The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, users' demands for tourism consumption continue to upgrade, more and more consumers complete the reservation of air tickets and hotels through online payment. Referring to previous researches, this paper established the users' online payment behavior intention model based on Unified Theory of Acceptance and Use of Technology (UTAUT) and put forward corresponding hypotheses. Then we adopt...
Wireless Sensor Networks (WSNs) have their profound applications almost in all possible fields to facilitate automation. All WSNs contain low powered nodes for sensing information about the environmental conditions and incessant reporting to the base station. Security is a very essential and critical criterion for communication. The nodes must be trust worthy and believable for routing sensed information...
Online consumer trust in Business to Consumer (B2C) e-commerce trust has been viewed as a key differentiator that determines the success or failure of many companies conducting their business over the Internet. In order to explore the influence factor of consumer trust and their priority, and to look for the way to promote consumer trust, an Analytic Network Process (ANP) model is constructed in this...
According to the characteristics of trust in the alliance interoperable environment and the shortcomings of the existing trust model, we propose a recommendation trust model based on reputation — RBRTrust Model, the model took into account the subjective and objective factors which impact the trust: interactive scope, interactive time, interactive context, etc., through local trust, direct trust and...
Trust plays an important role in the development, implementation and operation of e-commerce systems. This paper Analyzes the current research of e-commerce trust model and research method, proposes a formal model of e-commerce trust management based on reputation, disccusses the various issues involved and their solution ideas, which gives a good foundation for further research.
In order to solve the problem of trust management in E-marketplace where asymmetric information exists between buyers and sellers, we propose a trade selection algorithm based on game processing in C2C environment in this paper. With the idea of rational expectation of economics, the selection of rational contracting parties is imitated, and a credit-scoring model is presented according to history...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based global trust model. Previous work about the global trust model is almost based on the assumption that the peer with higher trust value will provide more honest feedbacks,...
In order to improve the trustworthiness of network and decrease the cheating behavior among the nodes in the network, a model for trust discovery based on weighted closeness (WCTD) is presented. This model considers the factors such as the transition fading, time decay, and weights of the path and so on when performing the trust path searching and choosing. So trustor can find the node which satisfies...
A trust model for P2P network is proposed in this thesis, namely CRM, a cluster and recommendation based multi-granularity trust model. Compared to the current trust model, some problems can be solved better, for instance, these disadvantages contain great costs due to iterative calculations, and security such as disguise, slandering caused by anonymous and open characteristics of P2P networks. The...
Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing...
Lack of trust in mobile brokerage service is a primary reason why many investors do not conduct trading in mobile environment. This study propose a model of initial investor trust in mobile brokerage service and consider the effect of six antecedent variables on shaping an investor initial trust and intention in mobile brokerage service. The six variables are perceived ubiquity, service compatibility,...
An equivalent price based algorithm is proposed, which applies the combinatorial double auction and trust theories into grid resource allocation and pricing. Firstly the price adjusting function is designed, which maps the nodes' bid prices under various trust values into the equivalent prices under base trust degree. Then the grid resources are allocated and priced based on combinatorial double auction...
Cross-domain collaboration between enterprises needs a trusted execution environment. Policy-based management is a promising and convenient way to construct and manage such an environment. Since management of security and trust policies from collaborating domains has to handle different policies and heterogeneous policy enforcement platforms, an architectural innovation of policy management in this...
Trust models like Beth, Josang and EigenRep evaluated trust degree by the history of interactions or the reputations, and some other learners brought fuzzy theory, cloud model into the researches of trust management. All of these models based on the trusteepsilas outer information. However it is more reasonable to get the evaluations by both the outer information and the inner attributes. Aiming this...
With some critical defects existing in a P2P anonymous network such as stability and security issues, we propose a novel approach called REM-P2PAE to evaluating the reputation based on P2P anonymous environment in the light of our research and analysis. These defects having long been neglected including the short on-line time of reputation model peers, the variations in dynamic situations of peers,...
The Internet is changing the purchasing habits and behaviours of the consumer. A preliminary step in the adoption of the Internet was its use as an information channel, thereby generating favourable attitudes towards the Internet. The following step was its use as a purchase channel by firms and consumers. From the consumer perspective, we should take into account a set of psychological factors that...
Simulators and analyzers for protocols do not distinguish between the local 'subjective' view of the agents and the global 'objective' view of the analysis perspective. In practice this means that security analysis in general and protocol analysis in particular do neither model the agents local beliefs nor their local deduction power in a satisfactory way. This paper suggests a solution to the problem...
Reputation is a crucial factor in trust and thus in Web communities. Trust strategies may involve investigating user reputation or directly using transitive reputation to form the Web of Trust. We suggest an approach that takes advantage of both strategies without increasing the cost of investigation. Several systems nowadays form what we call ldquouser Web communitiesrdquo. In these communities,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.