• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Shi Zhiguo, He Yeping, Zhang Hong. A Time Self-Decay Trust Management Algorithm for P2P Computing Security[J]. Journal of Computer Research and Development, 2007, 44(1): 1-10.
Citation: Shi Zhiguo, He Yeping, Zhang Hong. A Time Self-Decay Trust Management Algorithm for P2P Computing Security[J]. Journal of Computer Research and Development, 2007, 44(1): 1-10.

A Time Self-Decay Trust Management Algorithm for P2P Computing Security

More Information
  • Published Date: January 14, 2007
  • A novel quantitative network trust evaluation algorithm for peer-to-peer computing security system is proposed. The main features of the proposed model include time decay function and entity union function. First of all, the current representative algorithms of network trust evaluation are summerized and classified systematically. And the significant research fields of the related algorithms are categarized and the definition of trust related terminology is given. In this paper, an algorithm with trust time correct function, domain trust correct function and the definition of accuracy is constructed. Four features of the algorithm: time decay feature, history experience related feature, new entity award feature and union feature, are proved. At the same time, a natural trust decay curve is described and eight typical domain features are given. The experiments are also designed to evaluate the correctness and performances of the proposed algorithm, the results of the experiments are compared with Azzedin algorithm, and the results prove the sound performance and correctness of the algorithm. Finally, some related future research fields of the paper are pointed out.
  • Related Articles

    [1]Xu He, Wu Di, Lu Jiwu, Li Renfa. An Intrusion Detection Algorithm and Its Hardware Acceleration for CAN in Vehicles[J]. Journal of Computer Research and Development, 2023, 60(12): 2783-2796. DOI: 10.7544/issn1000-1239.202220035
    [2]Yin Shenglin, Zhang Xinglan, Zuo Liyu. Intrusion Detection System for Dual Route Deep Capsule Network[J]. Journal of Computer Research and Development, 2022, 59(2): 418-429. DOI: 10.7544/issn1000-1239.20200825
    [3]Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin. An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests[J]. Journal of Computer Research and Development, 2019, 56(3): 566-575. DOI: 10.7544/issn1000-1239.2019.20180063
    [4]Shi Shengfei, Zhang Wei, Li Jianzhong. A Complex Event Detection Algorithm Based on Correlation Analysis[J]. Journal of Computer Research and Development, 2014, 51(8): 1871-1879. DOI: 10.7544/issn1000-1239.2014.20120813
    [5]Wang Qi'an and Chen Bing. Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods[J]. Journal of Computer Research and Development, 2012, 49(5): 974-982.
    [6]Mao Guojun and Zong Dongjun. An Intrusion Detection Model Based on Mining Multi-Dimension Data Streams[J]. Journal of Computer Research and Development, 2009, 46(4): 602-609.
    [7]Li Qinghua and Zhao Feng. The PBL Method: A Novel Parallel Error Detection Method for Intrusion Tolerance Systems[J]. Journal of Computer Research and Development, 2006, 43(8): 1411-1416.
    [8]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    [9]Mu Chengpo, Huang Houkuan, and Tian Shengfeng. A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J]. Journal of Computer Research and Development, 2006, 43(1): 1-8.
    [10]Wang Jin, Li Dequan, and Feng Dengguo. An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System[J]. Journal of Computer Research and Development, 2005, 42(11): 1934-1939.

Catalog

    Article views (725) PDF downloads (773) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return