DocumentCode :
2876269
Title :
A Trust Evaluation Mechanism Based on Certified Trust and Fuzzy-Derived Reputation
Author :
Yang Zan ; Liu Xiao-ming ; Yang Lin ; Wang Jian-xin ; Ma Lin-ru
Author_Institution :
Inst. of Command Autom., PLAUST, Nanjing, China
fYear :
2012
fDate :
2-4 Nov. 2012
Firstpage :
934
Lastpage :
938
Abstract :
Introducing the trust evaluation into the access control for the service requester in a distributed network environment could be helpful for enhancing the precision and security of authorization decisions, special to the strange requesters. The existing researches of the trust evaluation could be divided into the objective means and the subjective means. The subjective evaluations could be used to dynamically measure the user´s trust degree according to the reputation based on its past actions. But it cannot work when the interaction experience with the user is absence. Compared with other subjective evaluation models using the probability theory, the fuzzy based model could exactly depict the unsure and fuzzy phenomena in process. But the existing fuzzy method based on the fuzzy synthetic evaluation needs to do complex calculations between trust vectors. And the chosen operators are not enough accurate. In this paper we promote a comprehensive trust evaluation framework was a fusion of objective and subjective means. An initial trust view for user is provided based on the certified trust and a reputation is derived by the fuzzy synthetic evaluation method based on user´s past actions. The proposed fuzzy method can avoid complex calculations between trust vectors, and adopts a more accurate operator to avert the information wastage.
Keywords :
authorisation; computer network security; fuzzy set theory; trusted computing; access control; authorization decision precision enhancement; authorization decision security enhancement; certified trust; distributed network environment; fuzzy synthetic evaluation method; fuzzy-derived reputation; information wastage; service requester; trust evaluation mechanism; trust vectors; users trust degree; Authorization; Computational modeling; Fuzzy set theory; Mathematical model; Vectors; certified trust; fuzzy synthetic evaluation; reputation; trust evaluation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on
Conference_Location :
Nanjing
Print_ISBN :
978-1-4673-3093-0
Type :
conf
DOI :
10.1109/MINES.2012.52
Filename :
6405839
Link To Document :
بازگشت