• DocumentCode
    518397
  • Title

    Behavior value analysis and application in evaluating network entity behavior trust

  • Author

    Liqin, Tian ; Chuang, Lin ; Yang, Ni

  • Author_Institution
    Dept. of Comput., North China Inst. of Sci. & Technol., Beijing East, China
  • Volume
    1
  • fYear
    2010
  • fDate
    16-18 April 2010
  • Abstract
    At present, in areas such as wireless sensor networks, cloud computing, digital electronic resource services and other new Web applications, single static identity-based entity authentication can´t meet the dynamic security needs. In order to provide better security we must combine dynamic behaviour-based entity trust with static identity-based entity authentication. In entity behavior trust evaluation, behavior evidence is the fundamental basis of behavior evaluation. Because the entity´s behavior is random, uncertain, which causes behavior evidence was not complete and behavior value is not equal in each interaction, but as far as we know, It rarely consider this very important phenomenon in behavior trust evaluation. This paper analyzes incomplete behavior evidence obtained in entity interaction bring about a significant impact for trust evaluation and discusses the relationship between incomplete behavior evidence and behavior value, gives a kind of behavior trust evaluation strategy for different values interaction such as Less-Filling and Weight-Extension. Finally, we use two theorems and two properties to prove strategy´s effect and property in behavior trust evaluation. Paper lays the quantity foundation in enhancing value-trust reliability of entity behavior trust.
  • Keywords
    Internet; authorisation; telecommunication security; wireless sensor networks; Web application; behavior evidence; behavior value analysis; cloud computing; digital electronic resource services; dynamic security; less-filling interaction; network entity behavior trust evaluation; single static identity-based entity authentication; value trust reliability; weight extension interaction; wireless sensor networks; Application software; Authentication; Cloud computing; Communication system security; Computer networks; Computer science; Delay effects; Law; Legal factors; Wireless sensor networks; Entity Behavior Evidence; Entity Behavior Trust; Entity Behavior Value;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering and Technology (ICCET), 2010 2nd International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4244-6347-3
  • Type

    conf

  • DOI
    10.1109/ICCET.2010.5486133
  • Filename
    5486133