نتایج جستجو برای: keywords trust

تعداد نتایج: 2024769  

2015
K. Geetha

Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure. MANET is vulnerable to security threats due to network’s limited security, dynamic topology, scalability and the lack of central management. The Quality of Service (QoS) routing in such networks is limited by network breakage caused by node mobility or nodes energy depletion...

2012
Revathi Venkataraman M. Pushpalatha T. Rama Rao

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their n...

Journal: :Journal of the Medical Library Association : JMLA 2015

Journal: :Academic Medicine 1990

2015
Mohammed Jaffer Dr. Revathi

A mobile ad-hoc network (MANET) is a peer-to peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations, these networks are self-configuring. In this paper, a new algorithm is proposed to calculate the trust and QoS metric estimation into establishing a trustbased QoS model. In this model, the estimate the trust deg...

2004
Paolo Giorgini Fabio Massacci John Mylopoulos Nicola Zannone

The last years have seen a number of proposals to incorporate Security Engineering into mainstream Software Requirements Engineering. However, capturing trust and security requirements at an organizational level (as opposed to a design level) is still an open problem. This paper presents a formal framework for modeling and analyzing security and trust requirements. It extends the Tropos methodo...

2011
Dimuthu U. Gamage Lahiru S. Gallege Rajeev R. Raje

Trust of an enterprise distributed real-time and embedded (DRE) system indicates conformance of this system’s behavior to its published specification. As enterprise DRE systems migrate toward open-architectures that promote system design and implementation via (third-party) components and the composition of such components, it is becoming more critical to evaluate trust at multiple levels of gr...

2012
Ch.Naveen Kumar Reddy G.Vishnu Murthy

Currently, the cloud computing is hot research both in scholars and enterprise, because of its good features such as low investment, easy maintenance, flexibility and fast deployment, reliable service. But to truly implement cloud computing, we need to gradually improve it in academic, legal and institutional. Especially, the issue of trust is one of the biggest obstacles for the development of...

2009
K. R. Anandakumar

Trust management and Reputation models are becoming integral part of Internet based applications such as CSCW, E-commerce and Grid Computing. Also the trust dimension is a significant social structure and key to social relations within a collaborative community. Collaborative Decision Making (CDM) is a difficult task in the context of distributed environment (information across different geogra...

2015
Simon Samwel Msanjila

Networked environments which provide platforms for business organizations are configured in different forms depending on many factors including life time, member characteristics, communication structure, and business objectives, among others. With continuing advances in digital technologies the distance has become a less barrier for business minded collaboration among organizations. With the ne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید