资源描述:
《fuzzy trust evaluation and credibility development in multi-agent systems》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、AppliedSoftComputing7(2007)492–505www.elsevier.com/locate/asocFuzzytrustevaluationandcredibilitydevelopmentinmulti-agentsystemsStefanSchmidta,*,RobertSteelea,TharamS.Dillona,ElizabethChangb,1aUniversityofTechnology,Sydney,P.O.Box123Broadway,NSW2007,AustraliabCurtinUniversityofT
2、echnology,G.P.O.BoxU1987,PERTHWA6845,AustraliaReceived27June2005;receivedinrevisedform15January2006;accepted2November2006Availableonline15December2006AbstractE-commercemarketscanincreasetheirefficiencythroughtheusageofintelligentagentswhichnegotiateandexecutecontractsonbehalfoft
3、heirowners.Themeasurementandcomputationoftrusttosecureinteractionsbetweenautonomousagentsiscrucialforthesuccessofautomatede-commercemarkets.Buildingaknowledgesharingnetworkamongpeeragentshelpstoovercometrust-relatedboundariesinanenvironmentwhereleasthumaninterventionisdesired.N
4、evertheless,ariskmanagementmodelwhichallowsindividualcustomisationtomeetthedifferentsecurityneedsofagent–ownersisvital.Thecalculationandmeasurementoftrustinunsupervisedvirtualcommunitieslikemulti-agentenvironmentsinvolvescomplexaspectssuchascredibilityratingforopinionsdelivered
5、bypeeragents,ortheassessmentofpastexperienceswiththepeernodeonewishestointeractwith.Thedeploymentofsuitablealgorithmsandmodelsimitatinghumanreasoningcanhelptosolvetheseproblems.Thispaperproposesnotonlyacustomisabletrustevaluationmodelbasedonfuzzylogicbutalsodemonstratestheinteg
6、rationofpost-interactionprocesseslikebusinessinteractionreviewsandcredibilityadjustment.Fuzzylogicprovidesanaturalframeworktodealwithuncertaintyandthetoleranceofimprecisedatainputstofuzzy-basedsystemsmakesfuzzyreasoningespeciallyattractiveforthesubjectivetasksoftrustevaluation,
7、business-interactionreviewandcredibilityadjustment.#2006ElsevierB.V.Allrightsreserved.Keywords:Trustevaluation;Credibilityadjustment;Fuzzylogic;Electroniccommerce;Multi-agentsystems1.Introductionenvironments.Suchthreatsincludefinancialdamages,privacyinvasion,orsecurityattacks.Le
8、veragingthepoweroftheInternet,individualsandWeemployin