نتایج جستجو برای: keywords trust
تعداد نتایج: 2024769 فیلتر نتایج به سال:
Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure. MANET is vulnerable to security threats due to network’s limited security, dynamic topology, scalability and the lack of central management. The Quality of Service (QoS) routing in such networks is limited by network breakage caused by node mobility or nodes energy depletion...
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their n...
A mobile ad-hoc network (MANET) is a peer-to peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations, these networks are self-configuring. In this paper, a new algorithm is proposed to calculate the trust and QoS metric estimation into establishing a trustbased QoS model. In this model, the estimate the trust deg...
The last years have seen a number of proposals to incorporate Security Engineering into mainstream Software Requirements Engineering. However, capturing trust and security requirements at an organizational level (as opposed to a design level) is still an open problem. This paper presents a formal framework for modeling and analyzing security and trust requirements. It extends the Tropos methodo...
Trust of an enterprise distributed real-time and embedded (DRE) system indicates conformance of this system’s behavior to its published specification. As enterprise DRE systems migrate toward open-architectures that promote system design and implementation via (third-party) components and the composition of such components, it is becoming more critical to evaluate trust at multiple levels of gr...
Currently, the cloud computing is hot research both in scholars and enterprise, because of its good features such as low investment, easy maintenance, flexibility and fast deployment, reliable service. But to truly implement cloud computing, we need to gradually improve it in academic, legal and institutional. Especially, the issue of trust is one of the biggest obstacles for the development of...
Trust management and Reputation models are becoming integral part of Internet based applications such as CSCW, E-commerce and Grid Computing. Also the trust dimension is a significant social structure and key to social relations within a collaborative community. Collaborative Decision Making (CDM) is a difficult task in the context of distributed environment (information across different geogra...
Networked environments which provide platforms for business organizations are configured in different forms depending on many factors including life time, member characteristics, communication structure, and business objectives, among others. With continuing advances in digital technologies the distance has become a less barrier for business minded collaboration among organizations. With the ne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید