Showing 21 - 40 results of 42 for search '"computational trust"', query time: 0.11s Refine Results
  1. 21

    Situation-aware trust management in multi-agent systems by Yu, Han

    Published 2014
    “…Over the past decade, the importance of trust management in computational intelligence research (e.g. in multi-agent systems (MASs)) has been recognized by both the industry and the academia. Computational trust models for evaluating the trustworthiness of a trustee agent based on a wide range of evidence have been proposed. …”
    Get full text
    Thesis
  2. 22

    Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions by Vishwanath Garagad, Nalini Iyer

    Published 2022-09-01
    “…The time decay factor influences the credibility of computed trust over time. The policy-driven mechanism is employed to sift the devices and isolate the malicious ones. …”
    Get full text
    Article
  3. 23

    A Decentralized Blockchain-Based Trust Management Framework for Vehicular Ad Hoc Networks by Tahani Gazdar, Ohoud Alboqomi, Asmaa Munshi

    Published 2022-03-01
    “…Besides, it outperforms the existing ones in terms of the accuracy of computed trust metrics, particularly for malicious vehicles.…”
    Get full text
    Article
  4. 24

    A hybrid trust computing approach for IoT using social similarity and machine learning. by Amr M T Ali-Eldin

    Published 2022-01-01
    “…In this paper, we compute trust in social IoT scenarios using a hybrid approach that combines a distributed computation technique and a global machine learning approach. …”
    Get full text
    Article
  5. 25

    New scientific fiction: the relapse into “philosophy of identity” by Nicolás García

    Published 2020-03-01
    “…The description of worlds captured by large computer trusts, in these new anticipation fictions, intentionally, makes use of social and scientific theories, in the speculative genre mood, connected with metafictional devices. …”
    Get full text
    Article
  6. 26

    PENGARUH KEPERCAYAAN DALAM MEDIASI PERCEIVED OF RISK TERHADAP NIAT BERBELANJA ONLINE DI MEDIA SOSIAL INSTAGRAM (STUDI PADA WANITA DI KOTA PADANG) by Fenisi Resty, Mayroza Wiska

    Published 2021-01-01
    “…Shopping online on social media Instagram, consumers only see products in photos, catalogs and videos without knowing the quality of the product, because buyers do not meet directly with the seller only through gadgets, cellphones or computers. Trust is the main capital in online shopping. …”
    Get full text
    Article
  7. 27

    A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments by Olusegun Folorunso, Olusegun Afeez Mustapha

    Published 2015-07-01
    “…A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue), priority value as evaluated by fuzzy inference system (FIS) and finally generate access decision to each crowd-worker. …”
    Get full text
    Article
  8. 28

    Trust management in cloud computing: A critical review by Firdhous, Mohamed, Ghazali, Osman, Hassan, Suhaidi

    Published 2011
    “…Cloud computing has been attracting the attention of several researchers both in the academia and the industry as it provides many opportunities for organizations by offering a range of computing services.For cloud computing to become widely adopted by both the enterprises and individuals, several issues have to be solved.A key issue that needs special attention is security of clouds, and trust management is an important component of cloud security.In this paper, the authors look at what trust is and how trust has been applied in distributed computing. Trust models proposed for various distributed system has then been summarized.The trust management systems proposed for cloud computing have been investigated with special emphasis on their capability, applicability in practical heterogonous cloud environment and implementabilty. …”
    Get full text
    Article
  9. 29

    A memoryless trust computing mechanism for cloud computing by Firdhous, Mohamed, Ghazali, Osman, Hassan, Suhaidi

    Published 2012
    “…Trust management systems play an important role in identifying the quality of service in distributed systems. In cloud computing, trust systems can be used to identify service providers who would meet the requirements of customers.Several trust computing mechanisms have been proposed in literature based on various trust metrics. …”
    Book Section
  10. 30

    Factors Influencing Clinician Trust in Predictive Clinical Decision Support Systems for In-Hospital Deterioration: Qualitative Descriptive Study by Jessica M Schwartz, Maureen George, Sarah Collins Rossetti, Patricia C Dykes, Simon R Minshall, Eugene Lucas, Kenrick D Cato

    Published 2022-05-01
    “…Concepts from the human-computer trust conceptual framework—perceived understandability and perceived technical competence (ie, perceived accuracy)—were found to influence clinician trust in predictive CDSSs for in-hospital deterioration. …”
    Get full text
    Article
  11. 31

    Explicating the roles of self-disclosure and task objectivity in trust and relationship development with embodied conversational agents by Wang, Xuan

    Published 2023
    “…While a vast group of studies has investigated the design addressing both task-solving skills and social capabilities (such as self-disclosure), the extent to which the mechanism of human-computer trust and relationship development has remained inconclusive. …”
    Get full text
    Thesis-Master by Research
  12. 32

    Fuzzy Logic Based DSR Trust Estimation Routing Protocol for MANET Using Evolutionary Algorithms by Eswaramoorthy Vellingiri*, Vinoth Kumar Kalimuthu, Gopinath Samydurai

    Published 2021-01-01
    “…In this work, a Trust centered routing protocol is suggested, since trust plays a vital role in computing path in mobile ad hoc networks (MANETs). Estimating and computing trust encourages cooperation in mobile ad hoc networks (MANETs). …”
    Get full text
    Article
  13. 33
  14. 34

    PECSA: Practical Edge Computing Service Architecture Applicable to Adaptive IoT-Based Applications by Jianhua Liu, Zibo Wu

    Published 2021-11-01
    “…Moreover, when cooperated with the edge platform, the edge networks compute trust values of linked nodes and find the best collaborative approach for each user to meet various service requirements. …”
    Get full text
    Article
  15. 35

    AgriTrust—A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things by Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Hisham Almajed

    Published 2020-10-01
    “…The trust mechanism is an event-driven process that computes trust based on the pre-defined time interval and utilizes the previous trust degree to develop an absolute trust degree. …”
    Get full text
    Article
  16. 36

    Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks by Muhammad Ali Khan, Rao Naveed Bin Rais, Osman Khalid, Sanan Ahmad

    Published 2024-03-01
    “…The existing black hole attack detection methods in Green IoT rely on static thresholds and unreliable metrics to compute trust scores. This results in increasing false positive rates, especially in resource-constrained IoT environments. …”
    Get full text
    Article
  17. 37
  18. 38

    A Survey of Trust Management in the Internet of Vehicles by Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni

    Published 2021-09-01
    “…Furthermore, a threshold is specified manually that classifies the vehicles into honest and dishonest vehicles relying on the computed trust. Moreover, adversary models as an extension to trust management models in order to tackle the variants of insider attacks are being extensively emphasized in the literature. …”
    Get full text
    Article
  19. 39

    A Promising Integration of SDN and Blockchain for IoT Networks: A Survey by Stephen W. Turner, Murat Karakus, Evrim Guler, Suleyman Uludag

    Published 2023-01-01
    “…Second, we categorize the relevant studies according to six key implementation objectives and ideas that combine BC, SDN, and IoT technologies to create smart, secure, and effective frameworks: Security, computing paradigms (edge and fog computing), trust management, access control & authentication, privacy, and networking. …”
    Get full text
    Article
  20. 40

    Privacy Preserving Technologies in US Education. by Amy O'Hara, Stephanie Straus

    Published 2022-08-01
    “…We describe most familiar and tested PPTs including secure hashing, secure multiparty computation, trusted execution environments, and differential privacy, highlighting actual applications in schools, departments of education, and educational technology nonprofits and companies. …”
    Get full text
    Article