Commerce: 2001.
    [163] Ioannidis J, Ioannidis S, Keromytis A D, et al. Fileteller:Paying and Getting Paid for File Storage[C].Proceedings of the 6th Annual Conference on Financial Cryptography, 2002.
    [164] Jiang J, Bai H, Wang W. Trust and Cooperation in Peer-to-Peer Systems[C]. Proceedings of the 2nd workshop on Grid and Cooperative Computing, 2003.
    [165] Ranganathan K, Ripeanu M, Sarin A, et al. To Share or Not to Share: An Analysis of Incentives to Contribute in File Sharing Environments[C].Proceedings of the First International Workshop on Economics of Peer to Peer Systems, 2003.
    [166] Sun Q, Garcia-Molina H. SLIC:A Selfish Link-Based Incentive Mechanism for Unstructured Peer-to-Peer Networks[C].Proceedings of the 24th International Conference on Distributed Computing Systems, 2003.
    [167] Feldman M, Lai K, Stoica I, et al. Robust Incentive Techniques for Peer-to-Peer Networks[C].Proceedings of the 5th ACM Conference on Electronic Commerce, 2004.
    [168] Jun S, Ahamad M. Incentives in BitTorrent Induce Free Riding[C].Proceedings of the ACM SIGCOMM. Workshop on Economics of Peer-to-Peer Systems ,2005.
    [169] Lai K, Feldman M, Stoica I, et al. Incentives for Cooperation in Peer-to-Peer Networks[C].Proceedings of workshop on Econmics of P2P systems, 2003.
    [170] Karnvar S D, Shlosser M T, Garcia-Molina H. Incentives for Combatting Free- riding on P2P Networks[J]. Euro-Par. 2003.
    [171] Blanc A, Liu Y K, Vahdat A. Designing Incentives for Peer-to-Peer Routing[C]. Proceedings of the 2nd Workshop on Economics of Peer-to-Peer Systems, 2004.
    [172] Ma R T B, Lee S C M, Lui J C S, et al. An Incentive Mechanism for P2P Networks[C].Proceedings of the 24th International Conference Distributed Computing Systems, 2004.
    [173]李长云,何频捷,李玉龙.软件动态演化技术[M].北京:北京大学出版社, 2007.
    [174] Lehman M M, Ramil J F, Wernick P D, et al. Metrics and laws of softwareevolution-the nineties view[C].Proceedings of the 4th International Symposium on Software Metrics, the IEEE Computer Society Press, 1997.
    [175]许国志,顾基发,车宏安, et al.系统科学[M].上海科技教育出版社, 2000.
    [176] Lutz R. Evolving good hierarchical decompositions of complex systems[J]. Journal of systems architecture. 2001, 47(7): 613-634.
    [177]李夏,载汝为.突现(Emergence)——系统研究的新观念[J].控制与决策. 1999, 14(002): 97-102.
    [178] Elgazzar A S. A model for the evolution of economic systems in social networks[J]. Physica A: Statistical Mechanics and its Applications. 2002, 303(3-4): 543-551.
    [179]杨小凯,黄有光.专业化与经济组织——一种新兴古典微观经济学框架[Z].北京:经济科学出版社, 1999.
    [180]罗杰文. Peer to Peer ( P2P )综述[R].北京:中科院计算技术研究所, 2005.
    [181]卡斯特曼纽尔,夏铸九.网络社会的崛起[M].社会科学文献出版社, 2001.
    [182] Castells M. The rise of the network society[M]. Wiley-Blackwell, 2000.
    [183]郑志勇.网络社会研究[D].北京:北京师范大学, 2005.
    [184]夏学銮,刘曙光.网络社会学建构[J].北京大学学报:哲学社会科学版. 2004, 41(001): 85-91.
    [185]徐国虎,许芳.网络生态平衡理论探讨[J].情报理论与实践. 2006, 29(002): 168-171.
    [186] (法)阿科特.达尔文与生态学[M].哲学译丛, 1984: 3.
    [187] [沙莲香.社会心理学[M].北京:中国人民大学出版社, 1987: 80-125.
    [188]胡建理,吴泉源,周斌, et al.一种基于反馈可信度的分布式P2P信任模型[J].软件学报. 2009, 20(10): 2885-2898.
    [189] Blau P M. Exchange and power in social life[M]. Transaction Publishers, 1986.
    [190]佚名(生态环境网).种群内部的相互关系[EB/OL]. 2005. Available at http:// www.eedu. org.cn/Article/ecology/ecologyth/Populationeco/200512/6902.html
    [191] Singh A, Liu L. TrustMe: anonymous management of trust relationships in decentralized P2P systems[C].Proceedings of the 3rd IEEE International Conference on Peer-to-Peer Computing, 2003.
    [192] Gupta M, Judge P, Ammar M. A reputation system for peer-to-peer networks[C]. Proceedings of ACM, 2003.
    [193] Kinateder M, Pearson S. A privacy-enhanced peer-to-peer reputation system[J]. E-Commerce and Web Technologies. 2003: 206-215.
    [194] Selcuk A A, Uzun E, Pariente M R. A reputation-based trust management system for P2P networks[C].Proceedings of IEEE International Symposium on Cluster Computing and the Grid, 2004.
    [195]彭聃龄主编.普通心理学(修订版)[M].北京:北京师范大学出版社, 2007.
    [196]汤慧香.诚实离异单亲家庭成员的社会认知状况研究[D].长沙:中南大学, 2006.
    [197] Fiske S T, Taylor S E.社会认知一人怎样认识自己和他人[M].贵州:贵州人民出版社, 1994.
    [198]俞国良,辛自强.社会性发展心理学[M].安徽:安徽教育出版社, 2004.
    [199] (美)schellenberg J A.社会心理学的大师们[Z].沈阳:辽宁人民出版社, 1987.
    [200]钟毅平.社会行为研究——现代社会认知理论及实践[M].长沙:湖南教育出版社, 1999.
    [201] Sherman S J, Judd C M, Park B. Social cognition[J]. Annual review of psychology. 1989, 40(1): 281-326.
    [202]华红琴.社会心理学原理和应用[G].上海:上海大学出版社, 2004.
    [203]周爱保.社会认知的理论和实验[M].兰州:甘肃教育出版社, 2002.
    [204]陈刚,陆汝钤.关系网模型—基于社会合作机制的多Agent协作组织方法[J].计算机研究与发展. 2003, 40(001): 107-114.
    [205]潘晓英,刘芳,焦李成.基于智能体的多目标社会进化算法[J]. Journal of Software. 2009, 20(7): 1703-1713.
    [206] Ferster C B, Skinner B F, Cheney C D, et al. Schedules of reinforcement[M]. Copley Publishing Group, 1997.
    [207]姜昌华,韩伟,胡幼华. REPAST——一个多Agent仿真平台[J].系统仿真学报. 2006, 18(8).
    [208] Flavell J H. Metacognitive aspects of problem solving[J]. The nature of intelligence. 1976, 12: 231-235.
    [209] Feferman A B, Feferman S. Alfred Tarski: life and logic[M]. Cambridge Univ Pr, 2004.
    [210]汪玲,方平,郭德俊.元认知的性质、结构与评定方法[J].心理学动态. 1999, 7(1).
    [211] Nelson T O. Consciousness and metacognition[J]. American Psychologist. 1996, 51(2): 102-116.
    [212] Reder L M. Implicit memory and metacognition[M]. Lawrence Erlbaum Associates, 1996.
    [213] Flavell J H. Cognitive monitoring[J]. Children's oral communication skills. 1981: 35-60.
    [214] Baker L, Brown A L. Metacognitive skills and reading[J]. Handbook of reading research. 1984, 1: 353-394.
    [215] Sternberg R J. Handbook of intelligence[M]. Cambridge Univ Press, 2000.
    [216] Brown A L. Metacognition, executive control, self-regulation, and other more mysterious mechanisms[J]. Metacognition, motivation, and understanding. 1987: 65-116.
    [217] Flavell J H. Metacognition and Cognitive Monitoring A New Area of Cognitive—Developmental Inquiry[J]. American Psychologist. 1979, 34(10): 906-911.
    [218]汪玲,郭德俊.元认知的本质与要素[J].心理学报. 2000, 32(4): 458-463.
    [219] Lee C C. Fuzzy logic in control systems: Fuzzy logic controller-Part I[J]. IEEE Transactions on systems, man, and cybernetics. 1990, 20(2): 404-418.
    [220] Lee C C. Fuzzy logic in control systems: Fuzzy logic controller-Part II[J]. IEEE transactions on Systems, Man and Cybernetics. 1990, 20(2): 419-435.
    [221] Mitsuo G, Runwei C.遗传算法与工程优化[Z].清华大学出版社, 2004.
    [222] Zadeh L A. Fuzzy sets[J]. Information and control. 1965, 8(3): 338-353.
    [223]张惠民.论模糊逻辑的哲学意义和实用价值[J]. 1993年逻辑研究专辑. 1993.
    [224]张惠民.论模糊概率逻辑[J]. 1995年逻辑研究专辑. 1995.
    [225]杨纶标,高英仪.模糊数学原理及应用[M].广州:华南理工大学出版社, 2001.
    [226] Oram A. Peer-to-peer: Harnessing the power of disruptive technologies[M]. CA,USA: O'Reilly & Associates, Inc. Sebastopol, , 2001.
    [227]康胜.企业集群演化的动力机制——基于向心力与离心力相互作用的分析[J].科技进步与对策. 2004, 21(12).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700