A Trust Model Award Content Security and Rating Supervision Model

Article Preview

Abstract:

With the rapid expansion of negative information in the Internet, the content rating technology is developed. This paper proposed a rating supervision model based on content rating considering trust model. We firstly analyze the behavior and reputation of network entities from the following dimensions: data dimension, time dimension and application dimension, and then applied artificial neural network to construct the trust model referred to the trust relationship in human society network. At last, we proposed the rating supervision model based on the trust model. It is proved that the rating supervision model can not only meet the standard of PICS, but also take the behavior and reputation of network entities into consideration. As a result, the rating supervision model can provide a variety of security services to enhance the credibility of the information by combination of rating label and network entity reputation.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 655-657)

Pages:

1765-1769

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dlamini MT, Eloff JHP and ELoff MM 2009 Comp. Surg. 28 3

Google Scholar

[2] Fong ACM, Hui SC and Hong GY 2010 Proc. Int. Conf. on Symposium on Web Society (Beijing) vol 1 (American Elsevier) p.1

Google Scholar

[3] Gong S 2011 J Comput. 6 5

Google Scholar

[4] Liu Y, Zhao G and Wang T 2010 Proc. Int. Conf. on Education Technology and Computer Science. (Wuhan) vol 3 (Los Alamitos, Calif: IEEE Computer Society) p.396

Google Scholar

[5] Herrera, F. "A model based on linguistic 2-tuples for dealing with multigranular hierarchical linguistic contexts in multi-expert decision-making",IEEE Transactions on Systems, Man, and Cybernetics, 2001, pp: 227- 234

DOI: 10.1109/3477.915345

Google Scholar

[6] Sethi, A.S. "A hierarchical management framework for battlefield network management", MILCOM 97 Proceedings, 1997, pp: 1239- 1243

Google Scholar

[7] Huang J and Nicol D 2009 Proc. Int. Conf. on Symposium on Identity and Trust on the Internet. (Gaithersburg) vol 1 (ACM) p.23

Google Scholar

[8] Jiang H and Tan Y 2010 Proc. Int. Conf. on Computer Design and Applications. (Zhengzhou) vol 5 (IEEE Computer Society) p.360

Google Scholar

[9] Yang M, Wang L and Lei Y 2009 Proc. Int. Conf. on Multimedia Information Networking and Security. (Wuhan) vol 1 (IEEE Computer Society) p.187

Google Scholar

[10] Yu L, Xiong F and Cheng W 2011 Proc. Int. Conf. on Communications and Networking. (Harbin) vol 5 (IEEE Computer Society) p.620

Google Scholar

[11] W. Halbert "Artificial Neural Networks: Approximation and Learning Theory," Blackwell Publishers, Inc. Cambridge, MA, USA, 1992.

Google Scholar

[12] Reagle J platform for Internet content selection [EB/OL]. http://www.w3.org/PICS/

Google Scholar