The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust is a fundamental issue in Pervasive computing, especially when they are applied in unstructured P2P systems. The computational models of trust play an important role in determining who and how to interact in open and dynamic environments. However, current models are not efficient or scalable enough with the expansion of system. To this end, a computation trust model with confidence is proposed...
The trust rating of recommendation for one entity greatly depends on the trust in the recommenders' ability to provide recommendations. To prevent the cahoots, cheating and fluctuant fraudulence in recommendation, we studied the characteristics of the two classes of true and false recommendation. On the basis of the analysis of the feature set, a distinguishing model is created to effectively identify...
Autonomous agents require trust and reputation concepts in order to identify communities of agents with which to interact reliably in ways analogous to humans. This paper defines a class of attacks called witness-based collusion attacks designed to exploit trust and reputation models. Empirical results demonstrate that unidimensional trust models are vulnerable to witness-based collusion attacks while...
Most current reputation models fail to calculate peerspsila reputation accurately when there is little transaction history between the peers. To this end, this paper presents a trust model combing reputation and credential which accepts inputs of both feedback and credential. The model is based on reputation-based trust model, and according to the correlation of credential and reputation, the model...
P2P systems have a dynamic open and anonymous characteristic, which restricts P2P system of cooperation between the users and system reliability and availability. A subjective trust model of P2P network based on reputation and risk is presented to solve the problem. Taking into account the influence on the calculation of confidence at different periods of trading, time decay function which different...
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology...
The paper introduces about temporal logic of action, it discuss the relation among closure, security, fairness property and liveness property in TLA, action and point out and weak fairness and strong fairness as prerequisites, base on this, it discrible in detail how to establish system model with machine-closed through cases, in the end we gain correct conclusion.
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based trust, defining the observations which underpin many pre-existing trust models. This framework maintains subjectivity which should be the basis of any trust based system yet enables entities to communicate and collaborate...
Increasingly, web applications handle sensitive data and interface with critical back-end components, but are often written by poorly experienced programmers with low security skills. The majority of vulnerabilities that affect web applications can be ascribed to the lack of proper validation of user's input, before it is used as argument of an output function. Several program analysis techniques...
It is very important to formally verify security specifications of information systems for ensuring their security. Thus we have proposed a formal verification method of security specifications with ISO/IEC 15408. However, to use the method, verifiers have to be familiar with Z notation, linear temporal logic, NuSMV input language, theorem proving, model checking, and ISO/IEC 15408. Moreover, the...
Similarity-based collaborative filtering systems are vulnerable to the data sparsity, cold-start, and robustness problems. Computational trust models are promising alternative solutions to alleviate these problems by replacing similarity metric with trust metric. However, they often have some shortages that rely on users' explicit trust statements. A fine-grained model computing trust from user ratings...
The goal of trust evaluation is to let the most trustworthy resource be selected. Indeed, the trust model should be able to detect threats. Hence, to provide a suitable ground for this selection, trust evaluation models need a mechanism to detect malicious entities. In this paper, we use a hybrid trust model for evaluating trustworthiness of each resource. This mechanism applies the components of...
To deal with the selection of BPM software and lack of unified trustworthy evaluation index standards, this paper summarizes a systematic and reasonable BPM software trustworthy evaluation index system from the two dimensional prospective. By introducing a set of linguistic evaluation scales and the related notions, a multi-attribute group decision-making model base on AHP and linguistic scales is...
In existing P2P network trust models, the evaluation offered by applicant is always relatively simple, so there is lack of prior information in computing the trust value, which would weaken the rationality and objectivity of P2P model. To solve this problem, this paper proposes a novel trust model which is based on nodepsilas capability and quality. Through the definition of capability and quality,...
The traditional intrusion detection systems (IDSs) play an important role in monitoring our network, but they lack abilities in automated intrusion response. Nowadays with the rapidly increased complexity and speed of the attacks spread, there has an urgent need in automated intrusion response. This field has already aroused wide concern. The main obstacle now lies in that accurate measurement of...
We introduce a technique for estimating a Gaussian mixture model from estimates of the moments of a data set. This technique allows for model estimation without direct access to private data and without the need to store large amounts of data for online applications.
Peer-to-Peer networks are very popular these days due to their use in data and resource sharing. Trust and reputation of a peer not only make it easy to take a decision to ask for resource from the trustworthy node but also provide a way to punish evil peers for malicious act. Incentive mechanism provokes a peer to share resource and discourage the well known free riding. In this paper we studied...
Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attacks, which cause invalid packets to be flooded through the P2P network, preventing valid packets from being delivered. This causes a disruption of the services provided by the P2P network. Since, anonymity and lack of centralized control/censorship are the salient features of P2P networks; it often encourages malicious...
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incremental or...
For the need of privilege among the people in pervasive computing environment, trust management became a hot study lecture. There are credential-based trust management and evidence-based trust management. They explain the basis of privilege in terms of a rational trust and an irrational trust respectively. But the existing trust management model didn't combine them well. So as to be more in accord...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.