A New Trust Chain Security Evaluation Model and Tool.
Wei HuDongyao JiTing WangGang YaoPublished in: SecureComm (2) (2014)
Keyphrases
- evaluation model
- evaluation method
- evaluation process
- quality evaluation
- artificial immune network
- fuzzy theory
- fuzzy analytic hierarchy process
- fuzzy comprehensive evaluation
- evidence theory
- access control
- trust management
- public key infrastructure
- trusted computing
- trust relationships
- security services
- security issues
- information security
- trust negotiation
- fourth party logistics
- analytic hierarchy process
- key management
- trust model
- network security
- bp neural network
- analytical hierarchy process
- knowledge base
- computational intelligence
- university libraries
- evolutionary algorithm