-
21
Situation-aware trust management in multi-agent systems
Published 2014“…Over the past decade, the importance of trust management in computational intelligence research (e.g. in multi-agent systems (MASs)) has been recognized by both the industry and the academia. Computational trust models for evaluating the trustworthiness of a trustee agent based on a wide range of evidence have been proposed. …”
Get full text
Thesis -
22
Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions
Published 2022-09-01“…The time decay factor influences the credibility of computed trust over time. The policy-driven mechanism is employed to sift the devices and isolate the malicious ones. …”
Get full text
Article -
23
A Decentralized Blockchain-Based Trust Management Framework for Vehicular Ad Hoc Networks
Published 2022-03-01“…Besides, it outperforms the existing ones in terms of the accuracy of computed trust metrics, particularly for malicious vehicles.…”
Get full text
Article -
24
A hybrid trust computing approach for IoT using social similarity and machine learning.
Published 2022-01-01“…In this paper, we compute trust in social IoT scenarios using a hybrid approach that combines a distributed computation technique and a global machine learning approach. …”
Get full text
Article -
25
New scientific fiction: the relapse into “philosophy of identity”
Published 2020-03-01“…The description of worlds captured by large computer trusts, in these new anticipation fictions, intentionally, makes use of social and scientific theories, in the speculative genre mood, connected with metafictional devices. …”
Get full text
Article -
26
PENGARUH KEPERCAYAAN DALAM MEDIASI PERCEIVED OF RISK TERHADAP NIAT BERBELANJA ONLINE DI MEDIA SOSIAL INSTAGRAM (STUDI PADA WANITA DI KOTA PADANG)
Published 2021-01-01“…Shopping online on social media Instagram, consumers only see products in photos, catalogs and videos without knowing the quality of the product, because buyers do not meet directly with the seller only through gadgets, cellphones or computers. Trust is the main capital in online shopping. …”
Get full text
Article -
27
A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments
Published 2015-07-01“…A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue), priority value as evaluated by fuzzy inference system (FIS) and finally generate access decision to each crowd-worker. …”
Get full text
Article -
28
Trust management in cloud computing: A critical review
Published 2011“…Cloud computing has been attracting the attention of several researchers both in the academia and the industry as it provides many opportunities for organizations by offering a range of computing services.For cloud computing to become widely adopted by both the enterprises and individuals, several issues have to be solved.A key issue that needs special attention is security of clouds, and trust management is an important component of cloud security.In this paper, the authors look at what trust is and how trust has been applied in distributed computing. Trust models proposed for various distributed system has then been summarized.The trust management systems proposed for cloud computing have been investigated with special emphasis on their capability, applicability in practical heterogonous cloud environment and implementabilty. …”
Get full text
Article -
29
A memoryless trust computing mechanism for cloud computing
Published 2012“…Trust management systems play an important role in identifying the quality of service in distributed systems. In cloud computing, trust systems can be used to identify service providers who would meet the requirements of customers.Several trust computing mechanisms have been proposed in literature based on various trust metrics. …”
Book Section -
30
Factors Influencing Clinician Trust in Predictive Clinical Decision Support Systems for In-Hospital Deterioration: Qualitative Descriptive Study
Published 2022-05-01“…Concepts from the human-computer trust conceptual framework—perceived understandability and perceived technical competence (ie, perceived accuracy)—were found to influence clinician trust in predictive CDSSs for in-hospital deterioration. …”
Get full text
Article -
31
Explicating the roles of self-disclosure and task objectivity in trust and relationship development with embodied conversational agents
Published 2023“…While a vast group of studies has investigated the design addressing both task-solving skills and social capabilities (such as self-disclosure), the extent to which the mechanism of human-computer trust and relationship development has remained inconclusive. …”
Get full text
Thesis-Master by Research -
32
Fuzzy Logic Based DSR Trust Estimation Routing Protocol for MANET Using Evolutionary Algorithms
Published 2021-01-01“…In this work, a Trust centered routing protocol is suggested, since trust plays a vital role in computing path in mobile ad hoc networks (MANETs). Estimating and computing trust encourages cooperation in mobile ad hoc networks (MANETs). …”
Get full text
Article -
33
Development of trust based access control models using fuzzy logic in cloud computing
Published 2022-05-01Get full text
Article -
34
PECSA: Practical Edge Computing Service Architecture Applicable to Adaptive IoT-Based Applications
Published 2021-11-01“…Moreover, when cooperated with the edge platform, the edge networks compute trust values of linked nodes and find the best collaborative approach for each user to meet various service requirements. …”
Get full text
Article -
35
AgriTrust—A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things
Published 2020-10-01“…The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. …”
Get full text
Article -
36
Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks
Published 2024-03-01“…The existing black hole attack detection methods in Green IoT rely on static thresholds and unreliable metrics to compute trust scores. This results in increasing false positive rates, especially in resource-constrained IoT environments. …”
Get full text
Article -
37
Behavior and feedback based trust computation in cloud environment
Published 2022-09-01Get full text
Article -
38
A Survey of Trust Management in the Internet of Vehicles
Published 2021-09-01“…Furthermore, a threshold is specified manually that classifies the vehicles into honest and dishonest vehicles relying on the computed trust. Moreover, adversary models as an extension to trust management models in order to tackle the variants of insider attacks are being extensively emphasized in the literature. …”
Get full text
Article -
39
A Promising Integration of SDN and Blockchain for IoT Networks: A Survey
Published 2023-01-01“…Second, we categorize the relevant studies according to six key implementation objectives and ideas that combine BC, SDN, and IoT technologies to create smart, secure, and effective frameworks: Security, computing paradigms (edge and fog computing), trust management, access control & authentication, privacy, and networking. …”
Get full text
Article -
40
Privacy Preserving Technologies in US Education.
Published 2022-08-01“…We describe most familiar and tested PPTs including secure hashing, secure multiparty computation, trusted execution environments, and differential privacy, highlighting actual applications in schools, departments of education, and educational technology nonprofits and companies. …”
Get full text
Article