DocumentCode :
518397
Title :
Behavior value analysis and application in evaluating network entity behavior trust
Author :
Liqin, Tian ; Chuang, Lin ; Yang, Ni
Author_Institution :
Dept. of Comput., North China Inst. of Sci. & Technol., Beijing East, China
Volume :
1
fYear :
2010
fDate :
16-18 April 2010
Abstract :
At present, in areas such as wireless sensor networks, cloud computing, digital electronic resource services and other new Web applications, single static identity-based entity authentication can´t meet the dynamic security needs. In order to provide better security we must combine dynamic behaviour-based entity trust with static identity-based entity authentication. In entity behavior trust evaluation, behavior evidence is the fundamental basis of behavior evaluation. Because the entity´s behavior is random, uncertain, which causes behavior evidence was not complete and behavior value is not equal in each interaction, but as far as we know, It rarely consider this very important phenomenon in behavior trust evaluation. This paper analyzes incomplete behavior evidence obtained in entity interaction bring about a significant impact for trust evaluation and discusses the relationship between incomplete behavior evidence and behavior value, gives a kind of behavior trust evaluation strategy for different values interaction such as Less-Filling and Weight-Extension. Finally, we use two theorems and two properties to prove strategy´s effect and property in behavior trust evaluation. Paper lays the quantity foundation in enhancing value-trust reliability of entity behavior trust.
Keywords :
Internet; authorisation; telecommunication security; wireless sensor networks; Web application; behavior evidence; behavior value analysis; cloud computing; digital electronic resource services; dynamic security; less-filling interaction; network entity behavior trust evaluation; single static identity-based entity authentication; value trust reliability; weight extension interaction; wireless sensor networks; Application software; Authentication; Cloud computing; Communication system security; Computer networks; Computer science; Delay effects; Law; Legal factors; Wireless sensor networks; Entity Behavior Evidence; Entity Behavior Trust; Entity Behavior Value;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Engineering and Technology (ICCET), 2010 2nd International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-6347-3
Type :
conf
DOI :
10.1109/ICCET.2010.5486133
Filename :
5486133
Link To Document :
بازگشت