The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, social networks developed in terms of diversities, capabilities and users. Therefore, researchers in different fields have been attracted to these kind of networks. Trust management between users in these kind of networks is one of the most important research topics. In this article a new model for evaluating trust between users in social networks based on subjective logic is presented...
Trust plays an important role in the development and profitability of users in mobile commerce systems. In order to estimate the amount of trust, the variety of trust management systems have been proposed and implemented. One of the main challenges facing these systems is the types of attacks that threaten them and their impact on trust evaluation. In this paper, we studied four important attacks...
In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance...
Collaborative Filtering (CF) is one of the most successful recommendation techniques. Regardless of its success, it still suffers from some weaknesses such as data sparsity and user cold-start problems, resulting in poor recommendation accuracy and reduced coverage. Trust-based recommendation methods incorporate the additional information from the user's social trust network into collaborative filtering...
Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally take into account security requirements together with...
Despite all the current controversies, the success of the email service is still valid. The ease of use of its various features contributed to its widespread adoption. In general, the email system provides for all its users the same set of features controlled by a single monolithic policy. Such solutions are efficient but limited because they grant no place for the concept of usage which denotes a...
The Uncertainty Representation and Reasoning Evaluation Framework (URREF) includes an ontology that represents concepts and criteria needed to evaluate the uncertainty management aspects of a fusion system. The URREF ontology defines self-confidence as a measure of the information credibility as evaluated by the sensor itself. The concept of confidence, which is not explicitly defined in the ontology...
Trust is an important aspect in human societies. It enables cooperation and provides means to estimate potential cooperation partners. Several works have addressed how the concept of trust can be transferred to computer systems. In this paper, we present an approach to calculate trust, including direct trust, confidence, and reputation, in a network consisting of agents with changing behavior. Our...
In a trust management system, it is useful to have a measure of confidence in the estimated value of trust. Considering the concept of confidence, results in more accurate estimation of trust. In this paper we introduce a computational framework for confidence-aware trust estimation, CATEF. In this framework, for an atomic trust opinion, the reliability of the opinion is estimated and considered as...
There are many available methods to integrate information source reliability in an uncertainty representation, but there are only a few works focusing on the problem of evaluating this reliability. However, data reliability and confidence are essential components of a data warehousing system, as they influence subsequent retrieval and analysis. In this paper, we propose a generic method to assess...
Open, heterogeneous multi-agent systems (MAS) have to cope with a variety of uncertainties introduced by the systems' participants and their environment. In such systems, agents can use trust values that characterize the behavior of their interaction partners as a measure of uncertainty, allowing agents to make more appropriate decisions. However, because of the systems' dynamics and the agents' limited...
Amazon is the world's largest e-shopping site, with its market capitalization having just passed \$100 billion. Internet users interaction with its web site is an example of a widespread security ceremony -- a ceremony focuses on security-related human interaction with technology, including security protocols and on-line service consumption. This paper focuses on how Amazon's ceremony manages the...
The study presented in this paper shows that service users can have low confidence in a service provider's ability to protect their personal information even if those service users trust the overall brand. Today, on-line services are not specifically designed to promote a service user's confidence building. As a result, service users have to depend on off-line techniques to build confidence in their...
An important problem in trust management area is to evaluate the trust value among two nodes in a web of trust using intermediate nodes. This is widely used when the source node has no experience of direct interaction with the target. If trust is used to support decision making, it is important to have not only an accurate estimate of trust, but also a measure of confidence in the intermediate nodes...
Trust propagation is a widely-used approach to estimate the trustworthiness level of a target node in a web of trust, especially when the source node has no experience of direct interaction with the target. It is important to have not only an accurate estimate of trust, but also a measure of confidence in the propagated trust. In this paper we introduce a novel approach for propagation of trust and...
Situation Awareness enables the discovery of aggregations and the identification of interesting patterns in underlying data that can be leveraged to further the understanding of the battlespace. While there have been steady efforts within the information fusion community to increase the level of automated reasoning supporting Situation Awareness, there remain unresolved issues such as the development...
This paper is concerned with privacy management in mobile settings. We are also going to be looking at the type of applications that are starting to spin off from the Internet onto mobile phones, such as Messenger, Facebook and Twitter. Publication of the whereabouts and activities of the user is at the core of these systems. Many commentators worry about users forgetting that the social network may...
In a peer-to-peer (P2P) overlay network, a peer process (peer) communicates with other peers and manipulates objects like databases in the peers. It is critical to obtain service information on what peers support what service. In a fully distributed, unstructured P2P network, there is no centralized coordinator. It is critical for a peer to identify which acquaintance is trustworthy since acquaintances...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.