Research of trust assessment method in trust computing based on fuzzy theory
MO Jiaqing1,HU Zhongwang1,YE Xuelin2
1. School of Computer Science, Zhaoqing University, Zhaoqing Guangdong 526061, China
2. Education Technology and Computer Center, Zhaoqing University, Zhaoqing Guangdong 526061, China
MO Jiaqing HU Zhongwang YE Xuelin. Research of trust assessment method in trust computing based on fuzzy theory[J]. Journal of Computer Applications, 2013, 33(01): 142-145.
[1]TCG. TPM main specification version 1.2 [EB/OL]. [2012-06-20]. http://www.trustedcomputinggroup.org/.[2]BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open networks [C]// Proceedings of the 3rd European Symposium on Research in Computer Security. Berlin: Springer-Verlag, 1994: 3-18.[3]JΦSANG A, KNAPSKOG S J. A metric for trusted systems [C]// Proceedings of the 21st National Computer Security Conference. Wien: Austrian Computer Society, 1998: 541-549.[4]陈书义,闻英友,赵宏.基于模糊集合的可信计算信任模型评估[J].计算机科学,2008,35(11):39-41.[5]李焕洲,林宏刚,张健,等.可信计算中完整性度量模型研究[J].四川大学学报:工程科学版,2008,40(6):150-153.[6]付利华,王丹.可信计算信任模型的模糊评估方法研究[J].计算机工程与应用,2010,46(22):4-5.[7]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.[8]胡和平,刘海坤,李瑞轩.基于模糊理论的P2P网络主观信任模型——FSTM[J].小型微型计算机系统,2008,29(1):17-21.[9]李海军.基于相似度的加权模糊推理方法[D].保定:河北大学,2006.[10]龙毅宏,潘丹.基于模糊理论的间接推荐信任传递研究[J].武汉理工大学学报,2009,31(16):114-117.[11]王新洲,史文中,王树良.模糊空间信息处理[M].武汉:武汉大学出版社,2003:124.[12]王远,吕建,徐锋,等.一个适用于网构软件的信任度量及演化模型[J].软件学报,2006,17(4):682-690.