نتایج جستجو برای: trust in management

تعداد نتایج: 17141552  

Over 2 million people worldwide suffer from life-threatening emergencies and natural disasters, annually. By participating in crisis management processes, different people and various sectors of the society can reduce the country's vulnerability to natural disasters. One of the most important issues in crisis management is the participation of people in all processes of the crisis management cy...

2014
Dr. R. Vadivel

In this paper, Access Aware Routing Protocol (AARP) towards Trust Management problem for Mobile Ad hoc Network (MANET) is proposed. In MANET, nodes periodically move over the terrain space with transmission range. In this research work a scheme to handle trust establishment and aggregation issues are proposed. Unlike trust management in previous schemes, trust management in MANET involves neigh...

2006
Yong Wang Vinny Cahill Elizabeth Gray Colin Harris Lejian Liao

Trust is an essential component for secure collaboration in uncertain environments. Trust management can be used to reason about future interactions between entities. In reputation-based trust management, an entity’s reputation is usually built on ratings from those who have had direct interactions with the entity. In this paper, we propose a Bayesian network based trust management model. In or...

Journal: :international journal of business and development studies 0

prior research has indicated that employee turnover is detrimental to both individuals and organisations. because a turnover intention in the workplace is detrimental, several factors have been suggested to better understand the reasons why employees may decide to leave their organisations. some of the organizational-related factors that have been considered by previous research include perceiv...

Journal: :Computer Networks 2014
Xin Kang Yongdong Wu

Nowadays, peer-to-peer (P2P) streaming systems have become a popular way to deliver multimedia content over the internet due to their low bandwidth requirement, high video streaming quality, and flexibility. However, P2P streaming systems are vulnerable to various attacks, especially pollution attacks, due to their distributed and dynamically changing infrastructure. In this paper, by exploring...

2009
Miroslav Novotný Filip Zavoral

The rapid growth of communication technologies in the past years has enabled development of collaborative peer-to-peer applications. The reliable collaborative application must implement some methods which help to detect malicious entities and avoid collaboration with them. Such systems are based on building trust relationships between entities; their design is difficult due to a decentralized ...

Journal: :Int. Arab J. Inf. Technol. 2003
Kanagaraj Krishna Mohd. Aizani Bin Maarof

The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In this paper we provide and discuss existing works on trust management models in the area of Multi Agent Systems and highlight the shortcomings. Our proposed model is not presented as the final solution to the issue. This new model will have a mechanism that allows...

2007
Ricardo Neisse Maarten Wegdam Marten van Sinderen Gabriele Lenzini

The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provisioning, privacy enforcement, and context information provisioning. Current trust management models address these trust aspects individually when in fact they are dependent on each other. In this paper we identify and ...

Journal: :J. Internet Serv. Inf. Secur. 2013
Guowei Wu Zuosong Liu Lin Yao Zhenzhen Xu Wei Wang

Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are selforganized. The open nature of WSNs makes them easily exposed to a variety of attacks and brings many security challenges. Furthermore, because of the potentially dynamic behavior of WSNs, there is hardly any infrastructure or centralized control. To enhance the security in WSNs, it is necessary to evalua...

Journal: :Humanities and Social Sciences quarterly 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید