نتایج جستجو برای: trust aggregation

تعداد نتایج: 124329  

Journal: :Inf. Sci. 2010
James Caverlee Ling Liu Steve Webb

0020-0255/$ see front matter 2009 Elsevier Inc doi:10.1016/j.ins.2009.06.027 * Corresponding author. Tel.: +1 979 209 9998 (o E-mail addresses: [email protected] (J. Caver Social information systems are a promising new paradigm for large-scale distributed information management, as evidenced by the success of large-scale information sharing communities, social media sites, and web-based soci...

Journal: :Information Systems Frontiers 2006
Jane Yung-jen Hsu Kwei-Jay Lin Tsung-Hsiang Chang Chien-Ju Ho Han-Shen Huang Wan-rong Jih

Distributed trust management addresses the challenges of eliciting, evaluating and propagating trust for service providers on the distributed network. By delegating trust management to brokers, individual users can share their feedbacks for services without the overhead of maintaining their own ratings. This research proposes a two-tier trust hierarchy, in which a user relies on her broker to p...

2012
Eva-Maria Nordström Karin Öhman Ljusk Ola Eriksson

Many forest planning situations are complex; multiple criteria of different natures have to be considered and several stakeholders or social groups may be involved. An approach that is increasingly used in these complex situations is the combination of multiple criteria decision analysis (MCDA) and participatory planning. A crucial part of MCDA processes involving more than one decision maker i...

Journal: :Computer Networks 2013
Sabrina Sicari Alberto Coen-Porisini Roberto Riggio

Typical wireless sensor networks (WSNs) applications are characterized by a certain number of different requirements such as: data accuracy, localization, reputation, security, and confidentiality. Moreover, being often battery powered, WSNs face the challenge of ensuring privacy and security despite power consumption limitations. When the application scenario allows their use, data aggregation...

2016
ALI AHAMMED

As we have limited computational power and energy resources ,aggregation of data from the multiple sensor node is done at the aggregator node is usually accomplished by simple method is averaging. WSNs are usually unattended and without tamper resistant hardware, they are highly vulnerable to such as node compromising attacks. thus making it necessary to ascertain data trustworthiness and reput...

2007
Till J. Winkler Jochen Haller Henner Gimpel Christof Weinhardt

In today's Internet economy, new business models emerge to respond to business opportunities that one organization alone can not exploit. Virtual organizations (VOs) are a prominent example for such models currently investigated in, e.g., collaborative engineering and aggregated services provisioning. The partner selection process is a problem that needs to be swiftly performed for a VO to beco...

2012
Xinxin Fan Ling Liu Mingchu Li Zhiyuan Su

This paper argues that trust and reputation models should take into account not only direct experiences (local trust) and experiences from the circle of ”friends”, but also be attack resilient by design in the presence of dishonest feedbacks and sparse network connectivity. We first revisit EigenTrust, one of the most popular reputation systems to date, and identify the inherent vulnerabilities...

2009
Moshe Tennenholtz

In the classical theory of social choice, a theory developed by game-theorists and theoretical economists, we consider a set of agents (voters) and a set of alternatives. Each agent ranks the alternatives, and the major aim is to find a good way to aggregate the individual preferences into a social preference. The major tool offered in this theory is the axiomatic approach: study properties (te...

Journal: :Computer Science and Information Systems (FedCSIS), 2019 Federated Conference on 2022

2008
YAFEI YANG

Trust, a subject extensively studied in sociology and psychology, has long been known as the driving force for collaboration in social communities. Recently, trust is recognized as a key component in new security tools to defend computer networks, such as rating system in e-commerce networks, peer-to-peer networks, mobile ad hoc networks, and wireless sensor networks, against possible attacks. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید