• DocumentCode
    498643
  • Title

    Trust Model of Users´ Behavior in Trustworthy Internet

  • Author

    Wen, Li ; Lingdi, Ping ; Kuijun, Lu ; Xiaoping, Chen

  • Author_Institution
    Collage of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China
  • Volume
    1
  • fYear
    2009
  • fDate
    10-11 July 2009
  • Firstpage
    403
  • Lastpage
    406
  • Abstract
    As traditional network security cannot meet the security requirements, the international research shows that network security is on the way to Trustworthy Internet and that the trustworthy issue becomes a hot topic in the future Internet. Trust evaluation of userspsila behavior is an important part of Trustworthy Internet and a rational trust model plays a key role in the evaluation. This paper concludes many principles of the trust model by analyzing existing trust models and proposes a novel trust model including both the direct and indirect trust. In our model, the direct trust is more trustworthy and is weighted more with the more and more interactions and the indirect evaluation becomes less and less important. The subjective factor is considered to make the direct trust obey the principle of ldquorise-lowly, decline-quicklyrdquo. Furthermore, recommenders´ credibility is taken into account in the indirect trust evaluation, which can avoid the denigration and make indirect trust more objective. We also consider the process of referral of the credibility to gain more information to evaluate the indirect trust effectively. Credibility evaluation is the basis of the filtering of low credibility and the improvement of trust evaluation. Finally, several experiments are shown to illustrate the properties of the model.
  • Keywords
    Internet; behavioural sciences computing; security of data; Internet; decline-quickly principle; recommender credibility; rise-lowly principle; security requirement; user behavior trust model; Attenuation; Computer science; Computer security; Electronic mail; IP networks; Information filtering; Information filters; Information security; Internet; Mobile ad hoc networks; credibility; network security; recommender; trust evaluation; trust model;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Engineering, 2009. ICIE '09. WASE International Conference on
  • Conference_Location
    Taiyuan, Shanxi
  • Print_ISBN
    978-0-7695-3679-8
  • Type

    conf

  • DOI
    10.1109/ICIE.2009.33
  • Filename
    5211236