By Topic

Model of Services Trust Threshold Assess Based on Fuzzy Theory

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Changying Dai ; Sch. of Comput. & Commun. Eng., China Univ. of Pet., Dongying, China ; Wentao Gong

With the development of Web services, users become more and more eager for the sharing of services. As a result, it becomes very important to evaluate and calculate threshold value for trust degree of services. Although there are already several trust management mechanisms and evaluation models for web services, they perform not so well more or less in aspects of flexibility and rationality. Therefore, on the one hand, this thesis has introduced evaluation model based on fuzzy theory into the practice of web services and enlarged collection of evaluation factors so that threshold value for trust degree of services is able to grow more authoritative and rational; on the other hand, it has brought in the concept of authority factors to determine different affects to final threshold value of services by different evaluation factors. Two experiments have proved that this kind of evaluation model is able to quantificationally describe the general trust degree using intuitionistic and simple words, which have reflected fuzziness and diversity of evaluation to trust degree, improved the flexibility and rationality of trust evaluation. Finally, the security of web services will get improvement.

Published in:

e-Business and Information System Security (EBISS), 2010 2nd International Conference on

Date of Conference:

22-23 May 2010