The fuzzy control of trust establishment
Title | The fuzzy control of trust establishment |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Xia, D., Zhang, Y. |
Conference Name | 2017 4th International Conference on Systems and Informatics (ICSAI) |
Keywords | Access Control, attribute certificate, authorisation, Automated Trust Negotiation, computer theory, digital credentials, Fuzzy, fuzzy control, fuzzy negotiation process, fuzzy set theory, Fuzzy sets, Human Behavior, human factors, Libraries, Model, mutual trust, negotiation process, negotiation strategy need, open network environment, process control, pubcrawl, Servers, strange entities, traditional ATN, Trust, trust establishment, Trusted Computing, unnecessary negotiation failure |
Abstract | In the open network environment, the strange entities can establish the mutual trust through Automated Trust Negotiation (ATN) that is based on exchanging digital credentials. In traditional ATN, the attribute certificate required to either satisfied or not, and in the strategy, the importance of the certificate is same, it may cause some unnecessary negotiation failure. And in the actual situation, the properties is not just 0 or 1, it is likely to between 0 and 1, so the satisfaction degree is different, and the negotiation strategy need to be quantified. This paper analyzes the fuzzy negotiation process, in order to improve the trust establishment in high efficiency and accuracy further. |
URL | https://ieeexplore.ieee.org/document/8248370/ |
DOI | 10.1109/ICSAI.2017.8248370 |
Citation Key | xia_fuzzy_2017 |
- model
- unnecessary negotiation failure
- Trusted Computing
- trust establishment
- trust
- traditional ATN
- strange entities
- Servers
- pubcrawl
- process control
- open network environment
- negotiation strategy need
- negotiation process
- mutual trust
- Access Control
- Libraries
- Human Factors
- Human behavior
- Fuzzy sets
- fuzzy set theory
- fuzzy negotiation process
- fuzzy control
- Fuzzy
- digital credentials
- computer theory
- Automated Trust Negotiation
- authorisation
- attribute certificate