基于声望的信任管理关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
新型的互联网应用系统给人们带来了极大的便利,但同时,也带来了巨大的安全性挑战。因为网络应用系统中的各节点大部分互不相识,他们以匿名的方式进行交流和资源共享。网络中的用户在任何时间、任何地点都可以匿名地发布和共享消息、出售或者购买商品,完善的信任管理机制的缺失导致了在线网络应用系统中的用户之间可以相互欺骗,甚至进行恶意攻击。
     因此,对网络系统中用户之间的信任关系进行研究,建立和完善信任管理机制,降低交互用户的风险,提高系统的鲁棒性、安全性和可靠性,具有非常重要的理论价值和现实意义。
     近年来,国内外众多的学者,针对信任管理技术,特别是针对基于声望的信任管理技术展开了大量的研究工作,取得了丰硕的研究成果。但是,由于信任管理本身所特有的动态性、复杂性和多变性,导致信任管理研究中仍然存在以下问题有待解决:
     (1)现存的集中式信任管理系统缺乏信任激励机制
     集中式的信任管理架构下,已经实现的信任管理主流系统只是实现了评价次数的简单累积,没有解决信任的激励、惩罚以及时间衰减方面的问题,无法对抗恶意用户的共谋攻击和小额交易刷声望的攻击。
     (2)现存分布式信任管理系统未提供信任数据的完整性保护机制
     在信任数据的存储方面,当前已经实现的信任数据存储方案中,未提供信任数据在存储过程中的完整性保护机制,既无法确保信任数据不被非法用户更改,也无法确保信任数据不被存储方更改。而在信任数据的传输方面,为了实现信任数据传输过程中的完整性保护,当前的解决方案是基于PKI证书机制来实现的,无法解决证书的存储和管理开销大的问题。
     (3)分布式的信任管理系统中现存的信任激励机制不够完善
     分布式的信任管理架构下,在声望信任值的有效度量和推理演化方面,当前的信任模型比较好地解决了信任值的推理演化过程中信任的长期累积问题,但推荐节点的可靠性和可信度难以区分,信任模型难以精确反映信任值的动态性和主观不确定性。
     针对现存的信任管理系统中存在的问题,本文展开深入的研究工作,基于双向激励和信任衰减机制,建立集中式的信任管理模型,完善集中式架构下信任管理的激励机制;提出一个基于双线性映射的无证书签名方案,并将其引入到信任管理领域,建立分布式的信任数据安全存储方案,保护信任数据在存储和传输过程中的完整性;基于推荐可信度和信任激励机制,构建分布式的信任管理模型,完善分布式架构下信任管理的激励机制。本文的主要研究内容包括以下四个方面:
     (1)提出基于双向激励和信任衰减的集中式信任管理模型
     针对现存的集中式信任管理系统中信任激励机制不够完善的问题,本文设计双向激励机制和信任衰减机制,并将其应用于集中式的信任管理模型中,提出基于双向激励和信任衰减的集中式信任管理模型,实现高效的信任管理,完善集中式架构下信任管理的激励机制。
     (2)提出基于无证书签名的分布式信任数据安全存储方案
     针对现存的分布式信任数据存储方案中未提供有效的完整性保护机制的问题,本文设计一个基于双线性映射的无证书签名方案,并将其应用于信任数据存储方案中,提出基于无证书签名的分布式信任数据安全存储方案,保护信任数据在存储和传输过程中的完整性,提高信任管理系统的安全性。
     (3)提出基于推荐可信度和信任激励的分布式信任管理模型
     针对现存的分布式信任管理系统中节点的推荐可信度与可靠性难以区分、信任激励机制不够完善等问题,本文设计了推荐可信度机制和信任激励机制,并将其应用于分布式的信任管理模型中,提出基于推荐可信度和信任激励的分布式信任管理模型,有效地区分节点的推荐可信度与可靠性,并且对不活跃的节点在全局迭代过程中的信任值进行衰减惩罚,完善信任管理的激励机制,提高了分布式环境下信任管理的效率。
     (4)实现了一个信任管理的原型系统
     基于前面的研究内容,本文设计并实现了一个信任管理的原型系统,并给出了其在分布式环境下的一个应用举例。
The new network application systems bring us great convenience and at the same timethe huge challenges. In these network application systems, the user nodes are all strangers toeach other, and they communicate and share file resources anonymously. Users in the networkcan anonymously publish and share information, sell or buy goods at any time and any place.The lack of reasonable trust management mechanism causes cheats on each other or evenmalicious attacks in the network application system.
     For these reasons, it is very important in theory and in practice to study on theestablishment of rational trust relationship between users in the open network. It could helpsystem users to reduce their iteration risk when making decisions, and help to promote therobustness, security and reliability of the online network application systems.
     In recent years, more and more research institutions and individuals have carried out theresearch on the reputation-based trust management technology, and they have achieved lots ofvaluable experiences. However, due to inherent characteristics of dynamic, complexity andvariability of trust values, trust management still has several problems need to be solved asfollows:
     (1) The current centralized trust management system is incomplete in incentivemechanism.
     Under the centralized architecture, in the aspect of measure and evolution reasoning ofreputation trust values, the current solutions implement the trust accumulation by simplesummation of the evaluation times. They do not solve such problems as the trust incentive,trust penalty, and trust decline by time. So they can not resist the collusion attack and theattack of obtaining high trust value by multiple small transactions.
     (2) The existing distributed trust management systems did not provide the trustintegrity protection mechanism.
     In the aspect of trust data storage and transmission, the current trust data storage schemesdid not considering the integrity protection of trust data in storage process. Furthermore, thepresent solution of the security protection of trust data in transmission process is realized onPKI certificates, which can not solve the problem of high overhead in certificates storage andcertificates management.
     (3) The incentive mechanism of current decentralized trust management systems isincomplete.
     Under the decentralized architecture, in the aspect of measure and evolution reasoning ofreputation trust values, current trust management models implemented the long accumulationprocess of trust values, but they could not distinguish the reliability and credibility ofrecommendation nodes. And so, they could not reflect the dynamic character and thesubjective uncertainty of trust values.
     In this paper, researches on the existing key problems were carried out, and acertificateless based signature scheme was proposed and was introduced into the trustmanagement field to implement the decentralized secure trust data storage. At the same time,based on the bidirectional-incentive and trust-decline mechanism, a centralized trustmanagement model was proposed, and based on recommendation-credibility andtrust-incentive mechanism, a decentralized trust management model was proposed. The mainresearch contents in this paper were summarized in the following four aspects:
     (1) This paper proposed a bidirectional-incentive and trust-decline basedcentralized trust management model.
     To solve the problem of trust incentive mechanisms in current centralized trustmanagement systems, a bidirectional-incentive and trust-decline based trust managementmodel was proposed to implement the efficient trust management in centralized architecture,to complete the trust incentive mechanism in small scale network application systems.
     (2) This paper proposed a decentralized trust data secure storage scheme based onthe certificateless signature technology.
     To solve the problem of lack of integrity protection in trust data storage scheme, abilinear mapping based certificateless signature scheme was proposed and applied into trustdata storage scheme to implement the integrity protection of trust data in storage andtransmission process, and further to promote the system security of trust management.
     (3) This paper proposed a recommendation-credibility and trust-incentive baseddecentralize trust management model.
     To solve the problem of the distinguishability between the recommendation-credibilityand the reliability of recommendation nodes and the problem of the incompleteness of theincentive mechanism in current decentralized trust models, this paper designed therecommendation credibility scheme and the trust decline scheme, and applied them intodecentralized trust management system, to distinguish the recommendation credibility and thereliability of recommendation nodes, and to give the inactive nodes decline punishment, andfurther to improve the efficiency of trust management in large scale network applicationsystems.
     (4) This paper realized a trust management system based on the trust managementtechnologies discussed above.
     Based on previous research contents, a prototype system of trust management wasdesigned and implemented in this paper. An application example in the decentralizedenvironment was also given at last.
引文
[1]中国互联网信息中心,中国互联网络发展状况统计报告[EB/OL].http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201403/t20140305_46240.htm,2014-01-16
    [2] Blaze M., Feigenbaum J.. Decentralized trust management[C]. In: Proceedings of the17thSymposium on Security and Privacy, IEEE Computer Society Press,1996:164-173.
    [3] Chu Y. H., Feigenbaum J., LaMacchia B., et al.. REFEREE:Trust Management for WebApplications[J]. World Wide Web Journal,1997:2(2):127-139.
    [4] Abdul-Rahman A, Hailes S. A distributed trust model[C]. Proceedings of the1997workshop on New security paradigms. ACM,1998:48-60.
    [5] Blaze M., Feigenbaum J.,Keromytis D. A.. KeyNote:Trust Management for Public-KeyInfrastructures[C]. In:1998Security Protocols International Workshorp, Springer-Verglag,1999:59-63.
    [6] Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system[C].Proceedings of the tenth international conference on Information and knowledgemanagement. ACM,2001:310-317.
    [7] Stoica I., Morris R., Karger D., et al.. Chord: A Scalable Peer-to-peer Lookup Service forInternet Applications[C]. ACM SIGCOMM Computer Communication Review, In:Proceedings of the2001SIGCOMM conference,31(4), October2001:149-160.
    [8] Cornelli F., Damiani E., Dedi-Vimercati S. C., et al.. Choosing reputable servents in a P2Pnetwork[C], World Wide Web2002, Honolulu, Hawaii, USA: ACM Press,2002:376-386.
    [9] Yu B, Singh M P. A social mechanism of reputation management in electroniccommunities[M]. Cooperative Information Agents IV-The Future of Information Agentsin Cyberspace. Springer Berlin Heidelberg,2000:154-165.
    [10] Yu B, Singh M P. An evidential model of distributed reputation management[C].Proceedings of the first international joint conference on Autonomous agents andmultiagent systems: part1. ACM,2002:294-301.
    [11] Yu B, Singh M P. Distributed reputation management for electronic commerce[J].Computational Intelligence,2002,18(4):535-549.
    [12] Yu B, Singh M P. Detecting deception in reputation management[C]. Proceedings of thesecond international joint conference on Autonomous agents and multiagent systems.ACM,2003:73-80.
    [13] Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation[C].System Sciences,2002. HICSS. Proceedings of the35th Annual Hawaii InternationalConference on. IEEE,2002:2431-2439.
    [14] Sen S, Sajja N. Robustness of reputation-based trust: Boolean case[C]. Proceedings ofthe first international joint conference on Autonomous agents and multiagent systems:part1. ACM,2002:288-293.
    [15] Kinateder M, Rothermel K. Architecture and algorithms for a distributed reputationsystem[M]. Trust Management. Springer Berlin Heidelberg,2003:1-16.
    [16] Lai K., Feldman M. Stoica I.. Incentives for cooperation in peer-to-peer networks. In:Proceedings of the2nd Workshop on Economics of Peer-to-Peer Systems.Berkeley,USA,2003:1-6.
    [17] Marti S., Garcia-Molina H.. Identity Crisis: Anonymity vs. Reputation in P2P systems. In:Proceedin gs of the3rd International Conference on Peer-to-Peer Computing. Linkêping,Sweden,2003:134-141.
    [18] Feldman M., Papadimitriou C., Chuang J., et al.. Free-riding and whitewashing inpeer-to-peer systems[J]. IEEE Journal on Selected Areas in Communications,2006,24(5):1010-1019.
    [19] Feldman M., Papadimitriou C., Chuang J., et al.. Free-riding and whitewashing inPeer-to-Peer systems. In: Proceedings of the ACM SIGCOM M2004Workshops.Portland,USA,2004:228-235.
    [20] Feldman M., Lai K., Stoica I., et al.. Robust incentive techniques for peer-to-peernetworks[M]. Electronic Commerce, NewYork, USA: ACM Press,2004:102-111.
    [21] Singh A., Liu L.. TrustMe:Anonymous management of trust relationships indecentralized P2P systems[C]. In: Proceedings of Third International Conference onPeer-to-Peer Computing, NewYork, USA:ACM Press,2003:142-149.
    [22] Kamvar S. D., Schlosser M. T., Molina H. G.. The EigenTrust Algorithm for ReputationManagement in P2P Networks[C]. In: Proceedings of the12th Int’l World Wide WebConf.(WWW2003).2003:640-651.
    [23] Carbo J, Molina J M, Davila J. Trust management through fuzzy reputation[J].International Journal of Cooperative Information Systems,2003,12(01):135-155.
    [24] Xiong L, Liu L. A reputation-based trust model for peer-to-peer e-commercecommunities[C]. E-Commerce,2003. CEC2003. IEEE International Conference on.IEEE,2003:275-284.
    [25] Dimitrakos T. A service-oriented trust management framework[M]. Trust, Reputation,and Security: Theories and Practice. Springer Berlin Heidelberg,2003:53-72.
    [26] Stakhanova N, Ferrero S, Wong J S, et al. A Reputation-based Trust Management inPeer-to-Peer Network Systems[J]. ISCA PDCS,2004,4:510-515.
    [27] Song W, Phoha V V. Neural network-based reputation model in a distributed system[C].e-Commerce Technology,2004. CEC2004. Proceedings. IEEE International Conferenceon. IEEE,2004:321-324.
    [28] Golbeck J, Hendler J. Accuracy of metrics for inferring trust and reputation in semanticweb-based social networks[M]. Engineering knowledge in the age of the semantic web.Springer Berlin Heidelberg,2004:116-131.
    [29] Zhang Q, Yu T, Irwin K. A Classification Scheme for Trust Functions inReputation-Based Trust Management[C]. ISWC Workshop on Trust, Security, andReputation on the Semantic Web.2004.
    [30] Liu J, Issarny V. Enhanced reputation mechanism for mobile ad hoc networks[M]. Trustmanagement. Springer Berlin Heidelberg,2004:48-62.
    [31] Selcuk A A, Uzun E, Pariente M R. A reputation-based trust management system for P2Pnetworks[C]. Cluster Computing and the Grid,2004. CCGrid2004. IEEE InternationalSymposium on. IEEE,2004:251-258.
    [32] Srivatsa M, Xiong L, Liu L. TrustGuard: countering vulnerabilities in reputationmanagement for decentralized overlay networks[C]. Proceedings of the14thinternational conference on World Wide Web. ACM,2005:422-431.
    [33] Sun Y L, Han Z, Liu K J R. Defense of trust management vulnerabilities in distributednetworks[J]. Communications Magazine, IEEE,2008,46(2):112-119.
    [34] J sang A, Golbeck J. Challenges for robust trust and reputation systems[C]. Proceedingsof the5th International Workshop on Security and Trust Management (SMT2009), SaintMalo, France.2009.
    [35] Lin K J, Lu H, Yu T, et al. A reputation and trust management broker framework for webapplications[C]. e-Technology, e-Commerce and e-Service,2005. EEE'05. Proceedings.The2005IEEE International Conference on. IEEE,2005:262-269.
    [36] Shmatikov V, Talcott C. Reputation-based trust management[J]. Journal of ComputerSecurity,2005,13(1):167-190.
    [37] Song S, Hwang K, Zhou R, et al. Trusted P2P transactions with fuzzy reputationaggregation[J]. Internet Computing, IEEE,2005,9(6):24-34.
    [38] Xia H, Jia Z, Li X, et al. Trust prediction and trust-based source routing in mobile ad hocnetworks[J]. Ad Hoc Networks,2013,11(7):2096-2114.
    [39] Liang Z, Shi W. PET: A personalized trust model with reputation and risk evaluation forP2P resource sharing[C]. System Sciences,2005. HICSS'05. Proceedings of the38thAnnual Hawaii International Conference on. IEEE,2005:201b-201b.
    [40] Aringhieri R, Damiani E, Vimercati D, et al. Fuzzy techniques for trust and reputationmanagement in anonymous peer‐to‐peer systems[J]. Journal of the American Societyfor Information Science and Technology,2006,57(4):528-537.
    [41] Tayabovorn C., Maneewongvatana S.. A reputation-based system model for P2Pnetworks[C]. In: ACST2007, Phuket,Thailand:Acta Press,2007:188-193.
    [42] Li H, Singhal M. Trust management in distributed systems[J]. IEEE Computer,2007,40(2):45-53.
    [43] Silaghi G C, Arenas A E, Silva L M. Reputation-based trust management systems andtheir applicability to grids[J]. Institutes on Knowledge and Data Management andSystem Architecture, CoreGRID-Network of Excellence, Tech. Rep. TR-0064,2007.
    [44] Bonatti P, Duma C, Olmedilla D, et al. An integration of reputation-based andpolicy-based trust management[J]. networks,2007,2(14):10.
    [45] Boukerche A, Li X. An agent-based trust and reputation management scheme forwireless sensor networks[C]. Global Telecommunications Conference,2005.GLOBECOM'05. IEEE. IEEE,2005,3-5.
    [46]荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730.
    [47] Aivaloglou E., Gritzalis S.. Hybrid trust and reputation management for sensornetworks[J]. Wireless Network,2010,16:1493-1510.
    [48] Lopez J., Roman R., Agudo I., et al.. Trust management systems for wireless sensornetworks: Best practices [J].Computer Communications,2010,33:1086-1093.
    [49] Yu Y, Li K, Zhou W, et al. Trust mechanisms in wireless sensor networks: Attackanalysis and countermeasures[J]. Journal of Network and Computer Applications,2012,35(3):867-880.
    [50] Chu X, Chen X, Zhao K, et al. Reputation and trust management in heterogeneouspeer-to-peer networks[J]. Telecommunication Systems,2010,44(3-4):191-203.
    [51] Omar M., Challal Y., Bouabdallah A.. Certification-based trust models in mobile ad hocnetworks: A survey and taxonomy[J]. Journal of Network and ComputerApplications,2012,35:268-286.
    [52] Li M, Sun X, Wang H, et al. Privacy-aware access control with trust management in webservice[J]. World Wide Web,2011,14(4):407-430.
    [53] Denko M K, Sun T, Woungang I. Trust management in ubiquitous computing: ABayesian approach[J]. Computer Communications,2011,34(3):398-406.
    [54] Almenárez F, Marín A, Díaz D, et al. Trust management for multimedia P2P applicationsin autonomic networking[J]. Ad Hoc Networks,2011,9(4):687-697.
    [55] Cho J H, Swami A, Chen I R. Modeling and analysis of trust management with trustchain optimization in mobile ad hoc networks[J]. Journal of Network and ComputerApplications,2012,35(3):1001-1012.
    [56] Cho J H, Swami A, Chen R. A survey on trust management for mobile ad hocnetworks[J]. Communications Surveys&Tutorials, IEEE,2011,13(4):562-583.
    [57] Kim Y, Phalak R. A trust prediction framework in rating-based experience sharing socialnetworks without a web of trust[J]. Information Sciences,2012,191:128-145.
    [58] Gómez Mármol F, Martínez Pérez G. TRIP, a trust and reputation infrastructure-basedproposal for vehicular ad hoc networks[J]. Journal of Network and ComputerApplications,2012,35(3):934-941.
    [59] Wu X. A distributed trust management model for mobile P2P networks[J]. Peer-to-PeerNetworking and Applications,2012,5(2):193-204.
    [60]徐锋,吕建. Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064.
    [61]蒋兴浩.基于PKI机制的对等网信任管理问题研究[D].杭州:浙江大学,2002.
    [62]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
    [63]唐文,胡建斌,陈钟.基于模糊集合理论的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
    [64]窦文,王怀民,贾焰等.构造基于推荐的peer-to-peer环境下的Trust模型[J].软件学报,2004,15(4):571-583.
    [65]黄辰林.动态信任关系建模和管理技术研究[D].长沙:国防科学技术大学学,2005.
    [66]张书钦.对等网络中信任管理研究[D].哈尔滨:哈尔滨工程大学,2005.
    [67]王鲁滨,张巍.电子商务信任管理研究[J].中央财经大学学报,2006,1:73-76.
    [68]汤大权,贺明科,孟庆崧.基于幂律分布和小世界特性的无结构P2P网络中搜索方法研究[J].计算机研究与发展,2007,44(9):1566-1571.
    [69]田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938.
    [70]陈菲菲,桂小林.基于机器学习的动态信誉评估模型研究[J].计算机研究与发展,2007,44(02):223-229.
    [71]李景涛,荆一楠,肖晓春,等.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167.
    [72]姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报,2007,18(10):2551-2563.
    [73]石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10.
    [74]李建欣,怀进鹏,李先贤,林莉. DTM:一种面向网络计算的动态信任管理模型[J].计算机学报,2009,32(3):493-505.
    [75]李佳伦,谷利泽,杨义先.一种具有时间衰减和主观预期的P2P网络信任管理模型[J].电子与信息学报,2009,31(11):2786-2790.
    [76]王小峰.信任管理的策略表示与量化模型研究[D].长沙:国防科学技术大学,2009.
    [77]贾兆庆,薛广涛,唐新怀,等.非结构化P2P中的一种信任机制[J].计算机研究与发展,2010,47(4):645-652.
    [78]贾兆庆.非结构化P2P中搜索算法及信任机制研究[D].上海:上海交通大学,2008.
    [79]李勇军,代亚非.对等网络信任机制研究[J].计算机学报,2010,33(3):390-405.
    [80]张光华,张玉清.一种基于群组的P2P完备信任模型[J].华中科技大学学报(自然科学版),2010,38(8):61-64.
    [81]胡建理,周斌,吴泉源.一种P2P信任管理安全性协议[J].计算机科学,2011,38(10):64-67,90.
    [82]胡建理,周斌,吴泉源,等. P2P网络环境下基于信誉的分布式抗攻击信任管理模型[J].计算机研究与发展,2011,48(12):2235-2241.
    [83]冯景瑜.开放式P2P网络环境下的信任管理技术研究[D].西安:西安电子科技大学,2011.
    [84]李道全.电子商务信任管理模型与方法研究[D].青岛:山东科技大学,2011.
    [85]杜瑞忠.分布式环境下动态信任管理和评估模型研究[D].武汉:武汉大学,2012.
    [86] Blaze M., Kannan S., Lee I., et al. Dynamic Trust Management[J]. Computer,2009,42(2):44-52.
    [87] Ma J., Orgun M. A.. Trust Managementand Trust Theory Revision[J]. IEEE Transactionson Systems, Man and Cybernetics Part A: systems and humans,2006,36(3):451-460.
    [88] J sang A., Ismail R., Boyd C.. A survey of trust and reputation systems for online serviceprovision[J]. Decision support systems,2007,43(2):618-644.
    [89]官尚元,伍卫国,董小社,梅一多.开放分布式环境中信任管理综述[J].计算机科学,2010,37(3):22-28,35.
    [90]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521.
    [91] Almenárez F., Marín A., Campo C., et al.. PTM: A pervasive trust management modelfor dynamic open environments[C], First Workshop on Pervasive Security, Privacy andTrust PSPT,2004,4:1-8.
    [92] Blaze M., Keromytis A. D.. The KeyNote trust-management system version2[S].Internet RFC2704.1999.
    [93]袁时金.信任管理关键技术研究[D].上海:复旦大学,2005.
    [94]耿秀华.基于证书的信任管理研究[D].北京:北京交通大学,2009.
    [95]崔军.信任管理的信任量化表示与凭据公平交换研究[D].北京:北京邮电大学,2012.
    [96] Almenarez F., Marin A., Díaz D., et al.. Developing a model for trust management inpervasive devices[C].Pervasive Computing and Communications Workshops,2006.PerCom Workshops2006. Fourth Annual IEEE International Conference on. IEEE,2006:267-271.
    [97] Aberer K.. P-Grid: A Self-organ izing Access Structur e for P2P Information Sy stems
    [C]. In: Proceedings of the9th International Conference on Cooperative Information Systems.2001:179-194.
    [98] Kamvar S. D., Schlosser M. T.. EigenRep:Reputation Management in P2P Networks[C].In: Proceedings of the12th Int’l World Wide Web Conf.(WWW2003).2003:123-134.
    [99] Zhou R., Hwang K.. Powertrust: A robust and scalable reputation system for trustedpeer-to-peer computing[J]. Parallel and Distributed Systems, IEEE Transactions on,2007,18(4):460-473.
    [100] Xiong L., Liu L.. Peertrust: Supporting reputation-based trust for peer-to-peer electroniccommunities[J]. Knowledge and Data Engineering, IEEE Transactions on,2004,16(7):843-857.
    [101] Zhang Y., Fang Y.. A fine-grained reputation system for reliable service selection inpeer-to-peer networks[J]. Parallel and Distributed Systems, IEEE Transactions on,2007,18(8):1134-1145.
    [102] Pirzada A. A., McDonald C., Datta A.. Performance comparison of trust-based reactiverouting protocols[J]. Mobile Computing, IEEE Transactions on,2006,5(6):695-710.
    [103] Wu Z., Weaver A. C.. Application of fuzzy logic in federated trust management forpervasive computing[C]. Computer Software and Applications Conference,2006.COMPSAC'06.30th Annual International. IEEE,2006,2:215-222.
    [104]唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
    [105] Song S., Hwang K., Zhou R., et al.. Trusted P2P transactions with fuzzy reputationaggregation[J]. Internet Computing, IEEE,2005,9(6):24-34.
    [106] Levien R., McCarthy L., Blaze M.. Transparent Internet e-mail security[C]. InternetSociety Symposium on Network and Distributed System Security.1996.
    [107] Blaze M, Ioannidis J, Keromytis A D. Trust management for IPsec[J]. ACMTransactions on Information and System Security,2002,5(2):95-118.
    [108] Blaze M., Ioannidis J., Keromytis A. D.. Offline micropayments without trustedhardware[C]. Financial Cryptography. Springer Berlin Heidelberg,2002:21-40.
    [109] Zacharia G, Maes P. Trust management through reputation mechanisms[J]. AppliedArtificial Intelligence,2000,14(9):881-907.
    [110] Vu L H, Hauswirth M, Aberer K. QoS-based service selection and ranking with trustand reputation management[M]. On the Move to Meaningful Internet Systems2005:CoopIS, DOA, and ODBASE. Springer Berlin Heidelberg,2005:466-483.
    [111] Richardson M, Agrawal R, Domingos P. Trust management for the semantic web[M].The Semantic Web-ISWC2003. Springer Berlin Heidelberg,2003:351-368.
    [112] Silaghi G C, Arenas A E, Silva L M. Reputation-based trust management systems andtheir applicability to grids[J]. Institutes on Knowledge and Data Management andSystem Architecture, CoreGRID-Network of Excellence, Tech. Rep. TR-0064,2007.
    [113] Hwang K, Kulkareni S, Hu Y. Cloud security with virtualized defense andreputation-based trust mangement[C]. Dependable, Autonomic and Secure Computing,2009. DASC'09. Eighth IEEE International Conference on. IEEE,2009:717-722.
    [114] Venkatraman M, Yu B, Singh M P. Trust and reputation management in a small-worldnetwork[C]. MultiAgent Systems,2000. Proceedings. Fourth International Conferenceon. IEEE,2000:449-450.
    [115] Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems[C].Electrical and Computer Engineering,2002. IEEE CCECE2002. Canadian
    [116] Azzedin F, Maheswaran M. Towards trust-aware resource management in gridcomputing systems[C]. Cluster Computing and the Grid,2002.2nd IEEE/ACMInternational Symposium on. IEEE,2002:452-452.
    [117] Wang Y, Lin K J. Reputation-oriented trustworthy computing in e-commerceenvironments[J]. Internet Computing, IEEE,2008,12(4):55-59.
    [118]张磊,张福泰.一类无证书签名方案的构造方法[J].计算机学报,2009,32(5):940-945.
    [119]杜红珍.数字签名技术的若干问题研究[D].北京:北京邮电大学,2009.
    [120] Hu B. C., Wong D. S., Zhang Z., et al.. Key replacement attack against a genericconstruction of certificateless signature[C]. Information Security and Privacy. SpringerBerlin Heidelberg,2006:235-246.
    [121] Wang Y., Lin K. J., Wong D. S., et al.. Trust management towards service-orientedapplications[J]. Service Oriented Computing and Applications,2009,3(2):129-146.
    [122] Hu B C, Wong D S, Zhang Z, et al. Key replacement attack against a genericconstruction of certificateless signature[C]. Information Security and Privacy. SpringerBerlin Heidelberg,2006:235-246.
    [123] Zhang Z, Wong D, Xu J, Feng D. Certificateless public-key signature: security modeland efficient construction. In: Proceedings of the ACNS2006. Singapore,2006:293-308.
    [124] Huang X, Mu Y, Susilo W, Wong D, Wu W. Certificateless signature revisited. In:Proceedings of the ACISP2007.Townsville, Australia,2007:308-322.
    [125] Zhang L, Zhang F, Zhang F. New efficient certificateless signature scheme[M].Emerging Directions in Embedded and Ubiquitous Computing. Springer BerlinHeidelberg,2007:692-703.
    [126] Shi WM, Yang HF, Wu YS, Sun X. Numerical Analysis.2nd ed., Beijing: BeijingInstitute of Technology Press,2004.91-93.
    [127] Jesi G P. PeerSim HOWTO: Build a new protocol for the PeerSim1.0simulator
    [EB/OL].2006-11-10. http:. sourceforge. net/projects/PeerSim,2005.
    [128] T, Kaashoek F, Li J, et al. p2psim, a simulator for peer-to-peer protocols[EB/OL].2010-12-21. http://pdos.csail.mit.edu/p2psim/.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700