1,319 Hits in 5.3 sec

The Multiple Attribute Group Decision Making model for Web Software Trustworthiness

Yujie Zhao, Xinxing Luo
2014 Journal of Software  
The evaluation of web software trustworthiness is an urgent issue to tackle in the background of internet and information society.  ...  In this paper ,the Multiple Attribute Group Decision Making model for Web Software Trustworthiness (WST-MAGDM) is established: first, the ISO/IEC 0126 and web software attributes diagram is chose as the  ...  ACKNOWLEDGMENT The research work presented in this paper was supported by National Natural Science Foundation of China (Grant Nos.71221061).  ... 
doi:10.4304/jsw.9.3.763-776 fatcat:ojhvleorajfcvkch274ekqebay

A fuzzy and probabilistic logic based representational model of Certain Trust model

Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M.M.A Hashem
2012 2012 International Conference on Informatics, Electronics & Vision (ICIEV)  
In this paper we have proposed a new representational model for Certain Trust model based on probabilistic logic and fuzzy logic related with propositional logic to ensure trustworthiness of systems like  ...  In the present trust models, particularly in Certain Trust model the main parameters of the representational model portion are uncertainty and average rating which are based on propositional logic where  ...  It is easy for a software component or a software agent to handle mathematical representations of trust. For it, Bayesian representation of trust is appropriate.  ... 
doi:10.1109/iciev.2012.6317355 fatcat:q37k63wpyrbzdcvmggyfzddpau

The Software Trustworthiness Evaluation Model Based on Subjective Logic

Jiao Hongqiang, Tian Junfeng
2015 International Journal of Hybrid Information Technology  
, consider the impact on the software trustworthiness, and build the software trustworthiness evaluation (STE) model with subjective logic.  ...  Section 5 concludes the paper. 42 Copyright ⓒ 2015 SERSC The Process of the Software Trustworthiness Evaluation Model based on Subjective Logic Evaluation model of the flow diagram shown in Figure 1 and  ...  ), the natural science foundation of Hebei province (F2014201117), the project as level of school of Handan colledge in 2014 (Electronic commerce model International Journal of Hybrid Information Technology  ... 
doi:10.14257/ijhit.2015.8.1.04 fatcat:qpr4s2rqn5ahped7eubb3mgxdu

Research on trusted computing and its development

ChangXiang Shen, HuanGuo Zhang, HuaiMin Wang, Ji Wang, Bo Zhao, Fei Yan, FaJiang Yu, LiQiang Zhang, MingDi Xu
2010 Science China Information Sciences  
In China, the initiative research of trusted computing is not late, and the achievements are plentiful and substantial. Our country is in the front rank of the world in trusted computing.  ...  This paper comprehensively illustrates the recent development in theory and technology of trusted computing, introduces some improvements in trusted computing in our country, and proposes our opinions  ...  Trustworthy software Trusted computing depends on trustworthiness of hardware, software, network, and applications, etc.  ... 
doi:10.1007/s11432-010-0069-x fatcat:wgtbdnqdxvdzrch72velqlhj6q

Adaptive Safety for Internet of Things in e-Health [article]

Denis Trček, Habtamu Abie, Åsmund Skomedal
2022 arXiv   pre-print
This paper also introduces a trustworthiness calculation framework that extends trust management methods with a comparative analysis of computational trust in Internet of Things (IoT).  ...  With an increasing proportion of pervasive (smart dust) devices which lack computing power, security, privacy, and safety provisioning in such environments is a demanding task - not to mention additional  ...  Trustworthiness Assessment In [35] , a subjective model for the evaluation of trustworthiness in the SIoT is defined based on solutions proposed for P2P networks.  ... 
arXiv:2203.05309v1 fatcat:gxdnhdk2dvcxhihkm6pqy7j3iu

An Advanced Certain Trust Model Using Fuzzy Logic and Probabilistic Logic theory

Kawser, Tonny Shekha, Md. Amjad, M.M.A
2012 International Journal of Advanced Computer Science and Applications  
Certain Trust Model depends on some certain values given by experts and developers. Here, main parameters for calculating trust are certainty and average rating.  ...  In this paper we have proposed an Extension of Certain Trust Model, mainly the representation portion based on probabilistic logic and fuzzy logic.  ...  ACKNOWLEDGMENT The authors wish to thank Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser and Vijay Varadharajan for their renownable work and thinking.  ... 
doi:10.14569/ijacsa.2012.031226 fatcat:nrrq7h3mkfev7bfwmkystyvwxa

Trust-Based Security Level Evaluation Using Bayesian Belief Networks [chapter]

Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray, Sudip Chakraborty
2010 Lecture Notes in Computer Science  
Xiong and Liu [8] present a coherent adaptive trust model for quantifying and comparing the trustworthiness of peers based on a transaction-based feedback system.  ...  Model and Computational Engine for Evaluating Security Level Our approach to security level evaluation comprises two main phases: (i) evaluate the trustworthiness of the information sources to determine  ...  Bayesian Belief Network Overview Bayesian Network (BN) or Bayesian Belief Network (BBN) is based on Bayes rule and designed for reasoning under uncertainty.  ... 
doi:10.1007/978-3-642-17499-5_7 fatcat:cx64xkfkazekracl4mlyzs33za

A Fuzzy Logic Based Certain Trust Model for E-Commerce [article]

Kawser Wazed Nafi, Tonny Shekha Kar, Amjad Hossain, M.M.A Hashem
2013 arXiv   pre-print
Fuzzy Based Certain Trust Model depends on some certain values given by experts and developers. can be applied in a system like cloud computing, internet, website, e-commerce, etc. to ensure trustworthiness  ...  Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world.  ...  Again, want to thank all the researchers and developers of Trust models for their excellent work which make authors work easier to accomplish.  ... 
arXiv:1304.4028v1 fatcat:2ktityijtfdgtofjlgn6ucbg2y

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi
2019 Human-Centric Computing and Information Sciences  
Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected  ...  On the other side, the internet and mobile communication facilitate the spatiotemporal connection between distant people with common experience and values.  ...  Therefore, we can name it as a cost and gain strategy. Butt et al. [117] made an effort to design a Social Internet of Vehicles (SIoV) paradigm on the basis of Restful web technology.  ... 
doi:10.1186/s13673-019-0183-8 fatcat:ckozm3ixungbvpc37agoxc5arm

Understanding the Trustworthiness Management in the Social Internet of Things: A Survey [article]

Subhash Sagar and Adnan Mahmood and Quan Z. Sheng and Jitander Kumar Pabani and Wei Emma Zhang
2022 arXiv   pre-print
The next generation of the Internet of Things (IoT) facilitates the integration of the notion of social networking into smart objects (i.e., things) in a bid to establish the social network of interconnected  ...  In this survey, we present a holistic view of trustworthiness management for SIoT.  ...  -The validity of the model is evaluated on the basis of On-Off attack, however, it is important to investigate the behaviour on other trust related attacks.  ... 
arXiv:2202.03624v2 fatcat:g64bzqgjrzfxfbjcrous7qn4ue

A Software Trustworthiness Evaluation Model Based on Level Mode [chapter]

Tie Bao, Shufen Liu, Xiaoyan Wang, Yunchuan Sun, Guoxing Zhao
2011 Communications in Computer and Information Science  
According to the drawbacks of traditional models, this paper proposed a trustworthiness evaluation approach of component-based software based on level.  ...  The traditional trustworthiness evaluation of running software is inaccurate and incomplete because each component is as an independent unit during reliability evaluation.  ...  [7] presented an evaluation model for dependability of Internet-scale software on basis of Bayesian networks and trustworthiness. Elshaafi et al.  ... 
doi:10.1007/978-3-642-22691-5_27 fatcat:2i56k476kneovohh4wm3yfxqwm

Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking

Francesco Restuccia, Salvatore DrOro, Tommaso Melodia
2018 IEEE Internet of Things Journal  
software-defined networking to address existing and next-generation IoT security threats.  ...  To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices.  ...  Melodia's research focuses on modeling, optimization, and experimental evaluation of wireless networked systems, with applications to 5G Networks and Internet of Things, software-defined networking, and  ... 
doi:10.1109/jiot.2018.2846040 fatcat:xjjdi43i2bfnta5e5c6fcuamdy

Mathematical and Statistical Opportunities in Cyber Security [article]

Juan Meza, Scott Campbell, David Bailey
2009 arXiv   pre-print
After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical  ...  The role of mathematics in a complex system such as the Internet has yet to be deeply explored.  ...  The decision to build depends on questions of scale, time and threat model. Scale might be a single host, a local network event or even an organized entity with hundreds of thousands of systems.  ... 
arXiv:0904.1616v1 fatcat:5ucqd2ffbfbazkw55h5ek3a7e4

A Multidimensional Trust Evaluation Framework for Online Social Networks Based on Machine Learning

Xu Chen, Yuyu Yuan, Lilei Lu, Jincui Yang
2019 IEEE Access  
Due to the openness of online social networks (OSNs), they have become the most popular platforms for people to communicate with others in the expectation of sharing their opinions in a trustworthy environment  ...  Experiments conducted on a real-world dataset show that the overall performance of our features and methods is superior to the other existing features and traditional approaches.  ...  Her current research interests include different aspects of software engineering, trustworthiness, and the Internet of Things.  ... 
doi:10.1109/access.2019.2957779 fatcat:wtir7pz7vvgh5k4ix445a5ktdy

Trust-based Decision-making for the Adaptation of Public Displays in Changing Social Contexts

Michael Wißner, Stephan Hammer, Ekatarina Kurdyukova, Elisabeth André
2014 Journal of Trust Management  
In this paper, we propose a trust-based mechanism for automatic decision-making, which is based on Bayesian Networks.  ...  We present the process of network construction, initialization with empirical data, and validation.  ...  The core of our implementation is based on the SMILE reasoning engine and the network shown in this paper was created using the GeNIe modeling environment.  ... 
doi:10.1186/2196-064x-1-6 fatcat:rajehh6dozbn3cfowpn4hf5f4y
« Previous Showing results 1 — 15 out of 1,319 results