A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Multiple Attribute Group Decision Making model for Web Software Trustworthiness
2014
Journal of Software
The evaluation of web software trustworthiness is an urgent issue to tackle in the background of internet and information society. ...
In this paper ,the Multiple Attribute Group Decision Making model for Web Software Trustworthiness (WST-MAGDM) is established: first, the ISO/IEC 0126 and web software attributes diagram is chose as the ...
ACKNOWLEDGMENT The research work presented in this paper was supported by National Natural Science Foundation of China (Grant Nos.71221061). ...
doi:10.4304/jsw.9.3.763-776
fatcat:ojhvleorajfcvkch274ekqebay
A fuzzy and probabilistic logic based representational model of Certain Trust model
2012
2012 International Conference on Informatics, Electronics & Vision (ICIEV)
In this paper we have proposed a new representational model for Certain Trust model based on probabilistic logic and fuzzy logic related with propositional logic to ensure trustworthiness of systems like ...
In the present trust models, particularly in Certain Trust model the main parameters of the representational model portion are uncertainty and average rating which are based on propositional logic where ...
It is easy for a software component or a software agent to handle mathematical representations of trust. For it, Bayesian representation of trust is appropriate. ...
doi:10.1109/iciev.2012.6317355
fatcat:q37k63wpyrbzdcvmggyfzddpau
The Software Trustworthiness Evaluation Model Based on Subjective Logic
2015
International Journal of Hybrid Information Technology
, consider the impact on the software trustworthiness, and build the software trustworthiness evaluation (STE) model with subjective logic. ...
Section 5 concludes the paper. 42 Copyright ⓒ 2015 SERSC The Process of the Software Trustworthiness Evaluation Model based on Subjective Logic Evaluation model of the flow diagram shown in Figure 1 and ...
), the natural science foundation of Hebei province (F2014201117), the project as level of school of Handan colledge in 2014 (Electronic commerce model International Journal of Hybrid Information Technology ...
doi:10.14257/ijhit.2015.8.1.04
fatcat:qpr4s2rqn5ahped7eubb3mgxdu
Research on trusted computing and its development
2010
Science China Information Sciences
In China, the initiative research of trusted computing is not late, and the achievements are plentiful and substantial. Our country is in the front rank of the world in trusted computing. ...
This paper comprehensively illustrates the recent development in theory and technology of trusted computing, introduces some improvements in trusted computing in our country, and proposes our opinions ...
Trustworthy software Trusted computing depends on trustworthiness of hardware, software, network, and applications, etc. ...
doi:10.1007/s11432-010-0069-x
fatcat:wgtbdnqdxvdzrch72velqlhj6q
Adaptive Safety for Internet of Things in e-Health
[article]
2022
arXiv
pre-print
This paper also introduces a trustworthiness calculation framework that extends trust management methods with a comparative analysis of computational trust in Internet of Things (IoT). ...
With an increasing proportion of pervasive (smart dust) devices which lack computing power, security, privacy, and safety provisioning in such environments is a demanding task - not to mention additional ...
Trustworthiness Assessment In [35] , a subjective model for the evaluation of trustworthiness in the SIoT is defined based on solutions proposed for P2P networks. ...
arXiv:2203.05309v1
fatcat:gxdnhdk2dvcxhihkm6pqy7j3iu
An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory
2012
International Journal of Advanced Computer Science and Applications
Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating. ...
In this paper we have proposed an Extension of Certain Trust Model, mainly the representation portion based on probabilistic logic and fuzzy logic. ...
ACKNOWLEDGMENT The authors wish to thank Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser and Vijay Varadharajan for their renownable work and thinking. ...
doi:10.14569/ijacsa.2012.031226
fatcat:nrrq7h3mkfev7bfwmkystyvwxa
Trust-Based Security Level Evaluation Using Bayesian Belief Networks
[chapter]
2010
Lecture Notes in Computer Science
Xiong and Liu [8] present a coherent adaptive trust model for quantifying and comparing the trustworthiness of peers based on a transaction-based feedback system. ...
Model and Computational Engine for Evaluating Security Level Our approach to security level evaluation comprises two main phases: (i) evaluate the trustworthiness of the information sources to determine ...
Bayesian Belief Network Overview Bayesian Network (BN) or Bayesian Belief Network (BBN) is based on Bayes rule and designed for reasoning under uncertainty. ...
doi:10.1007/978-3-642-17499-5_7
fatcat:cx64xkfkazekracl4mlyzs33za
A Fuzzy Logic Based Certain Trust Model for E-Commerce
[article]
2013
arXiv
pre-print
Fuzzy Based Certain Trust Model depends on some certain values given by experts and developers. can be applied in a system like cloud computing, internet, website, e-commerce, etc. to ensure trustworthiness ...
Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. ...
Again, want to thank all the researchers and developers of Trust models for their excellent work which make authors work easier to accomplish. ...
arXiv:1304.4028v1
fatcat:2ktityijtfdgtofjlgn6ucbg2y
Trust-based recommendation systems in Internet of Things: a systematic literature review
2019
Human-Centric Computing and Information Sciences
Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected ...
On the other side, the internet and mobile communication facilitate the spatiotemporal connection between distant people with common experience and values. ...
Therefore, we can name it as a cost and gain strategy. Butt et al. [117] made an effort to design a Social Internet of Vehicles (SIoV) paradigm on the basis of Restful web technology. ...
doi:10.1186/s13673-019-0183-8
fatcat:ckozm3ixungbvpc37agoxc5arm
Understanding the Trustworthiness Management in the Social Internet of Things: A Survey
[article]
2022
arXiv
pre-print
The next generation of the Internet of Things (IoT) facilitates the integration of the notion of social networking into smart objects (i.e., things) in a bid to establish the social network of interconnected ...
In this survey, we present a holistic view of trustworthiness management for SIoT. ...
-The validity of the model is evaluated on the basis of On-Off attack, however, it is important to investigate the behaviour on other trust related attacks. ...
arXiv:2202.03624v2
fatcat:g64bzqgjrzfxfbjcrous7qn4ue
A Software Trustworthiness Evaluation Model Based on Level Mode
[chapter]
2011
Communications in Computer and Information Science
According to the drawbacks of traditional models, this paper proposed a trustworthiness evaluation approach of component-based software based on level. ...
The traditional trustworthiness evaluation of running software is inaccurate and incomplete because each component is as an independent unit during reliability evaluation. ...
[7] presented an evaluation model for dependability of Internet-scale software on basis of Bayesian networks and trustworthiness. Elshaafi et al. ...
doi:10.1007/978-3-642-22691-5_27
fatcat:2i56k476kneovohh4wm3yfxqwm
Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking
2018
IEEE Internet of Things Journal
software-defined networking to address existing and next-generation IoT security threats. ...
To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices. ...
Melodia's research focuses on modeling, optimization, and experimental evaluation of wireless networked systems, with applications to 5G Networks and Internet of Things, software-defined networking, and ...
doi:10.1109/jiot.2018.2846040
fatcat:xjjdi43i2bfnta5e5c6fcuamdy
Mathematical and Statistical Opportunities in Cyber Security
[article]
2009
arXiv
pre-print
After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical ...
The role of mathematics in a complex system such as the Internet has yet to be deeply explored. ...
The decision to build depends on questions of scale, time and threat model. Scale might be a single host, a local network event or even an organized entity with hundreds of thousands of systems. ...
arXiv:0904.1616v1
fatcat:5ucqd2ffbfbazkw55h5ek3a7e4
A Multidimensional Trust Evaluation Framework for Online Social Networks Based on Machine Learning
2019
IEEE Access
Due to the openness of online social networks (OSNs), they have become the most popular platforms for people to communicate with others in the expectation of sharing their opinions in a trustworthy environment ...
Experiments conducted on a real-world dataset show that the overall performance of our features and methods is superior to the other existing features and traditional approaches. ...
Her current research interests include different aspects of software engineering, trustworthiness, and the Internet of Things. ...
doi:10.1109/access.2019.2957779
fatcat:wtir7pz7vvgh5k4ix445a5ktdy
Trust-based Decision-making for the Adaptation of Public Displays in Changing Social Contexts
2014
Journal of Trust Management
In this paper, we propose a trust-based mechanism for automatic decision-making, which is based on Bayesian Networks. ...
We present the process of network construction, initialization with empirical data, and validation. ...
The core of our implementation is based on the SMILE reasoning engine and the network shown in this paper was created using the GeNIe modeling environment. ...
doi:10.1186/2196-064x-1-6
fatcat:rajehh6dozbn3cfowpn4hf5f4y
« Previous
Showing results 1 — 15 out of 1,319 results