نتایج جستجو برای: trust aggregation

تعداد نتایج: 124329  

2005
Junbeom Hur Yoonho Lee Seongmin Hong Hyunsoo Yoon

Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devices are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks...

2009
Chris Cornelis Patricia Victor Enrique Herrera-Viedma

In this paper, we focus on the aggregation problem for (trust, distrust) couples in trust networks. In particular, we study approaches based on classical and induced ordered weighted averaging (OWA) operators.

2009
John T. Rickard Samuel N. Hamilton Wendy L. Hamilton

Trust is a fundamental concept that is critical in human decision processes in almost all domains, but of particular relevance in the domain of computer security. In many computer systems deployed today, trust is only modeled indirectly through a serious of formal rules and regulations describing when privileges are to be granted or revoked. Recently, research has been conducted into the area o...

2008
Roberto Ghiselli Ricci Marco Viviani

The study of trust management in multi-agent system, especially distributed, has grown over the last years. Trust is a complex subject that has no general consensus in literature, but has emerged the importance of reasoning about it computationally. Reputation systems takes into consideration the history of an entity’s actions/behavior in order to compute trust, collecting and aggregating ratin...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده اقتصاد و علوم اجتماعی 1389

چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...

Journal: :J. UCS 2011
Nabila Labraoui Abdelhak Mourad Guéroui Makhlouf Aliouat Jonathan Petit

In-network data aggregation has a great impact on the energy consumption in largescale wireless sensor networks. However, the resource constraints and vulnerable deployment environments challenge the application of this technique in terms of security and efficiency. A compromised node may forge arbitrary aggregation value and mislead the base station into trusting a false reading. In this paper...

2010
P. Victor M. De Cock E. Herrera-Viedma

Trust and distrust are two increasingly important metrics in social networks. Since many of these networks are very large, it is only natural that not all users know each other. To this aim, propagation and aggregation operators are often used to estimate (dis)trust relations for users that are not directly connected through the network. In this paper, we introduce bilattice-based aggregation a...

2016
Joana Urbano Ana Paula Rocha Eugénio Oliveira

Trust estimation of partner agents is considered a fundamental step in the process of selecting partners. In previous work, we proposed SinAlpha, an agent-based aggregation engine that computes the trustworthiness of candidate partners by aggregating their historical contractual evidences, taking into account important properties of the dynamics of trust. In this paper, we further argue on the ...

Journal: :Int. J. Communication Systems 2017
Hengchuan Tan Maode Ma Houda Labiod Peter Han Joo Chong Jun Zhang

Trust models that rely on recommendation trusts are vulnerable to badmouthing and ballot-stuffing attacks. To cope with these attacks, existing trust models employ different trust aggregation techniques to process the recommendation trusts and combine them with the direct trust values to form a combined trust value. However, these trust models are biased as recommendation trusts that deviate to...

2014
Geetha V K. Chandrasekaran

The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptography techniques can ensure confidentiality, integrity and authentication. However, wireless sensor network also needs to deal with inside and outside attackers. To deal with outside ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید