메뉴 건너뛰기




Volumn 30, Issue 11, 2007, Pages 1930-1938

A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network

Author keywords

Behaviour trust; Game theoretic control; Prediction; Trustworthy network

Indexed keywords

AUTHENTICATION; BAYESIAN NETWORKS; COMPUTER NETWORKS; DECISION MAKING; GAME THEORY;

EID: 37348999613     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (51)

References (13)
  • 1
    • 24944461245 scopus 로고    scopus 로고
    • Trust management survey
    • Lecture Notes in Computer Science 3477. Berlin: Springer
    • Ruohomaa S, Kutvonen L. Trust management survey//Proceedings of the iTrust 2005. Lecture Notes in Computer Science 3477. Berlin: Springer, 2005. 77-92
    • (2005) Proceedings of the iTrust 2005 , pp. 77-92
    • Ruohomaa, S.1    Kutvonen, L.2
  • 2
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • Chinese source
    • Lin Chuang, Pen Xue-Hai. Research on trustworthy networks. Chinese Journal of Computers, 2005, 28(5): 751-758 (in Chinese)
    • (2005) Chinese Journal of Computers , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Pen, X.-H.2
  • 5
    • 37349038669 scopus 로고    scopus 로고
    • Towards an evaluation methodology for computational trust systems
    • Lecture Notes in Computer Science 3477. Berlin: Springer
    • Ciaran B, Karl K, Jean-Marc S, Vinny C. Towards an evaluation methodology for computational trust systems//Proceedings of the iTrust 2005. Lecture Notes in Computer Science 3477. Berlin: Springer, 2005, 289-304
    • (2005) Proceedings of the iTrust 2005 , pp. 289-304
    • Ciaran, B.1    Karl, K.2    Jean-Marc, S.3    Vinny, C.4
  • 6
    • 34250770685 scopus 로고    scopus 로고
    • Kind of quantitative evaluation of user behaviour trust using AHP
    • Tian Li-Qin, Lin Chuang, Ji Tie-Guo. Kind of quantitative evaluation of user behaviour trust using AHP. Journal of Computational Information Systems, 2007, 3(4): 1329-1334
    • (2007) Journal of Computational Information Systems , vol.3 , Issue.4 , pp. 1329-1334
    • Tian, L.-Q.1    Lin, C.2    Ji, T.-G.3
  • 7
    • 37349019862 scopus 로고    scopus 로고
    • A trust-based access control model for virtual organizations
    • Changsha, China
    • Lin Ai-Zhong, Vullings E, Dalziel J. A trust-based access control model for virtual organizations//Proceedings of the GCC Workshops. Changsha, China, 2006: 557-564
    • (2006) Proceedings of the GCC Workshops , pp. 557-564
    • Lin, A.-Z.1    Vullings, E.2    Dalziel, J.3
  • 8
    • 0037333770 scopus 로고    scopus 로고
    • The use of game theory to measure the vulnerability of stochastic networks
    • Bell M. The use of game theory to measure the vulnerability of stochastic networks. IEEE Transactions on Reliability, 2003, 52(1): 63-68
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.1 , pp. 63-68
    • Bell, M.1
  • 10
    • 36249018901 scopus 로고    scopus 로고
    • Trust-based user-role assignment in role-based access control
    • Amman, Jordan
    • Hassan T, Morteza A, Rasool J. Trust-based user-role assignment in role-based access control//Proceedings of the AICCSA. Amman, Jordan, 2007: 807-814
    • (2007) Proceedings of the AICCSA , pp. 807-814
    • Hassan, T.1    Morteza, A.2    Rasool, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.