{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:46:16Z","timestamp":1770032776178,"version":"3.49.0"},"reference-count":41,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T00:00:00Z","timestamp":1614124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,10,14]]},"abstract":"<jats:p>The cross-trust domain environment in which heterogeneous identity alliances are located often does not have a completely trusted centralized trust root, and different trust domains and entities also have specific security requirements. In view of the above problems, we believe that trust measurement of cross-domain identities based on risk assessment is an effective method to achieve decentralized proof of user identities in heterogeneous cyberspace. There are various risk assessment models. We choose the more mature attack graph theory in the existing research to apply to the new field of cross-trust domain management of heterogeneous identities. We propose an attribute attack graph evaluation model to evaluate cross-domain identities through risk measurement of attributes. In addition, heterogeneous identity alliances also have architectural risks, especially the risk of decentralized underlying structures. In response to this problem, we identify the risk of the identity alliance infrastructure, and combine the risk assessment and presentation system design to verify the principle.<\/jats:p>","DOI":"10.3233\/jifs-189729","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T12:04:25Z","timestamp":1614341065000},"page":"4691-4704","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Heterogeneous identity trust management method based on risk assessment"],"prefix":"10.1177","volume":"41","author":[{"given":"Wenye","family":"Zhu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Chengxiang","family":"Tan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Qian","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"given":"Ya","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]}],"member":"179","published-online":{"date-parts":[[2021,2,24]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"BachenheimerS.I. DowdingK. and SkipworthC. Identity theft and fraud protection system and method U.S. Patent 9 582 802 Feb. 28 2017."},{"issue":"8","key":"e_1_3_2_3_2","article-title":"A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty","volume":"3","author":"Duan Y.","year":"2018","unstructured":"DuanY., CaiY., WangZ., et al., A Novel Network Security Risk Assessment Approach by Combining Subjective and Objective Weights under Uncertainty, Applied Sciences3(8) (2018).","journal-title":"Applied Sciences"},{"key":"e_1_3_2_4_2","unstructured":"BrameR. Static risk factors and criminal recidivism Handbook on Risk and Need Assessment. Routledge (2016) 83\u2013108."},{"issue":"11","key":"e_1_3_2_5_2","first-page":"3911","article-title":"Security risk assessment based on bayesian multi-step attack graphs","volume":"11","author":"Yang Y.","year":"2015","unstructured":"YangY., JinS. and FangB., Security risk assessment based on bayesian multi-step attack graphs, Journal of Computational Information Systems11(11) (2015), 3911\u20133918.","journal-title":"Journal of Computational Information Systems"},{"issue":"13","key":"e_1_3_2_6_2","first-page":"519","article-title":"Distributed attack graph generation","volume":"5","author":"Kaynar K.","year":"2015","unstructured":"KaynarK. and SivrikayaF., Distributed attack graph generation, IEEE Transactions on Dependable and Secure Computing5(13) (2015), 519\u2013532.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"CookK. ShawT. HawrylakP. et al. Scalable attack graph generation in Proceedings of the 11th Annual Cyber and Information Security Research Conference ACM Oak Ridge TN USA (2016) 21.","DOI":"10.1145\/2897795.2897821"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11628-014-0239-9"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","unstructured":"BartheG. Gr\u00e9goireB. and SchmidtB. Automated proofs of pairing-based cryptography in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ACM Denver CO USA (2015) 1156\u20131168.","DOI":"10.1145\/2810103.2813697"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"HamdiA.A.-J. and TawfikA.S. Transparent predictive modelling of catalytic hydrodesulfurization using an interval type-2 fuzzy logic Journal of Cleaner Production (2019) 231.","DOI":"10.1016\/j.jclepro.2019.05.224"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","unstructured":"LampertiG. Temporal determinization of mutating finite automata: Reconstructing or restructuring Software: Practice and Experience (2020) 50.","DOI":"10.1002\/spe.2776"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","unstructured":"AhmedM. and XiangY. Trust Ticket Deployment: A Notion of a Data Owner\u2019s Trust in Cloud Computing in IEEE International Conference on Trust IEEE Liverpool UK (2012).","DOI":"10.1109\/TrustCom.2011.17"},{"key":"e_1_3_2_13_2","unstructured":"KrishnamurthyB. BenderA.C. and WillsC.E. Tailored Protection of Personally Identifiable Information U.S. Patent Application 15 631 087 Oct. 5 (2017)."},{"issue":"12","key":"e_1_3_2_14_2","article-title":"Comment on \u2018Attribute-Based Signatures for Supporting Anonymous Certification\u2019 by N. Kaaniche and M. Laurent (ESORICS 2016)","volume":"12","author":"Damien V.","unstructured":"DamienV., Comment on \u2018Attribute-Based Signatures for Supporting Anonymous Certification\u2019 by N. Kaaniche and M. Laurent (ESORICS 2016), The Computer Journal12(12).","journal-title":"The Computer Journal"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","unstructured":"McDermottT.E. StephanE.G. and GibsonT.D. Alternative database designs for the distribution common information model in 2018 IEEE\/PES Transmission and Distribution Conference and Exposition (T&D) IEEE Denver CO USA (2018) 1\u20139.","DOI":"10.1109\/TDC.2018.8440470"},{"key":"e_1_3_2_16_2","unstructured":"ElingM. and WirfsJ.H. Modelling and management of cyber risk International Actuarial Association Life Section 2015."},{"key":"e_1_3_2_17_2","article-title":"A fuzzy-based trust model for flying ad hoc networks (FANETs)","volume":"3","author":"Singh K.","year":"2018","unstructured":"SinghK. and VermaA.K., A fuzzy-based trust model for flying ad hoc networks (FANETs), International Journal of Communication Systems3 (2018).","journal-title":"International Journal of Communication Systems"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-015-8002-5"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2754642"},{"key":"e_1_3_2_20_2","unstructured":"YuY.-J. LiuZ.-S. PanZ.-S. et al. The Network Attack Graph Analysis Based on Graph Kernel Journal of Military Communications Technology (2016)."},{"issue":"2","key":"e_1_3_2_21_2","first-page":"94","article-title":"An Evaluation Model for Outsourcing Information Systems Vulnerability based on AHP and PROMETHEEII","volume":"24","author":"Jian-Jun W.","year":"2010","unstructured":"Jian-JunW. and De-LiY., An Evaluation Model for Outsourcing Information Systems Vulnerability based on AHP and PROMETHEEII, Journal of Industrial Engineering and Engineering Management24(2) (2010), 94\u201399.","journal-title":"Journal of Industrial Engineering and Engineering Management"},{"key":"e_1_3_2_22_2","unstructured":"BassT. Multisensor data fusion for next generation distributed intrusion detection systems in Proceedings of the 1999 IRIS National Symposiumon Sensor and Data Fusion Washington USA (1999) 24\u201327."},{"key":"e_1_3_2_23_2","unstructured":"Li-NaZ. Zuo-ChangZ. and LiF. Research on hierarchical network security threat situation assessment Application Research of Computers (2011)."},{"key":"e_1_3_2_24_2","unstructured":"HengzhiC. JijunW. MingshengX.U. et al. Research on security detection algorithm applied to mobile operating systems Modern Electronics Technique (2019)."},{"issue":"4","key":"e_1_3_2_25_2","first-page":"327","article-title":"Power system static security assessment using self-organizing neural network","volume":"86","author":"Swarup K.S.","year":"2013","unstructured":"SwarupK.S. and CorthisP.B., Power system static security assessment using self-organizing neural network, Journal of the Indian Institute of Science86(4) (2013), 327.","journal-title":"Journal of the Indian Institute of Science"},{"issue":"2","key":"e_1_3_2_26_2","first-page":"119","article-title":"A Novel Approach for Pricing of Power Losses and Congestion Management Based on Static Security Assessment and Voltage Stability","volume":"1","author":"Razavi J.N.","year":"2013","unstructured":"RazaviJ.N., KalantarM. and MotaghiM., A Novel Approach for Pricing of Power Losses and Congestion Management Based on Static Security Assessment and Voltage Stability, International Journal of Management-Theory and Applications (IREMAN)1(2) (2013), 119\u2013125.","journal-title":"International Journal of Management-Theory and Applications (IREMAN)"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijeoe.2015010104"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2283064"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2183899"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11431-013-5173-x"},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","unstructured":"ChychykinaI. StyczynskiZ.A. HeydeC.O. et al. Power system instability prevention and remedial measures with online Dynamic Security Assessment in 2015 IEEE Eindhoven PowerTech Eindhoven Netherlands (2017) 1\u20135.","DOI":"10.1109\/PTC.2015.7232303"},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","unstructured":"KotenkoI. and ChechulinA. Common framework for attack modeling and security evaluation in SIEM systems in 2012 IEEE International Conference on Green Computing and Communications (GreenCom) Besancon France (2012) 94\u2013101.","DOI":"10.1109\/GreenCom.2012.24"},{"key":"e_1_3_2_34_2","first-page":"129","article-title":"Attack modeling and security evaluation in SIEM systems","volume":"8","author":"Kotenko I.","year":"2012","unstructured":"KotenkoI. and ChechulinA., Attack modeling and security evaluation in SIEM systems, International Transactions on Systems Science and Applications8 (2012), 129\u2013147.","journal-title":"International Transactions on Systems Science and Applications"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2013.64A003"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.57"},{"key":"e_1_3_2_37_2","first-page":"384","volume-title":"CyberSAGE: a tool for automatic security assessment of cyber-physical systems","author":"Vu A.H.","year":"2014","unstructured":"VuA.H., TippenhauerN.O., ChenB., et al., CyberSAGE: a tool for automatic security assessment of cyber-physical systems, Quantitative Evaluation of Systems, Springer International Publishing, (2014), 384\u2013387."},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","unstructured":"WangH. ChenZ. FengX. et al. Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process Wireless Personal Communications (2018).","DOI":"10.1007\/s11277-017-5202-3"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2015.0552"},{"issue":"12","key":"e_1_3_2_40_2","first-page":"2509","article-title":"Threat assessment method with uncertain attribute weight based on intuitionistic fuzzy multi-attribute decision","volume":"42","author":"Wang Y.","year":"2014","unstructured":"WangY., LiuS.Y., ZhangW., et al., Threat assessment method with uncertain attribute weight based on intuitionistic fuzzy multi-attribute decision, Tien Tzu Hsueh Pao\/acta Electronica Sinica42(12) (2014), 2509\u20132514.","journal-title":"Tien Tzu Hsueh Pao\/acta Electronica Sinica"},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","unstructured":"HeH. ZhangD. WangX. et al. Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks Journal of Sensors (2016).","DOI":"10.1155\/2016\/6047023"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.3103\/S014641161808014X"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189729","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189729","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T01:54:08Z","timestamp":1769997248000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,24]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,10,14]]}},"alternative-id":["10.3233\/JIFS-189729"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189729","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,24]]}}}