Trusted Computing Method Research of Integration Reputation with Context in E-Commerce

被引:0
|
作者
Jin, Yuanyuan [1 ]
Cui, Laizhong [1 ]
Peng, Xiaogang [1 ]
Lu, Nan [1 ]
机构
[1] Shenzhen Univ, Sch Comp & Software, Shenzhen, Peoples R China
关键词
trust; e-commerce; reputation; context;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of e-commerce. The lack of trust has become one of the main hindrances in the development of e-commerce. Building trust relationships between buyers and sellers in e-commerce therefore turns out to be an important issue. This paper investigates the status of trust computing research and presents some basic framework and trust computing methods within different types of trust models. Analysis of these models are also provided. Most of these models compute a trust value of a seller from direct experience and recommendations from buyers with the same purchases which based on the past transactions. Yet this trust value is static and cannot provide instance relationship with a new transaction. Trust value calculated from either direct experience or recommendations is different in different contexts, which should join the effect of the context when computing trust value. In the paper, we also give an overview of trusted computing method research of integration reputation with context in e-commerce, which introduce the context into direct trust and recommendation trust in order to provide more object trust result 1 for a new potential transaction. Also build an initial trustworthiness based on capability for new or no Support by Shenzhen, key project of technology basic research under Grant No.JC201104210050A transactions seller.
引用
收藏
页码:188 / 194
页数:7
相关论文
共 50 条
  • [1] Application and Research of Internet Forwarding Based on Trusted Computing for E-Commerce System
    Hu, Zhongyi
    Zheng, Xiaohai
    Xiao, Lei
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 24 - 29
  • [2] A New Trusted and Secured E-commerce Architeture for Cloud Computing
    Nafi, Kawser Wazed
    Kar, Tonny Shekha
    Hossain, Md. Amjad
    Hashem, M. M. A.
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [3] A trusted approach to e-commerce
    Antoniou, Giannakis
    Batten, Lynn
    Parampalli, Udaya
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 119 - +
  • [4] Reputation-oriented trustworthy computing in e-commerce environments
    Wang, Yan
    Lin, Kwei-Jay
    IEEE INTERNET COMPUTING, 2008, 12 (04) : 55 - 59
  • [5] A trusted method for self-proriling in e-commerce
    Pearson, S
    TRUST, REPUTATION, AND SECURITY: THEORIES AND PRACTICE, 2003, 2631 : 177 - 193
  • [6] A New Reputation Algorithm for Evaluating Trustworthiness in E-Commerce Context
    Rahimi, Hasnae
    El Bakkali, Hanan
    2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [7] An E-commerce Anonymous Attestation Model Based on Trusted Computing Theory
    Qu Youtian
    Zhong Lili
    Zou Huilai
    Liu Hua
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 356 - 361
  • [8] E-commerce and soft computing: Scopes of research
    Basak, Jayanta
    Kumar, Manoj
    IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 2001, 18 (04): : 283 - 293
  • [9] E-commerce and soft computing: Scopes of research
    Basak, J
    Kumar, M
    IETE TECHNICAL REVIEW, 2001, 18 (04) : 283 - 293
  • [10] The research on enterprise resources integration in E-commerce
    Qu Fenggeng
    Jiujingli
    Proceeding of the 2006 International Conference on Management of Logistics and Supply Chain, 2006, : 275 - 279