您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (3): 86-90.doi: 10.6040/j.issn.1671-9352.2.2015.120

• • 上一篇    下一篇

基于信息熵隶属度的决策属性权重确定方法

赵斌1,2,3,何泾沙1,张伊璇1   

  1. 1. 北京工业大学软件学院, 北京 100124;2.济宁学院计算机科学系, 山东 曲阜 273155;3. 数字出版技术国家重点实验室(筹), 北京 100871
  • 收稿日期:2015-09-07 出版日期:2016-03-20 发布日期:2016-04-07
  • 作者简介:赵斌(1979— ),男,副教授,博士研究生,研究方向为网络安全、信息取证、云计算. E-mail:jnzhaobin@163.com
  • 基金资助:
    国家自然科学基金资助项目(61272500);国家高技术研究发展计划(863计划)项目(2015AA011103);北京自然科学基金资助项目(4142008);山东省自然科学基金资助项目(ZR2013FQ024);山东省科学技术发展计划项目(2013RKA08007,2014RKB14122);山东省高校科技计划项目(J12LN70,J14LN80);北大方正集团有限公司数字出版技术国家重点实验室开放课题资助项目。

The method of determining decision attribute weight based on information entropy and membership

ZHAO Bin1,2,3, HE Jing-sha1, ZHANG Yi-xuan1   

  1. 1.School of Software Engineering, Beijing University of Technology, Beijing 100124, China;
    2. Department of Computer Science, Jining University, Qufu 273155, Shangdong, China;
    3. State Key Laboratory of Digital Publishing Technology(Peking University Founder Group Co., Ltd), Beijing 100871, China
  • Received:2015-09-07 Online:2016-03-20 Published:2016-04-07

摘要: 在开放式网络基于信任的访问控制中,信任量化与评估是授权决策的前提,决策属性权重的确立是信任量化与评估的关键的核心问题。借助专家调查法和模糊分析法提出了基于信息熵隶属度的决策属性权重确定方法,通过算例数据分析表明利用决策属性权重计算所得的结果与实际是相符的,该方法能够保证信任评估的有效性和客观性。

关键词: 访问控制, 信任评估, 隶属度, 信息熵

Abstract: The determine of the decision attribute weights is the key issues of trust quantification and evaluation that is the precondition of authorization decisions of trust based access control in open network. A method of determining decision attribute weight based information entropy and membership was proposed, which adopt expert investigation method and fuzzy analysis method. Example data analysis shows that attribute index weight and recommend entities recommended weight calculation result is in line with actual. This method is effective and objective in the trust evaluation decision-making.

Key words: access control, information entropy, trust evaluation, membership

中图分类号: 

  • TP393
[1] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C] //Proceedings 1996 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society, 1996:164-173.
[2] BLAZE M, FEIGENBAUM J, KEROMYTIS A D. KeyNote: turst management for public-key infrastructures[C] //Proceedings of Cambridge 1998 Security Protocols Internatioonal Workshop. Berlin: Springer-Verglag, 1999:59-63.
[3] LI NH, MITCHELL JC, WINSBOROUGH WH. Design of a role-based trust management framework [C] //Proceedings of Conference 2002 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2002:114-130.
[4] PHOOMVUTHISSARN S. Trust and role based access control for secure interoperation [C] //Proceedings of Conference International Symposium on Communication and Information Technology. New York: IEEE, 2007, 1458-1463.
[5] DIMMOCK N, BELOKOSZTOLSZKI A, EYERS D, et al. Using trust and risk in role-based access control policies[C] //Proceedings of Conference 9th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2004: 156-162.
[6] LI Ruixuan, TANG Zhuo, LU Zhengding, et al. Request-driven role mapping framework for secure interoperation in multi-domain environment [J]. Computer Systems Science and Engineering, 2008, 23(3):193-207.
[7] SARROUH N. Formal modeling of trust-based access control in dynamic coalitions[C] //Proceedings of Conference IEEE 37th Annual Computer Software and Applications Conference(COMPSAC). New York: IEEE, 2013: 224-229.
[8] ZHANG Yixuan, HE Jingsha, ZHAO Bin, et al. Towards more pro-active access control in computer systems and networks[J]. Computers & Security, 2015, 49: 132-146.
[9] 李小勇,桂小林.动态信任预测的认知模型[J].软件学报,2010,01:163-176. LI Xiaoyong, GUI Xiaolin. Cognitive model of dynamic trust forecasting[J]. Journal of Software, 2010, 01:163-176.
[10] MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5):942-952.
[11] 刘宴兵, 龚雪红, 冯艳芬. 基于物联网节点行为检测的信任评估方法[J].通信学报, 2014, 35(5):8-15. LIU Yanbing, GONG Xuehong, FENG Yanfen. Trust evaluation method based on the node behavior detection of the Internet of things[J]. Journal of Communication, 2014, 35(5): 8-15.
[12] 张仕斌, 许春香. 基于云模型的信任评估方法研究[J]. 计算机学报, 2013, 36(2): 422-431. ZHANG Shibin, XU Chunxiang. Research on trust evaluation method based on cloud model[J]. Journal of Computer Science, 2013, 36(2):422-431.
[13] TRIVELLATO D, ZANNONE N, ETALLE S. A distributed goal evaluation algorithm for trust management[J]. Theory and Practice of Logic Programming, 2014, 14:293-337.
[14] SMARI W W, CLEMENTE P, LALANDE JF. An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system[J]. Future Generation ComputeR Systems-the International Journal of Grid Computing and Escience, 2014, 31:147-168.
[15] LI Min, SUN Xiaoxun, WANG Hua. Multi-level delegations with trust management in access control systems[J]. Journal of Intelligent Information Systems, 2012, 39(3):611-626.
[1] 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91.
[2] 蔡红云,马晓雪. 在线社会网络中基于关系强度的访问控制机制[J]. 山东大学学报(理学版), 2016, 51(7): 90-97.
[3] 唐乾,杨飞,黄琪,林果园. 基于TCB子集的访问控制信息安全传递模型[J]. 山东大学学报(理学版), 2016, 51(7): 98-106.
[4] 翟鹏,李登道. 基于高斯隶属度的包容性指标模糊聚类算法[J]. 山东大学学报(理学版), 2016, 51(5): 102-105.
[5] 蒋伟进, 许宇晖, 郭宏, 许宇胜. 基于多智能体的多维证据动态信任计算模型[J]. 山东大学学报(理学版), 2015, 50(01): 1-11.
[6] 吕盟, 刘哲, 刘建伟. 企业级无线局域网可信域间访问控制方案[J]. 山东大学学报(理学版), 2014, 49(11): 82-88.
[7] 杨晓晖, 王虹, 江丽军, 常思远. 一种基于信任度量的Web服务跨域访问控制模型[J]. 山东大学学报(理学版), 2014, 49(09): 115-122.
[8] 邹德清, 杨凯, 张晓旭, 苑博阳, 冯明路. 虚拟域内访问控制系统的保护机制研究[J]. 山东大学学报(理学版), 2014, 49(09): 135-141.
[9] 罗海燕, 吕萍, 刘林忠, 杨洵. 云环境下基于模糊粗糙AHP的企业信任综合评估[J]. 山东大学学报(理学版), 2014, 49(08): 111-117.
[10] 史存会,林鸿飞*. 追踪事件微博报道:一种流的动态话题模型[J]. J4, 2012, 47(5): 13-18.
[11] 曹林林1,2,张化祥1,2*,王至超1,2. 一种基于信息熵数据修剪的支持向量机:EB-SVM[J]. J4, 2012, 47(5): 59-62.
[12] 高枫1,何泾沙2. 基于信任和信息流模型的隐私保护方法[J]. J4, 2011, 46(5): 39-43.
[13] 刘琚,郑丽娜. 多跳无线网络中协作ARQ机制和协作MAC技术[J]. J4, 2011, 46(10): 57-65.
[14] 叶明全1,2, 胡学钢1,伍长荣3. 垂直划分多决策表下基于条件信息熵的隐私保护属性约简[J]. J4, 2010, 45(9): 14-19.
[15] 陈 钦,冯建华 . 一个企业级多媒体数据库的设计与实现[J]. J4, 2007, 42(9): 46-50 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!