نتایج جستجو برای: trust in management
تعداد نتایج: 17141552 فیلتر نتایج به سال:
Risk and trust are interlocking issues, thrown into the social, political and managerial foreground as governments pursue their responses to the development of the information society. Transformations in the ways in which information is gathered, stored, transmitted and shared throughout government and the wider polity raise a variety of concerns across the spectrum of scholarship and public co...
a key challenge to brand managers is how to gain a better understanding of the relationship between brand and customer loyalty constructs. researchers have recognized that brand identity plays a key role in brand management. the purpose of this paper is to investigate the effect of brand identity and brand identification on brand loyalty through perceived value, customer satisfaction, and trust...
This paper concerns reputation and trust computation in vehicular ad hoc networks (VANETs). Various survey and implemented work has been studied and analyzed to form a new survey on trust model to VANET. In this survey it is observed that there are lot of new techniques are possible to form a new trust model in VANET to provide better security with trust concern over the entire environment of t...
The development of complex applications that use the Peer-to-Peer computing model is restrained by security and trust management concerns, despite evident performance benefits. An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms. The article presents ...
Today, the Internet trust is a critical framework that forms fundamental premise for network security. Several identity federations are deployed to embody classic theory of framework. However, in an emerging blockchain-based decentralized system, we need model dynamically grown/shrunken trust. This paper models elasticity by formalizing PDP(policy decision point)s enrolling entities and introdu...
Most of today’s enterprises are open in a competitive market worldwide and dependent on distributed information infrastructure across various geospatial location and various cyber spatial location as well with a purpose of offering ready and effective services to customers. But this decentralization comes at the cost of security. The distributed computing framework is vulnerable to attacks from...
Security policies of large organizations cannot be expressed in the access control policy language defined by the SQL standard and provided by widely used relational database systems, because that language does not support the decentralized policies that are common in large organizations. Trust management frameworks support decentralized policies but generally have not been designed to integrat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید