The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applying current existing trust models or trust management systems on mobile computing environments require extracting user's trust standards in different contexts, user's experience or feedback dissemination and user's decision about trust or distrust. However mobility, uncertainty and heterogeneity of mobile computing environments make trust management much more complicated, so they are inadequate...
The emergence kinds of Web applications offer flexible and convenient service for users. Though the sites declare they won't disclose users' privacy without user's agreement, users may receive some spam after registered in or interacted with some sites. That is clearly that some sites disclosed user's privacy such as preference with user's email address to the third party by their commerce interests...
The Internet and computers did not invent or even cause privacy issues. The issues existed long before the creation of computers and Internet. The existence of the Internet, computers and large data storage make it possible to collect, process and transmit large volumes of data, including personal data. In this paper, we shall study the privacy from following two different views, namely legal framework...
Information security risk assessment combined with power control process is not a properly resolve problem, the lack of asset identification method accord with characteristics of power information systems is one of the main factors. Network-based substation automation systems (SAS) are typical power information systems, based on the analysis of difficulties on asset identification, a complete information...
Currently, there exist different trust models in peer-to-peer application. Each model has an abundance of trust information about trust and reputation attributes which are needed for establishing trust between peers. These trust models canpsilat be easily interoperable due to no approach for integrating in a semantic way the trust information from different models. Integrating trust information in...
In this paper, we propose a new decision-making approach for C2C electronic trade based on economic theory and relevant trust mechanisms in which we incorporate the element of trust and risk into a single model. During buying, an agent learns to select its partners based on the evaluation of trust on potential partners as well as on its own personal risk attitude. During selling, in order to increase...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.