• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Junfeng and Tian Rui. A Fine-Grain Trust Model Based on Domain and Bayesian Network for P2P E-Commerce System[J]. Journal of Computer Research and Development, 2011, 48(6): 974-982.
Citation: Tian Junfeng and Tian Rui. A Fine-Grain Trust Model Based on Domain and Bayesian Network for P2P E-Commerce System[J]. Journal of Computer Research and Development, 2011, 48(6): 974-982.

A Fine-Grain Trust Model Based on Domain and Bayesian Network for P2P E-Commerce System

More Information
  • Published Date: June 14, 2011
  • Trust model has been widely applied to the field of P2P e-commerce, but the trust grain of the current trust model of P2P e-commerce is too rough to embody the peers real behavior very well. In order to solve the problem, a novel fine-grain trust model (FG-trust) is presented, which can complete the trust computation of one peer in different domains and different aspects. The model adopts the technology of multi-agent, uses the agent to manage and maintain the network and divides the network into multiple domains. Each domain sets a domain-agent to manage the peers in it and a manager-agent is set in the entire network to manage the messaging between inter-domains. In order to measure the trust value of one peer in any domain and take full account of the impact of different relationships between domains on recommendation trust, the concept of domain-model is introduced into FG-trust. The model uses Bayesian network to compute the peers trust value, which can predict the trust value of one peer in any aspects. And an updating method of Bayesian network model and domain-model is proposed, which can constrain the peers malicious behavior effectively. Finally, the effectiveness and feasibility of this model are illustrated by the experiments.
  • Related Articles

    [1]Pang Tao, Duan Zhenhua. Symbolic Model Checking of WISHBONE on-Chip Bus[J]. Journal of Computer Research and Development, 2014, 51(12): 2759-2771. DOI: 10.7544/issn1000-1239.2014.20131164
    [2]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [3]Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
    [4]Liu Li, Chen Mingyu, Bao Yungang, Xu Jianwei, Fan Jianping. A Stream Checking and Prefetching Algorithm Based on Page Level Stream Buffer Architecture[J]. Journal of Computer Research and Development, 2009, 46(10): 1758-1767.
    [5]Jiang Hua, Li Xiang. Model Checking for Mobile Ambients[J]. Journal of Computer Research and Development, 2009, 46(10): 1750-1757.
    [6]Gong Rui, Chen Wei, Liu Fang, Dai Kui, and Wang Zhiying. Control Flow Checking and Recovering by Compiler Signatures and Hardware Checking[J]. Journal of Computer Research and Development, 2009, 46(2): 345-351.
    [7]Zhang Junhua, Huang Zhiqiu, and Cao Zining. Counterexample Generation for Probabilistic Timed Automata Model Checking[J]. Journal of Computer Research and Development, 2008, 45(10): 1638-1645.
    [8]Zhao Mingfeng, Song Wen, Yang Yixian. Confusion Detection Based on Petri-Net[J]. Journal of Computer Research and Development, 2008, 45(10): 1631-1637.
    [9]Huang Weiping. Program Restructuring to Improve Efficiency of Software Model Checking[J]. Journal of Computer Research and Development, 2008, 45(8): 1417-1422.
    [10]He Jian, Qin Zheng. Modeling and Checking the Behavior of Software Architecture[J]. Journal of Computer Research and Development, 2005, 42(11): 2018-2024.

Catalog

    Article views (711) PDF downloads (671) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return