Font Size: a A A

Evaluation And Policy Of User Behavior Trust In Trustworthy Networks Based On FAHP

Posted on:2011-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:S K GuoFull Text:PDF
GTID:2178330332462367Subject:Computer Engineering and Applications
Abstract/Summary:PDF Full Text Request
Network is the importance information resource which servers the national economic growth and make the everyday life easier for the people. In fact, because of the known vulnerability of network itself, human error, administratively deficient, attacks on the network, the network need the new security policy. And so on, in new applications of computer networks such as SaaS (Software-as-a-service) based on Cloud Computing, On the one hand, service providers hope to provide services for more user for greater gains, on the other hand, more user means greater potential network security. Only security control of authentication can't completely meet the new applications of computer networks, we must combine security measures of dynamic trust of behavior to further strengthen the security of network services.Firstly ,the paper mainly discusses the issues about user behaviors on trust network include the trust-network,user behavior and the define and relationship of trust(s) . The paper elaborates the merits and faults of AHP and then proposed a Fuzzy Analytic Hierarchy Process (FAHP) method based on the triangular fuzzy numbers in the user trust study Which can reduce the influenced by subjective factors, such as experience, cognition and so on. The trust and risk are two key factors in the security policy. From the trust and risk two points of views, the paper proposes that game theory in the making user behaviors'policy. In the last with the methods, an application is proposed in the web server with C/S mode. Trust and risk provide the quantify data for network security based on the trust and the policy how to respond the user request.The main contributions of the paper are shown as follows:(1)Evaluation of user behaviors trust based on the FAHP.(2)Introducing risk to the policy of trust, considering the risk as an importance factory in the trust decision.(3)In the process trust decision combined the risk, propose game analysis.
Keywords/Search Tags:Trusted Network, User Behavior, Trust, FAHP, Trust Levels, Risk Assessment, Game Analysis
PDF Full Text Request
Related items