Sciweavers

391 search results - page 5 / 79
» Attack-Resistance of Computational Trust Models
Sort
View
ITRUST
2005
Springer
14 years 1 months ago
Trust Management Survey
Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in ...
Sini Ruohomaa, Lea Kutvonen
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 2 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
IAT
2010
IEEE
13 years 5 months ago
Trustworthiness Tendency Incremental Extraction Using Information Gain
Computational trust systems are getting popular in several domains such as social networks, grid computing and business-to-business systems. However, the estimation of the trustwo...
Joana Urbano, Ana Paula Rocha, Eugenio Oliveira
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
14 years 1 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...