• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Junfeng, Du Ruizhong, Liu Yuling. Trust Evaluation Model Based on Node Behavior Character[J]. Journal of Computer Research and Development, 2011, 48(6): 934-944.
Citation: Tian Junfeng, Du Ruizhong, Liu Yuling. Trust Evaluation Model Based on Node Behavior Character[J]. Journal of Computer Research and Development, 2011, 48(6): 934-944.

Trust Evaluation Model Based on Node Behavior Character

More Information
  • Published Date: June 14, 2011
  • Because of its openness, diversity and complexity, the network, trustiness faces the severe challenge. In order to guarantee the credibility of the whole system, it is very essential to establish a valid management model based on trusted relationship among nodes. At the same time, the new emerging computing model based on independent cooperation is considered, which, will influence the development trend of network node behavior. Based on the trustiness of network node behavior, this paper abstractly makes the network system as the manager monitor agent (MMA) with hierarchical structure based on trustworthy networks and agent technique. Based on all those above, the paper mainly studies the logical components, function and strategy in MMA model. Through analyzing various factors influencing the node behavior, the paper describes a new method and strategy which can monitor and measure the node behavior on the expectancy behavior character for trusted computing of the node. According to the manifestation of node behavior and historical information, the trust-value of node behavior is adjusted and predicted, and the trusted-interval is defined to realize the organization and management of the trusting relationship among nodes. The paper then establishesa dynamic trust evaluation model based on node behavior characters. Finally, the experimental results shows the effectiveness and feasibility of the model.
  • Related Articles

    [1]Feng Chenjiao, Song Peng, Wang Zhiqiang, Liang Jiye. A Method on Long Tail Recommendation Based on Three-Factor Probabilistic Graphical Model[J]. Journal of Computer Research and Development, 2021, 58(9): 1975-1986. DOI: 10.7544/issn1000-1239.2021.20200377
    [2]Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke. Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268. DOI: 10.7544/issn1000-1239.2018.20180447
    [3]He Xiao, Ma Zhiyi, Shao Weizhong, Hu Changjun. A Graphical Modeling Language for Model Transformations[J]. Journal of Computer Research and Development, 2015, 52(9): 2145-2162. DOI: 10.7544/issn1000-1239.2015.20148187
    [4]Yang Hailu, Zhang Jianpei, and Yang Jing. Community-Based Bidirectional Feedback System for Hybrid Worm Containment in Mobile Internet[J]. Journal of Computer Research and Development, 2014, 51(2): 311-324.
    [5]Zhang Shuifa, Ding Huan, and Zhang Wensheng. Background Modeling and Object Ddetection Based on Two-Model[J]. Journal of Computer Research and Development, 2011, 48(11): 1983-1990.
    [6]Feng Chaosheng, Qin Zhiguang, Laurence Cuthbert, Laurissa Tokarchuk. Reactive Worms Propagation Modeling and Analysis in Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2010, 47(3): 500-507.
    [7]Wang Yuewu, Jing Jiwu, Xiang Ji, and Liu Qi. Contagion Worm Propagation Simulation and Analysis[J]. Journal of Computer Research and Development, 2008, 45(2): 207-216.
    [8]Zhou Hanxun, Zhao Hong. Modeling and Analysis of Active-Benign Worms and Hybrid-Benign Worms[J]. Journal of Computer Research and Development, 2007, 44(6): 958-964.
    [9]Chang Qun, Wang Xiaolong, Lin Yimeng, Daniel S. Yeung, Chen Qingcai. Reducing Gaussian Kernel's Local Risks by Global Kernel and Two-Stage Model Selection Based on Genetic Algorithms[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Wang Bailing, Fang Binxing, Yun Xiaochun, Zhang Hongli, Chen Bo, Liu Yixuan. A New Friendly Worm Propagation Strategy Based on Diffusing Balance Tree[J]. Journal of Computer Research and Development, 2006, 43(9): 1593-1602.

Catalog

    Article views (720) PDF downloads (610) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return