The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most network applications such as pervasive computing, grid computing, P2P etc. can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. Due to such nature multi-agent systems present potential threats in ensuring secured communication. One of the key feasible ways to minimize threats is to evaluate the trust and reputation of the interacting agents. Many trust models...
Context is important situational details, yet poorly utilized in interactive computing. The fact is that it can have impact on the trust decision to make. Motivated by that, we discuss and formalize functions of dynamic trust computation model based on context-aware in P2P environments. We firstly present the definition of context-aware and trust, and then give the trust computation including directed...
At present, more and more people use the Internet to transact. In order to be successful transactions, it is need to establish a certain trust relationship between people In order to manage the trust relationship, trust model have been proposed. Based on the past trust model, a Dynamic Trust Model based on Perceived Risk is given in the paper. The perceived risk is divided into six dimensions under...
The critical challenges for peer-to-peer (P2P) systems must be the task to manage risks in interacting with unknown peers. Reputation-based trust management can decrease this risk by evaluating trustworthiness of a certain peer from its historic behaviors. However, many existing trust models do not provide adequate reaction to quick changes in peers?? behavior, showing their ineffectiveness coping...
Security and privacy is a big problem that feazing computer researchers all along. In the pervasive computing, because the traditional methods of user authorization and access control are no longer adapted, the security and privacy becomes much more difficult to ensure. This paper proposes a dynamic trust model based on P2P. In this paper we call the trust model PDTM. The model adopts the technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.