Skip to main content

Improving KeyNote Trust Management Model Based on User Behavior for Social Learning

  • Conference paper
  • First Online:
Advances in Web-Based Learning – ICWL 2013 Workshops (ICWL 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8390))

Included in the following conference series:

Abstract

Trust in social learning environment is influenced greatly by rapid-changing social elements. Therefore it is necessary for us to improve the KeyNote trust model to adapt the dynamic user behavior in social learning. In this paper, we mainly devote ourselves to the work of building a dynamic trust model based on indirect trust relationship. We take advantage of KeyNote to build the dynamic trust model, in which we use an indirect trust algorithm to calculate the trust value of indirect trust relationship. In this way, we can get the trust values of entities in the social learning network by indirect link. Finally our experimental results prove that this dynamic trust management model can deal with the dynamically changing relationship, and calculate user trust value by monitoring user behavior to realize the function of dynamically managing user access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, T., Krim, H., Viniotis, Y.: A generalized Markov graph model: application to social network analysis. IEEE J. Sel. Top. Sig. Proces. 7, 318–332 (2013)

    Article  Google Scholar 

  2. Blaze, M., Ioannidis, J., Keromytis, A.: Trust management for IPSec. In: Proceedings of the Internet Society Symposium on Network and Distributed System (SNDSS 2001), vol. 5, pp. 139–151 (2001)

    Google Scholar 

  3. Blaze, M., Ioannidis, J., Keromytis, A.D.: Offline micropayments without trusted hardware. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 21–40. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Samarati, P., Reiter, M.X., Jajodia, S.: An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4, 453–482 (2001)

    Article  Google Scholar 

  5. Li, W., Shang, Y., Ji, Y.: Analysis of multiple objective decision methods based on entropy weight. Comput. Intell. Industr. Appl. 1, 953–956 (2008)

    Google Scholar 

  6. Guha, R., Kumar, R., Raghavan, P.: Propagation of trust and distrust. In: WWW 2004, pp. 403–412 (2004)

    Google Scholar 

  7. de Mello, E.R., van Moorsel, A., da Silva Fraga, J.: Evaluation of P2P search algorithms for discovering trust paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Li, M., Bonti, A.: T-OSN: a trust evaluation model in online social networks. In: 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, pp. 469–473 (2011)

    Google Scholar 

  9. Chen, I.-R., Bao, F., Chang, M., Cho, J.-H.: Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 99, 1 (2013)

    Google Scholar 

  10. Blaze, M., Kannan, S., Lee, I., Sokolsky, O., Smith, J.M., Keromytis, A.D., Lee, W.: Dynamic trust management. Computer 42, 44–52 (2009)

    Article  Google Scholar 

  11. Meng, L., Xu, R., Li, X., Xu, G.: The improvements of KeyNote trust management system. Adv. Inst. Convergence Inform. Technol. 6, 177–185 (2012)

    Google Scholar 

  12. Blaze, M., Ioannidis, J., Keromytis, A.D.: Experience with the KeyNote trust management system: applications and future directions. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 284–300. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Acknowledgment

This work is partly supported by National Program on Key Basic Research Project (973 Program) under Grant 2013CB329304, National Natural Science Foundation of China (No. 61003080), and the Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (No. AGK2012007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangquan Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, R., Xu, G., Sun, D., Li, X., Feng, Z. (2015). Improving KeyNote Trust Management Model Based on User Behavior for Social Learning. In: Chiu, D., et al. Advances in Web-Based Learning – ICWL 2013 Workshops. ICWL 2013. Lecture Notes in Computer Science(), vol 8390. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46315-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46315-4_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46314-7

  • Online ISBN: 978-3-662-46315-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics