Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 789820, 9 pages
http://dx.doi.org/10.1155/2015/789820
Research Article

Modeling Dynamic Trust and Risk Evaluation Based on High-Order Moments

Yan Gao,1,2 Zhiyong Dai,1,2 and Wenfen Liu1,2

1Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China
2State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China

Received 16 April 2014; Revised 5 August 2014; Accepted 14 August 2014

Academic Editor: Alessandro Palmeri

Copyright © 2015 Yan Gao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Chang, Y. Ouzrout, A. Nongaillard, A. Bouras, and Z. Jiliu, “The reputation evaluation based on optimized Hidden Markov model in E-commerce,” Mathematical Problems in Engineering, vol. 2013, Article ID 391720, 11 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Falcone and J. Kim, “Soft security: isolating unreliable agents from society,” in Proceedings of the International Workshop on Trust, Reputation and Security: Theories and Practice (AAMAS '02), R. Falcone, S. Barber, L. Korba, and M. Singh, Eds., Lecture Notes in Computer Science, pp. 224–233, Springer, 2003.
  3. L. Liu and W. Shi, “Trust and reputation management,” IEEE Internet Computing, vol. 14, no. 5, pp. 10–13, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. F. Mármol and G. Pérez, “Trust and reputation models comparison,” Internet Research, vol. 21, no. 2, pp. 138–153, 2011. View at Google Scholar
  5. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The EigenTrust algorithm for reputation management in P2P networks,” in Proceedings of the 12th International Conference on World Wide Web (WWW '03), pp. 640–651, May 2003. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Xiong and L. Liu, “PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843–857, 2004. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Zhou and K. Hwang, “PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 4, pp. 460–473, 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Zhou, K. Hwang, and M. Cai, “GossipTrust for fast reputation aggregation in peer-to-peer networks,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 9, pp. 1282–1295, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. X. Li, F. Zhou, and X. Yang, “Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1944–1957, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. X. Li, F. Zhou, and X. Yang, “A multi-dimensional trust evaluation model for large-scale P2P computing,” Journal of Parallel and Distributed Computing, vol. 71, no. 6, pp. 837–847, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  11. W. Xue, Y. Liu, K. Li, Z. Chi, G. Min, and W. Qu, “DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks,” Concurrency and Computation: Practice and Experience, vol. 24, no. 10, pp. 1037–1051, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Wang, L. Liu, and J. Su, “RLM: A general model for trust representation and aggregation,” IEEE Transactions on Services Computing, vol. 5, no. 1, pp. 131–143, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. E. Ayday and F. Fekri, “Iterative trust and reputation management using belief propagation,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 375–386, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Liu and A. Datta, “Modeling context aware dynamic trust using hidden markov model,” in Proceedings of the 26th AAAI Conference on Artificial Intelligence, pp. 1938–1944, July 2012. View at Scopus
  15. E. Koutrouli and A. Tsalgatidou, “Taxonomy of attacks and defense mechanisms in P2P reputation systems-lessons for reputation system designers,” Computer Science Review, vol. 6, no. 2-3, pp. 47–70, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Jøsang, “Robustness of trust and reputation systems: does it Matter?” in Proceedings of the 6th IFIPTM International Conference on Trust Management (IFIPTM '12), vol. 374, pp. 253–262, Springer, Berlin, Germany, 2012.
  17. H. Gao, Statistics Computation, Peking University Press, Beijing, China, 1995.
  18. Z. Liang and W. Shi, “Analysis of ratings on trust inference in open environments,” Performance Evaluation, vol. 65, no. 2, pp. 99–128, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Lu, K. Zheng, X. Niu, and Y. Yang, “Construct a risk-aware peer-to-peer security trust model,” Journal of Beijing University of Posts and Telecommunications, vol. 32, pp. 22–32, 2011. View at Google Scholar · View at Scopus