A Trust Model Based on Check Point Behaviors Risk Evaluation

Article Preview

Abstract:

Trust is an important factor in people’s trading activities, and it is closely related to risk. Trust and risk are the two key factors of Decision-Making. However, existing software behaviors trust research always overlooks the risk. In order to evaluate the credibility of software behaviors more reasonably and accurately, a trust model based on check point behaviors risk evaluation is presented. This model sets check points into software behaviors trajectory, and accumulates every suspected risk check point, then adopts rewarding or punishment mechanism to evaluate a software behaviors trustworthy, which can judge whether software behaviors are credible or not. The simulated experiment shows that this model can distinguish the potential risk effectively in software behaviors, evaluate the risk value trustworthy and provide objective and reliable information to judge whether software behaviors are credible or not.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

2102-2106

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Diakov K, Batteram J, Zandbelt H. Monitoring of distributed component interactions. [C] / Proc of IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing. New York: [s. n. ], 2000: 229—243.

DOI: 10.1007/3-540-40002-8_22

Google Scholar

[2] Li Jun. Monitoring and characterization of component—based systems with global causality capture. In the 23th International Conference on Distributed Computing Systems (ICDCS 2003) 19-22 May 2003, Providence, Rhode Island.

DOI: 10.1109/icdcs.2003.1203492

Google Scholar

[3] Mariani L, Pezze M. A technique for verifying component based software. in Electronic Notes in Theoretical Computer, (2005).

Google Scholar

[4] Chen Feng , Grigore R. Mop: an efficient and generic runtime verification framework. Technical report UIUCDCS-R-2007-2836.

Google Scholar

[5] Gu Liang , GuO Yao , Wang Hua. Runtime Software Trustworthiness Evidence Collection Mechanism Based on TPM. Journal of Software, Vol. 21, No. 2, February 2010, p.373−387.

DOI: 10.3724/sp.j.1001.2010.03789

Google Scholar

[6] Audun Jøsang and St´ ephane Lo Presti. Analyzing the Relationship between Risk and Trust. Appears in the proceedings of the 2nd International Conference on Trust Management (2004).

Google Scholar

[7] Schoorman F. D, Mayer R. C, and Davis J. H. An Integrative Model of Organizational Trust Past, Present and Future. Academy of Management Review. 2007 Vol. 32, No. 2, 344–354.

DOI: 10.5465/amr.2007.24348410

Google Scholar

[8] Zhang Runlian, Wu Xiaonian. A Trust Model Based on Behaviors Risk Evaluation, Chinese Journal of computers. 2009 Vol . 32 No. 4.

Google Scholar

[9] Fan Hong, Feng Dengguo, Wu Yafei. Application of information security risk assessment methodology. (2006).

Google Scholar

[10] Jøsang A , Bradley D, Knapskog S J. Belief Based Risk Analysis[A]. This paper appeared at Australasian Information Security Workshop (AISW) 2004. Vol. 32.

Google Scholar

[11] Fan Hong, Feng Dengguo. Implement of information security risk assessment methodology. (2007).

Google Scholar

[12] Standardization Administration of China. GB/ T 20984 —2007Information Security Technology Risk Assessment Specification for Information Security. Beijing : China Standard Press , 2007 (in Chinese).

Google Scholar

[13] Qin Zhidong, Xiong Guangze. Research on Testing and Evaluation Theory of Reliability and Safety for High Dependability Software. (2005).

Google Scholar