نتایج جستجو برای: hybrid trust model
تعداد نتایج: 2303760 فیلتر نتایج به سال:
With the gradually opening up of the network environment, trust mechanisms for information security are increasingly becoming an important prerequisite and foundation. Fuzziness and uncertainty are two basic features of trust. The qualitative and quantitative transform model--Cloud model is applied to the trust evaluation, and a Cloud-Based Weighted Trust Model (CBWT Model) is proposed, includi...
As Mobile ad hoc networks (MANETs) deployed in adversary environments. There are several routing protocols required to switch data from one node to another but nonetheless they venerable from variety of attacks. Trust model, an abstract psychological perceptive process, is one of the utmost multifarious perceptions in social relationships, concerning factors such as expectations, potentials and...
Using panel data method, this study examines the effects of different dimensions of social capital on innovation at the societal level across 21 countries (19 Asian countries plus Russia and Egypt) for the period 1995-2011. Dimensions of social capital that have been considered in this study include generalized trust, trust toward friends, institutional trust, civic participation, and norms of ...
In order to ensure the reliability and credibility of the data in wireless sensor networks (WSNs), this paper proposes a trust evaluation model and data fusion mechanism based on trust. First of all, it gives the model structure. Then, the calculation rules of trust are given. In the trust evaluation model, comprehensive trust consists of three parts: behavior trust, data trust, and historical ...
The paper deals with the phenomenal trust modelling. Required terms as trust, trust types, trust values and representation are mentioned. Fundamental description of phenomenal trust formation is presented as a form of impersonal trust which is complementary to interpersonal trust. Phenomenon is defined by the set of its possible exclusive values. The model describes the trust of a subject to pa...
With the emergence of the web of services and the semantic web, the need to find different methods of web service selection is gaining importance. Many efforts are focusing on the aspects of building the trust networks on the semantic web as well as agent-based models to utilize the trust in selecting the appropriate web service from a group of available services.The main direction of the resea...
This paper presents a certified confidence model which aims to ensure credibility for information exchanged among agents which inhabit an open environment. Generally speaking, the proposed environment shows a supplier agent b which delivers service for a customer agent a. The agent a returns to b a cryptographed evaluation r on the service delivered. The agent b will employ R as testimonial whe...
Pretty Good Privacy [3], or PGP, is a milestone in the history of cryptography, because for the first time it makes cryptography accessible to the wide mass of privacy hungry on-line public. PGP was created primarily for encrypting email messages using public or conventional key cryptography. The latter are used mainly to encrypt local files. With public key cryptography, PGP first generates a ...
Economic and social activity is increasingly reflected in operations on digital objects and network-mediated interactions between digital entities. Trust is a prerequisite for many of these interactions, particularly if items of value are to be exchanged. In this paper the probabilistic model and computational approaches found in some network reliability models are applied to modelling computat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید