首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 562 毫秒
1.
Assessing customer trust in suppliers with regards to its influencing factors is an important open issue in supply chain management literature. In this paper, a customer trust index is designed as the trust level arising from the information sharing degree and quality, related to the information shared by a supplier with his customer. The customer trust level is evaluated using a fuzzy decision support system integrating information sharing dimensions. The core is a rule-based system designed using the results of questionnaires and interviews with supply chain experts. Several tests were generated in order to analyze the impact of the different information sharing attributes on the customer trust index. The developed approach is then applied to a real supply chain from the textile industry. Results show large differences of weight and impact between the different information-related factors that build the customer trust index. It is also shown that the proposed system has an important role in ensuring the objectivity of the trust assessment process and in helping decision makers evaluate their business partners.  相似文献   

2.
针对军事航空通信频谱共享的特殊性,提出一种基于云模型的频谱共享信任机制。通过对信任的相关理论进行研究,引入云模型理论,构建了基于云模型的频谱共享信任体系结构,确立了频谱共享信任体系中的信任交互关系。运用云模型进行信任评价,实现了将频谱共享中模糊定性的信任属性向精确定量的信任等级的转换,较好地解决了频谱共享信任关系建立等系列问题。设计了信任评价实验,验证了信任评价模型的有效性和实用性,为基于信任机制的频谱共享策略实施提供了有效的支撑。  相似文献   

3.
为了科学合理地评价战略网络内部的伙伴企业,本文提出一种模糊推理评价方法。首先分析了模糊推理系统的基本组成,阐述了模糊推理算法;然后根据战略管理能力、企业管理水平、资源整合能力、关系管理能力、兼容性和企业信誉等指标,选用高斯形隶属度函数,制定15条模糊规则,并使用Matlab语言建立模糊推理系统。对珠江三角洲伙伴企业的实际分析表明,该系统评价结果正确、评价效果好。模糊推理方法为伙伴企业的综合评价提供了一种切实可行的新思路。  相似文献   

4.
A virtual enterprise (VE) consists of a network of independent, geographically dispersed administrative business domains that collaborate with each other by sharing business processes and resources across enterprises to provide a value-added service to customers. Therefore, the success of a VE relies on full information transparency and appropriate resource sharing, making security and trust among subjects significant issues. Trust evaluation to ensure information security is most complicated in a VE involving cross-organization collaboration. This study presents a virtual enterprise access control (VEAC) model to enable resource sharing for collaborative operations in the VE. A scenario for authentication and authorization in the life cycle of a VE is then described to identify the main activities for controlling access. Also developed herein is a trust evaluation method based on the VEAC model to improve its security while safeguarding sensitive resources to support collaborative activities. The trust evaluation method involves two trust evaluation sub-models, one to evaluate the level of trust between two virtual enterprise roles, and another to measure the level of trust between two projects. The two sub-models support each other to make resource-sharing decisions, and are developed based on the concepts of direct, indirect, and negative trust factors. Finally, an example of measuring the trust between two subjects is demonstrated after introducing the two sub-models. The VEAC-based trust evaluation method enables the following: (1) secure resource sharing across projects and enterprises, (2) collaborative operation among participating workers, (3) increased information transparency and (4) lowered information delay in VEs.  相似文献   

5.
通过对开放网络环境中主观信任评价方法的讨论,考虑到主观信任的模糊性,提出以可信性理论为基础的主观信任量化表述与评价方法,并给出了主体信任属性评价值为模糊变量情形下主观信任可信性的模拟计算方法。实例分析表明,该方法对主观信任评价是可行和有效的。  相似文献   

6.
The information overload on the World Wide Web results in the underuse of some existing e‐government services within the business domain. Small‐to‐medium businesses (SMBs), in particular, are seeking “one‐to‐one'' e‐services from government in current highly competitive markets, and there is an imperative need to develop Web personalization techniques to provide business users with information and services specific to their needs, rather than an undifferentiated mass of information. This paper focuses on how e‐governments can support businesses on the problem of selecting a trustworthy business partner to perform reliable business transactions. In the business partner selection process, trust or reputation information is crucial and has significant influence on a business user's decision regarding whether or not to do business with other business entities. For this purpose, an intelligent trust‐enhanced recommendation approach to provide personalized government‐to‐business (G2B) e‐services, and in particular, business partner recommendation e‐services for SMBs is proposed. Accordingly, in this paper, we develop (1) an implicit trust filtering recommendation approach and (2) an enhanced user‐based collaborative filtering (CF) recommendation approach. To further exploit the advantages of the two proposed approaches, we develop (3) a hybrid trust‐enhanced CF recommendation approach (TeCF) that integrates both the proposed implicit trust filtering and the enhanced user‐based CF recommendation approaches. Empirical results demonstrate the effectiveness of the proposed approaches, especially the hybrid TeCF recommendation approach in terms of improving accuracy, as well as in dealing with very sparse data sets and cold‐start users. © 2011 Wiley Periodicals, Inc.  相似文献   

7.
The success of virtual enterprises (VEs) depends on the effective sharing of related resources between various enterprises or workers who perform related activities. Specifically, VE success hinges on the integration and sharing of information and knowledge. Trust is an important facilitator of knowledge sharing. However, the trustworthiness of a peer is a vague concept that is dynamic and that often shifts over time or with environmental changes. This study designs a trust-based knowledge-sharing model based on characteristics of VEs and the knowledge structure model to express knowledge associated with VE activities. Subsequently, the factors that affect the trust evaluation are identified based on the characteristics of trust and VEs. Finally, this study develops a knowledge sharing, decision-making framework in which a fuzzy trust evaluation method for sharing knowledge is proposed based on VE activities and the interactions among workers in allied enterprises. The method consists of three sub-methods, including an activity correlation evaluation method, a current trust evaluation method, and an integral trust evaluation method. Under the premises of secure VE knowledge and reasonable access authorization, the proposed knowledge-sharing method provides the trust level between a knowledge-requesting enterprise and a knowledge-supplying enterprise to improve the willingness of the latter to share more valuable knowledge, ultimately increasing the efficiency and competitiveness of VEs.  相似文献   

8.
基于可信性理论的主观信任模型研究   总被引:1,自引:0,他引:1  
王小斌 《计算机应用》2009,29(3):874-876
通过对开放网络环境中主观信任评价方法的讨论,引入可信性理论来研究主观信任的模糊性,并提出了极大化期望值准则下的主观信任量化评价方法。针对主体信任属性评价值以及评价权重均为模糊变量的情形,给出了主观信任模糊期望值的模拟计算方法。实例分析表明,该方法对主观信任评价是可行和有效的。  相似文献   

9.
The success of virtual enterprises (VEs) depends on the effective sharing of related resources between various enterprises or workers who perform related activities. Specifically, VE success hinges on the integration and sharing of information and knowledge. Trust is an important facilitator of knowledge sharing. However, the trustworthiness of a peer is a vague concept that is dynamic and that often shifts over time or with environmental changes. This study designs a trust-based knowledge-sharing model based on characteristics of VEs and the knowledge structure model to express knowledge associated with VE activities. Subsequently, the factors that affect the trust evaluation are identified based on the characteristics of trust and VEs. Finally, this study develops a knowledge sharing, decision-making framework in which a fuzzy trust evaluation method for sharing knowledge is proposed based on VE activities and the interactions among workers in allied enterprises. The method consists of three sub-methods, including an activity correlation evaluation method, a current trust evaluation method, and an integral trust evaluation method. Under the premises of secure VE knowledge and reasonable access authorization, the proposed knowledge-sharing method provides the trust level between a knowledge-requesting enterprise and a knowledge-supplying enterprise to improve the willingness of the latter to share more valuable knowledge, ultimately increasing the efficiency and competitiveness of VEs.  相似文献   

10.
基于模糊数学理论的信誉评估算法研究*   总被引:3,自引:0,他引:3  
针对信任评估的主观性、模糊性以及无法精确地描述和验证等问题,提出信誉评估算法.算法定义了信任度、隶属度、信任关系、关键属性以及模糊变换等基本概念和关键属性集U、代理集Y、评价集V、评价集矩阵R四个要素.根据模糊数学理论,将代理X的信任程度以及各代理对被代理的各关键属性的评估进行模糊变换,得到即将交易的代理Y的信任向量,并根据实际对原代理X的各信任值向量化,最终得到对代理X的信任值或信誉.实例表明,算法能用直观、简洁的语义定量地描述信任值,反映了实体之间信任的模糊性,解决了关于模糊性实体之间的信任建模问题,适用于电子商务、电子政务等领域.  相似文献   

11.
开放、动态的Internet环境下,网构软件面临可信性的重大挑战。运用模糊理论,提出了一种满足最贴近用户可信度期望的构件选择方法。该方法中,定义了网构软件环境下构件的6种可信属性,介绍了一种多因素的构件可信度模糊综合评价方法,以此为基础,建立了一种满足用户可信度期望的关键词:网构软件;可信计算;构件选择;模糊综合评价;动态聚类网构软件模型,为实现候选构件与抽象构件的映射,应用基于模糊等价关系的动态聚类实现可信构件的选择。结合案例说明了方法的有效性。  相似文献   

12.
自动化信任的研究综述与展望   总被引:1,自引:0,他引:1  
董文莉  方卫宁 《自动化学报》2021,47(6):1183-1200
随着自动化能力的快速提升, 人机关系发生深刻变化, 人的角色逐渐从自动化的主要控制者转变为与其共享控制的合作者. 为了实现绩效和安全目标, 人机协同控制需要操作人员适当地校准他们对自动化机器的信任, 自动化信任问题已经成为实现安全有效的人机协同控制所面临的最大挑战之一. 本文回顾了自动化信任相关文献, 围绕自动化信任概念、模型、影响因素及测量方法, 对迄今为止该领域的主要理论和实证工作进行了详细总结. 最后, 本文在研究综述和相关文献分析的基础上提出了现有自动化信任研究工作中存在的局限性, 并从人机系统设计的角度为未来的自动化信任研究提供一些建议.  相似文献   

13.
To cope with the rapidly changing manufacturing environment, enterprise collaboration is getting increasingly more attention than ever before. The virtual enterprise (VE) is a concept that supports temporary alliances of manufacturing enterprises that have various collaboration models, such as extended enterprise, networked enterprise, concurrent enterprise, etc. Selection of trustworthy partners and trust building are important in virtual domains because they have largely been affecting the success of a VE. However, because of its complexity of trust, trust models in the literature are limited in their ability to cope with dynamic and virtual environment. In this paper, we propose a trust evaluation method of supporting enterprise collaboration and maximizing the satisfaction of cooperation. In this context, trust means the goal achievement probability. Trust value of an enterprise can be obtained by a fuzzy inference system whose rule-base is based on the top-level goal of a VE. According to the selector’s preference, various rules can be applied to trust evaluation. For further study, the planning and scheduling problems should be considered along with the trust-based partner selection for collaboration among manufacturing enterprises.  相似文献   

14.
信任链是可信计算的关键技术之一,如何对其表达和评估是研究热点。针对可信计算环境中影响信任评价的各种复杂因素以及信任关系的不确定性和动态性,提出一种基于模糊理论的可信计算信任评估方法。引入历史度量记录和时间衰减因子以构建直接信任度,建立粒度为5的信任等级空间,并给出间接信任度的模糊评判方法。运用改进的Einstein算子定义相似度函数,在此基础上给出信任链上实体的信任模糊推理和评估过程。方法把模糊推理和信任传递相结合,可以全面地评估信任链上实体的信任度。模拟实验表明,与同类方法相比较,所提方法对恶意评估具有较好的抵抗能力,且评估结果的可信性和可靠性更好,是一种可信计算信任评估的新方法。  相似文献   

15.
信任是保证在线服务质量的前提。针对电子商务环境存在的复杂性、模糊性和不确定性等因素,引入直觉模糊理论,提出了一种多维集成直觉模糊信息的信任评价方法,给出了两类信任反馈属性集成直觉模糊信息的方法,通过直觉模糊熵确定属性权重,并利用直觉加权算数平均算子求出实体的综合直觉模糊数,从而全面、客观和细腻地反映信任的模糊性和不确定性。计算实例和仿真实验表明,基于多维集成直觉模糊信息的信任评估方法是可行的,通过对风险偏好因子的灵敏度分析,发现服务请求者风险偏好不同,则评估的服务提供商的信任得分也不同;同时也验证了该方法可以有效地抑制恶意节点的攻击,为电子商务环境下信任评价的研究提供了新思路。  相似文献   

16.
基于模糊集合理论的主观信任管理模型研究   总被引:137,自引:3,他引:137       下载免费PDF全文
唐文  陈钟 《软件学报》2003,14(8):1401-1408
在开放网络环境中,信任管理模型是信息安全的重要前提与基础.考察了主观信任的模糊性,运用模糊集合理论对信任管理问题进行了建模,给出了信任类型的定义机制和信任的评价机制,定义了主体信任的形式化表示,并提出了信任关系的推导规则,构造了一个完整的主观信任管理模型,为开放网络环境中的信任管理研究提供了一个有价值的新思路.  相似文献   

17.

This paper addresses the measurement of the social dimension of cognitive trust in collaborative networks. Trust indicators are typically measured and combined in literature in order to calculate partners’ trustworthiness. When expressing the result of a measurement, some quantitative indication of the quality of the result—the uncertainty of measurement—should be given. However, currently this is not taken into account for the measurement of the social dimension of cognitive trust in collaborative networks. In view of this, an innovative metrology-based approach for the measurement of social cognitive trust indicators in collaborative networks is presented. Thus, a measurement result is always accompanied by its uncertainty of measurement, as well as by information traditionally used to properly interpret the results: the sample size, and the standard deviation of the sample.

  相似文献   

18.
Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users and also lead that P2P networks are extremely susceptible to malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build trust relationship among peers. While most of existing trust models focus on restraining the abuse and malicious attacks, intentions and sharing capabilities of peers are mostly ignored. In this paper, we present a self-nominating trust model based on hierarchical fuzzy systems to quantify the behaviors of peers. The reputation is defined based on eight factors, where three promising factors are provided by resource holders to demonstrate their desires, and four capability factors are recorded by requesters to identify the provider’s service capability. The approach degree based updating recommendation is deployed to aggregate the global trust metrics. Experimental results illustrate that our trust model effectively improves the efficiency and security of P2P systems.  相似文献   

19.
Many efforts in the area of computer security have been drawn to attribute-based access control (ABAC). Compared to other adopted models, ABAC provides more granularity, scalability, and flexibility. This makes it a valuable access control system candidate for securing platforms and environments used for coordination and cooperation among organizations and communities, especially over open networks such as the Internet. On the other hand, the basic ABAC model lacks provisions for context, trust and privacy issues, all of which are becoming increasingly critical, particularly in high performance distributed collaboration environments. This paper presents an extended access control model based on attributes associated with objects and subjects. It incorporates trust and privacy issues in order to make access control decisions sensitive to the cross-organizational collaboration context. Several aspects of the proposed model are implemented and illustrated by a case study that shows realistic ABAC policies in the domain of distributed multiple organizations crisis management systems. Furthermore, the paper shows a collaborative graphical tool that enables the actors in the emergency management system to make better decisions. The prototype shows how it guarantees the privacy of object’s attributes, taking into account the trust of the subjects. This tool incorporates a decision engine that relies on attribute based policies and dynamic trust and privacy evaluation. The resulting platform demonstrates the integration of the ABAC model, the evolving context, and the attributes of actors and resources.  相似文献   

20.
针对目前开放网络环境中主观信任评估存在的模糊性和不确定性问题,通过在主观信任模型中引入集对分析理论,提出一种基于多元联系数的表示主观信任的新方法.该方法利用多元联系将实体之间的信任程度和信任的不确定性统一起来,解决了信任表达中的模糊性和不确定性难题,为主观信任评价和决策研究提供了一种有价值的新思路.最后,通过实验仿真,证明该方法在提高网络平均信任水平及促进网络中实体的合作方面能取得良好的效果.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号