Please wait a minute...
New Technology of Library and Information Service  2008, Vol. 24 Issue (2): 41-47    DOI: 10.11925/infotech.1003-3513.2008.02.08
Current Issue | Archive | Adv Search |
Research on Trust Model and Its Improvement
XU XinChong Yuan2
1(Department of Informatics, East China Normal University, Shanghai  200241,China)
2(Department of Information Management,Nanjing University,Nanjing  210093,China)  
Download: PDF(446 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

Based on analying the existing trust models, this paper presents an improved trust model which imports the affair factor and articulates trust by experience and a series of functions. The new model can provide foundation for cooperation and security decision-making. Then the interval of trust value is widened and the methods of the entities cognizance are added. These make trust value continued. All these special opinions make trust management more effective.

Key wordsTrust Model      Trust transitivity      Recommending trust      Trust value     
Received: 02 November 2007      Published: 25 February 2008
: 

TP302

 
Corresponding Authors: Xu Xin     E-mail: xxu@infor.ecnu.edu.cn;xuxin@nju.edu.cn
About author:: Xu Xin,Chong Yuan

Cite this article:

Xu Xin,Chong Yuan. Research on Trust Model and Its Improvement. New Technology of Library and Information Service, 2008, 24(2): 41-47.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2008.02.08     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2008/V24/I2/41

[1] Diego Gambetta.Can We Trust Trust[M]. Trust:Making and breaking cooperative relations, Basil Blackwell,Oxford,1990:217-23.
[2] 王远,吕建,徐锋,等. 一个适用于网构软件的信任度量及演化模型[J]. 软件学报,2006,17(4):682-690.
[3] Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[C]. In:Proceedings of the 17th Symposium on Security and Privacy,1996:164-137.
[4] Blaze M, Feigenbaum J, Ioannidis J.The KeyNote Trust-Management System Version 2[EB/OL].http://haodf.net/internet/network/protocd/200509/157578.html.
[5] 彭杰,郭山清,茅兵,等. 基于XML的安全管理平台中信任管理机制的研究和实现[J]. 计算机科学,2005,32(5):51-53,58.
[6] 徐锋,吕建. Web 安全中的信任管理研究与进展[J]. 软件学报, 2002,13(11):2057-2064.
[7] 徐志大,南相浩. Internet X.509 PKI安全通信协议设计与证明[J]. 计算机工程与应用, 2003,39(1):161-164.
[8] Zimmermann P.Pretty Good Privacy User’s Guide[CP/OL]. Distributed with PGP software, 1999.
[9] 陈良臣. 基于OpenPGP的安全邮件系统的研究与设计[J]. 计算机应用研究, 2007,24(3):157-159,168.
[10] 冯真,张红旗. PGP信任模型的改进[J]. 计算机技术与发展, 2006,16(9):210-212.

[1] Li Hui, Xiang Huating, Tang Qiang. A Trust Model for Wikipedia Based on Structure Information and Edit History[J]. 现代图书情报技术, 2015, 31(3): 33-38.
[2] Xu Xin,Zhai Xiaojuan. Research on Calculation of Trust Degree and Design of Trust Transfer Protocol[J]. 现代图书情报技术, 2008, 24(3): 32-39.
[3] Li Hui,Liu Dongsu. An Efficient Approach for Evaluating Trust in E-Commerce[J]. 现代图书情报技术, 2008, 24(10): 38-42.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn