Bonjour, ceci est un commentaire. Pour supprimer un commentaire, connectez-vous et affichez les commentaires de cet article. Vous pourrez alors…
T. Wen and C. Zhong, “Research of subjective trust management model based on the fuzzy set theory,” Journal of Software, Vol. 14, No. 8, pp. 1401-1408, 2003.
- Listed: 11 May 2026 21 h 11 min
Description
T. Wen and C. Zhong, “Research of subjective trust management model based on the fuzzy set theory,” Journal of Software, Vol. 14, No. 8, pp. 1401-1408, 2003.
**T. Wen and C. Zhong, “Research of subjective trust management model based on the fuzzy set theory,” *Journal of Software*, Vol. 14, No. 8, pp. 1401‑1408, 2003.**
—
### Introduction: Why Trust Matters in Modern Software
In today’s hyper‑connected world, **trust management** has become a cornerstone of secure software design, cloud services, and collaborative platforms. While traditional binary trust models (trusted vs untrusted) are easy to implement, they often fall short when dealing with the nuanced, human‑centric perception of reliability. This is where the pioneering work of **T. Wen and C. Zhong** shines. Their 2003 paper introduced a **subjective trust management model** that leverages **fuzzy set theory** to capture the gray areas of trust, offering a more realistic and flexible approach for developers and security analysts alike.
### The Core Idea: Fuzzy Sets Meet Trust Evaluation
Fuzzy set theory, originally proposed by Lotfi Zadeh, allows elements to belong to a set with varying degrees of membership rather than a simple “yes” or “no.” Wen and Zhong applied this concept to trust by treating trust scores as **continuous values** ranging from 0 (completely untrustworthy) to 1 (fully trustworthy). This **subjective trust model** accommodates uncertainties such as incomplete information, changing user behavior, and contextual factors that traditional crisp models ignore.
#### Key Components of the Model
1. **Trust Attributes** – Metrics like reliability, reputation, and competence are identified and quantified.
2. **Membership Functions** – Each attribute is mapped to a fuzzy membership curve (e.g., triangular or Gaussian) that reflects how strongly a particular observation supports a trust level.
3. **Aggregation Rules** – Using fuzzy operators (AND, OR, weighted average), the model combines multiple attributes into a single **subjective trust score**.
4. **Decision Thresholds** – System designers set flexible thresholds that trigger actions such as granting access, raising alerts, or requesting additional verification.
### Practical Applications: From E‑Commerce to IoT
The fuzzy‑based trust model is not just an academic exercise; it has concrete implications across several domains:
– **E‑commerce platforms** can evaluate seller credibility more accurately, reducing fraud and improving buyer confidence.
– **Internet of Things (IoT) ecosystems** benefit from dynamic trust assessments of devices, helping prevent malicious nodes from compromising the network.
– **Collaborative software** (e.g., version control, code review tools) can prioritize contributions from highly trusted developers while still allowing newcomers to participate.
### Advantages Over Traditional Trust Models
| Traditional (Crisp) Model | Fuzzy Subjective Model (Wen & Zhong) |
|—————————|————————————–|
| Binary decision (trust / no trust) | Gradual trust levels (0‑1) |
| Rigid thresholds, easy to bypass | Adaptive thresholds, context‑aware |
| Poor handling of incomplete data | Robust to uncertainty and missing information |
| Limited scalability for complex attributes | Scalable with multiple fuzzy attributes |
These advantages translate into **enhanced security posture**, **greater user satisfaction**, and **lower false‑positive rates** in intrusion detection systems.
### Challenges and Future Directions
While the fuzzy trust model offers flexibility, it also introduces challenges:
– **Designing accurate membership functions** requires domain expertise and may involve trial‑and‑error.
– **Computational overhead** can increase in large‑scale systems, though modern hardware and optimized algorithms mitigate this.
– **Subjectivity** means that different administrators might configure the model differently, potentially leading to inconsistent policies.
Future research is already extending Wen and Zhong’s foundation with **machine‑learning‑driven fuzzy inference**, **dynamic adaptation** based on real‑time feedback, and **blockchain‑anchored trust records** for immutable provenance.
### Conclusion: A Timeless Contribution to Trust Management
Even two decades after its publication, the 2003 article by **T. Wen and C. Zhong** remains highly relevant. By marrying **subjective trust** with **fuzzy set theory**, the authors provided a versatile framework that addresses the complexities of human perception in digital interactions. For software engineers, security professionals, and researchers seeking a **robust, adaptable trust management solution**, revisiting this seminal work is a worthwhile investment.
—
#### SEO Keywords
subjective trust management, fuzzy set theory, trust model, software security, information security, trust evaluation, fuzzy logic, cybersecurity research, IoT trust, e‑commerce fraud prevention, adaptive security, trust metrics, trust aggregation, fuzzy inference, security architecture.
18 total views, 2 today
Sponsored Links
ITU-R (2004) ITU-R Radio Regulations, Edition 2004, Geneva. Kee C., Jun H.,...
ITU-R (2004) ITU-R Radio Regulations, Edition 2004, Geneva. Kee C., Jun H., Yun D., Kim B., Kim Y., Parkinson B.W., Langestein T., Pullen S., Lee […]
1 total views, 1 today
Cobb H.S. (1997) GPS Pseudolites: Theory, design, and applications. PhD Dis...
Cobb H.S. (1997) GPS Pseudolites: Theory, design, and applications. PhD Dissertation, Stanford University. Okay, let’s see. The user wants me to write a blog post […]
1 total views, 1 today
Bartone C. (1999) Multipath Considerations for Ground based Ranging sources...
Bartone C. (1999) Multipath Considerations for Ground based Ranging sources, Proceedings of the ION GPS’99, 14-17 September 1999, Nashville, TN. **Bartone C. (1999) Multipath Considerations […]
1 total views, 1 today
Bartone C, Kiran S, Dickman J (2002) Wideband APL for CAT II/III LAAS ̵...
Bartone C, Kiran S, Dickman J (2002) Wideband APL for CAT II/III LAAS – Research and Development Status Presentation to the RTCA SC-159 WG-4 Meeting, […]
2 total views, 2 today
Barnes et al. (2004) Indoor industrial machine guidance using Locata: a pil...
Barnes et al. (2004) Indoor industrial machine guidance using Locata: a pilot study at BlueScope Steel. 60th Annual Meeting of the U.S. Inst. of Navigation, […]
2 total views, 2 today
Altmayer C. (1998) Experiences using pseudolites to augment GNSS in urban e...
Altmayer C. (1998) Experiences using pseudolites to augment GNSS in urban environment, Proceedings of ION-GPS-98, Nashville, US, September 15-18, 981-991. **”Altmayer C. (1998) Experiences using […]
No views yet
Abt T.L., Soualle F., Martin S. (2007) Optimal Pulsing Schemes for Galileo ...
Abt T.L., Soualle F., Martin S. (2007) Optimal Pulsing Schemes for Galileo Pseudolite Signals, Journal of Global Positioning Systems, 6(2): 133-141. Okay, the user wants […]
2 total views, 2 today
Soellner M. and Erhard Ph. (2003), Comparison of AWGN Code Tracking Accurac...
Soellner M. and Erhard Ph. (2003), Comparison of AWGN Code Tracking Accuracy for Alternative-BOC, Complex-LOC and Complex-BOC Modulation Options in Galileo E5-Band, in Proceedings of […]
1 total views, 1 today
Sleewaegen J. M. et al (2004), Galileo AltBOC Receiver, in Proceedings of I...
Sleewaegen J. M. et al (2004), Galileo AltBOC Receiver, in Proceedings of ION GNSS 2004, Rotterdam, Holland, 16-19 May 2004. **Sleewaegen J. M. et al (2004), […]
1 total views, 1 today
Ries L. et al (2003), New Investigations on Wideband GNSS2 Signals, in Proc...
Ries L. et al (2003), New Investigations on Wideband GNSS2 Signals, in Proceedings of ENC GNSS 2003, Graz, Austria, April 2003. Okay, the user wants […]
1 total views, 1 today
ITU-R (2004) ITU-R Radio Regulations, Edition 2004, Geneva. Kee C., Jun H.,...
ITU-R (2004) ITU-R Radio Regulations, Edition 2004, Geneva. Kee C., Jun H., Yun D., Kim B., Kim Y., Parkinson B.W., Langestein T., Pullen S., Lee […]
1 total views, 1 today
Cobb H.S. (1997) GPS Pseudolites: Theory, design, and applications. PhD Dis...
Cobb H.S. (1997) GPS Pseudolites: Theory, design, and applications. PhD Dissertation, Stanford University. Okay, let’s see. The user wants me to write a blog post […]
1 total views, 1 today
Bartone C. (1999) Multipath Considerations for Ground based Ranging sources...
Bartone C. (1999) Multipath Considerations for Ground based Ranging sources, Proceedings of the ION GPS’99, 14-17 September 1999, Nashville, TN. **Bartone C. (1999) Multipath Considerations […]
1 total views, 1 today
Bartone C, Kiran S, Dickman J (2002) Wideband APL for CAT II/III LAAS ̵...
Bartone C, Kiran S, Dickman J (2002) Wideband APL for CAT II/III LAAS – Research and Development Status Presentation to the RTCA SC-159 WG-4 Meeting, […]
2 total views, 2 today
Barnes et al. (2004) Indoor industrial machine guidance using Locata: a pil...
Barnes et al. (2004) Indoor industrial machine guidance using Locata: a pilot study at BlueScope Steel. 60th Annual Meeting of the U.S. Inst. of Navigation, […]
2 total views, 2 today
Altmayer C. (1998) Experiences using pseudolites to augment GNSS in urban e...
Altmayer C. (1998) Experiences using pseudolites to augment GNSS in urban environment, Proceedings of ION-GPS-98, Nashville, US, September 15-18, 981-991. **”Altmayer C. (1998) Experiences using […]
No views yet
Abt T.L., Soualle F., Martin S. (2007) Optimal Pulsing Schemes for Galileo ...
Abt T.L., Soualle F., Martin S. (2007) Optimal Pulsing Schemes for Galileo Pseudolite Signals, Journal of Global Positioning Systems, 6(2): 133-141. Okay, the user wants […]
2 total views, 2 today
Soellner M. and Erhard Ph. (2003), Comparison of AWGN Code Tracking Accurac...
Soellner M. and Erhard Ph. (2003), Comparison of AWGN Code Tracking Accuracy for Alternative-BOC, Complex-LOC and Complex-BOC Modulation Options in Galileo E5-Band, in Proceedings of […]
1 total views, 1 today
Sleewaegen J. M. et al (2004), Galileo AltBOC Receiver, in Proceedings of I...
Sleewaegen J. M. et al (2004), Galileo AltBOC Receiver, in Proceedings of ION GNSS 2004, Rotterdam, Holland, 16-19 May 2004. **Sleewaegen J. M. et al (2004), […]
1 total views, 1 today
Ries L. et al (2003), New Investigations on Wideband GNSS2 Signals, in Proc...
Ries L. et al (2003), New Investigations on Wideband GNSS2 Signals, in Proceedings of ENC GNSS 2003, Graz, Austria, April 2003. Okay, the user wants […]
1 total views, 1 today
Recent Comments