DocumentCode
518397
Title
Behavior value analysis and application in evaluating network entity behavior trust
Author
Liqin, Tian ; Chuang, Lin ; Yang, Ni
Author_Institution
Dept. of Comput., North China Inst. of Sci. & Technol., Beijing East, China
Volume
1
fYear
2010
fDate
16-18 April 2010
Abstract
At present, in areas such as wireless sensor networks, cloud computing, digital electronic resource services and other new Web applications, single static identity-based entity authentication can´t meet the dynamic security needs. In order to provide better security we must combine dynamic behaviour-based entity trust with static identity-based entity authentication. In entity behavior trust evaluation, behavior evidence is the fundamental basis of behavior evaluation. Because the entity´s behavior is random, uncertain, which causes behavior evidence was not complete and behavior value is not equal in each interaction, but as far as we know, It rarely consider this very important phenomenon in behavior trust evaluation. This paper analyzes incomplete behavior evidence obtained in entity interaction bring about a significant impact for trust evaluation and discusses the relationship between incomplete behavior evidence and behavior value, gives a kind of behavior trust evaluation strategy for different values interaction such as Less-Filling and Weight-Extension. Finally, we use two theorems and two properties to prove strategy´s effect and property in behavior trust evaluation. Paper lays the quantity foundation in enhancing value-trust reliability of entity behavior trust.
Keywords
Internet; authorisation; telecommunication security; wireless sensor networks; Web application; behavior evidence; behavior value analysis; cloud computing; digital electronic resource services; dynamic security; less-filling interaction; network entity behavior trust evaluation; single static identity-based entity authentication; value trust reliability; weight extension interaction; wireless sensor networks; Application software; Authentication; Cloud computing; Communication system security; Computer networks; Computer science; Delay effects; Law; Legal factors; Wireless sensor networks; Entity Behavior Evidence; Entity Behavior Trust; Entity Behavior Value;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Engineering and Technology (ICCET), 2010 2nd International Conference on
Conference_Location
Chengdu
Print_ISBN
978-1-4244-6347-3
Type
conf
DOI
10.1109/ICCET.2010.5486133
Filename
5486133
Link To Document