Sciweavers

JCP
2008
104views more  JCP 2008»
13 years 10 months ago
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network
Trust mechanism will be an important trend in the field of security for open network. But, as an important factor risk is little considered in trust model. In this paper, Further w...
Lin Zhang, Ruchuan Wang, Haiyan Wang
IJSN
2006
95views more  IJSN 2006»
13 years 10 months ago
Building trust in peer-to-peer systems: a review
: The decentralised, cooperative and self-organising nature of Peer-to-Peer (P2P) systems help to mitigate and even overcome many challenges which overwhelm the traditional client-...
Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli
IJNSEC
2006
71views more  IJNSEC 2006»
13 years 10 months ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella
IJMMS
2006
94views more  IJMMS 2006»
13 years 10 months ago
A framework for understanding trust factors in web-based health advice
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper ...
Elizabeth Sillence, Pamela Briggs, Peter Harris, L...
IJISEC
2006
88views more  IJISEC 2006»
13 years 10 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
AIM
2006
13 years 11 months ago
Toward developing web based support systems for enhanced trust among value web chains
: This paper explores the use of the web to build trust among value web chains. Businesses tend to concentrate on the traditional tangible elements of the supply chain and ignore t...
Mokhtar Amami, Jacques Thevenot
AAMAS
2006
Springer
13 years 11 months ago
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested and when trusted to perform an action for another...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
ECR
2010
112views more  ECR 2010»
13 years 11 months ago
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Abstract To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy ...
Reid Kerr, Robin Cohen
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 11 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 11 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar