75
Views
0
CrossRef citations to date
0
Altmetric
Articles

Social big data oriented trust situation risk model based on individual behavior

, , , &
Pages 119-126 | Received 26 Dec 2016, Accepted 01 Mar 2017, Published online: 09 Dec 2018

References

  • Guo Q, Guo Y, Guo C. Alternative ranking based on fuzzy similarity in group decision-making. J Southwest Jiaotong Univ. 2010;45(2):105–108.
  • Zeng Y, Sun Y, Xing L, et al. Trust-aware privacy evaluation in online social networks. IEEE ICC 2014-communication and information systems security symposium. University of Wollongong, Australia, p. 932–938.
  • Yan Z, Yi W. Research on college students' online social behavior based on big data. J Electron Technol Softw Eng. 2014;23:30–31.
  • Xingang Z, Baoping W, Xindang C. A hierarchical network security situation assessment model based on information fusion. Netw Sec Technol Appl. 2012;9(04):1072–1074.
  • Deepa R, Swamynathan S. A trust model for directory-based service discovery in mobile ad hoc networks. SNDS 2014, CCIS 420. Berlin: Springer; 2014. p. 115–126.
  • Qingsong C, Jianwei N, Mingzhu L. Method for evaluating node information dissemination ability in social network of opportunity. J Softw. 2012;23:49–58.
  • Kuter U, Golbeck J. Sunny: a new algorithm for trust inference in social networks using probabilistic confidence model. Proceedings of the conference on artificial intelligence (AAAI 07); Vancouver, British Columbia, 2007. p. 1377–1382.
  • Liu G, Wang Y, Orgun MA, et al. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans Ser Comput. 2013 Apr–Jun;6(2):152–166. doi: 10.1109/TSC.2011.58
  • Jiang W, Wang G, Wu J. Generating trusted graphs for trust evaluation in online social networks. Future Generation Comput Sys. 2014;31:48–58. doi: 10.1016/j.future.2012.06.010
  • Paul S, Pan J, Jain R. Architectures for the future networks and the next generation Internet: a survey. Comput Commun. 2011;34(1):2–42. doi: 10.1016/j.comcom.2010.08.001
  • Wang G, Wu J. FlowTrust: trust inference with network flows. Front Comput Sci China. 2011;5(2):181–194. doi: 10.1007/s11704-011-0323-4
  • Mrmol FG, Prez GM. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Comput Stand Interfaces. 2010;32(4):185–196. doi: 10.1016/j.csi.2010.01.003
  • Shafiq MZ, Liu AX. Modeling morphology of social network cascades. arXiv preprint arXiv:1302.2376, 2013.
  • Caverleea J, Liu L, Web S. The socialtrust framework for trusted social information management: architecture and algorithms. Inf Sci. 2010;180(1):95–112. doi: 10.1016/j.ins.2009.06.027
  • Liu H, Lim E-P, Lauw HW, et al. Predicting trusts among users of online communities: an epinions case study. Proceedings of the ACM conference on electronic commerce (EC); Chicago, IL, 2008. p. 310–319.
  • Walter F, Battiston S, Schweitzer F. A model of a trust- based recommendation system on a social network. Auton Agent Multi Agent Syst J. 2008 Feb;16(1):57–74. doi: 10.1007/s10458-007-9021-x
  • Liu G, Yang Q, Wang H, et al. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. IEEE Infocom 2014 – IEEE conference on computer communications. Toronto, ON, Canada, p. 1698–1706.
  • Xu Zhi. Application of Bayesian method based on maximum entropy principle in the analysis of measurement data. J Inner Mong Agric Univ. 2013;34(1):116–122.
  • Tian CQ, Jiang JH, Hu ZG, et al. A novel super-peer based trust model for peer-to-peer networkss. Chin J Comput. 2010;33(2):345–355. doi: 10.3724/SP.J.1016..2010.00345
  • Deepa R, Swamynathan S. A trust model for directory-based service discovery in mobile ad hoc networks. SNDS 2014, CCIS 420; Berlin: Springer; 2014. p. 115–126.
  • Chen Z, Li L, Gui J, et al. KFTrust: P2P trust model based on evaluation rank using Kalman filter. Int J Auton Adapt Commun Sys. 2015;1(8):268–287. doi: 10.1504/IJAACS.2015.069566
  • Zhong Qi, Qi Wei. Regional flexibility evaluation model based on situation management. Econ Manag. 2010;8:32–37.
  • Tang W, Chen Z. Research of subjective trust management model based on the fuzzy set theory. J Softw. 2003;14(8):1401–1408.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.