The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the proliferation of sensors, specifically those capable of providing positional estimates, it is now possible to build large sensor networks for the purpose of tracking objects within indoor environments. A key component of building such indoor tracking systems, is the ability to properly select a subset of these available sensors for the purpose of tracking. Often sensors do not afford the...
Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in...
The increased usage of Twitter as a medium for reporting news and sharing information between people has caught the attention of researchers from different disciplines. One of the research directions is the analysis of online information from the perspective of its credibility. This paper aims to assess and analyze the credibility of tweets in Arabic language. In order to achieve the stated goal,...
Research in normative multi-agent systems (NorMAS) have progressed from norm representation towards investigation of mechanisms in social sciences to support for agents' tasks in open multi-agent systems (open-MAS) settings. Open-MAS characteristics pose new challenges in regulating and coordinating agents' behavior. Norms are no longer assumed to be built into agents during design time, but emerged...
Currently there are exist many different trust models for different purposes. These models are often used for collaborative filtering to find partner for interaction in distributed systems. Most of these models simple uses decision making and partner selection approaches based on highest trust level selection method to choose an entity for an interaction. We assume that decision making and selection...
In order to cater for a growing user base that requires varied functionalities and owns multiple devices, software providers are using cloud solutions as the preferred technical means. In fact, all major operating systems come with a tight integration to cloud services. Software solutions that have such integration with cloud services should disclose (transparency) this to the consumer. Furthermore,...
One of the most interesting topics in social network research is opinion formation. In this paper we have introduced a new dependent multi-dimensional opinion formation method. This method models agents with several dependent opinions so that modifying the agent's opinion about one issue can affect its opinion about another issue. Agents share their opinion with agents which have trusted them. A directed...
MANET is a multi-hop network comprised of nodes that need to work in collaboration with each other for effective routing. But unfortunately, there is possibility of some nodes misbehaving for their own interests and disturbing the network. Therefore, reliability among nodes is very important in the network. Uncertainty is of prior importance, which deeply impacts a node's anticipation of others behavior...
Transaction context is an important aspect that should be taken into account for reputation-based trust assessment, because referrals are bound to the situation-specific context in which they were created. The non-consideration of transaction context may cause several threats such as the value imbalance problem. Exploiting this weakness, a seller can build high reputation by selling cheap products...
Service-oriented environments comprise a number of interconnected service providers and service consumers and are filled by vast numbers of services of various functionalities with different qualities. Finding the desirable services among others is a major problem for a typical user, who can optimize its performance by utilizing services with good qualities. This problem is sometimes addressed by...
Trustworthy personal data access control at a semi-trusted or distrusted Cloud Service Provider (CSP) is a practical issue although cloud computing has widely developed. Many existing solutions suffer from high computation and communication costs, and are impractical to deploy in reality due to usability issue. With the rapid growth and popularity of mobile social networking, trust relationships in...
In many research and business domains, there are efforts to develop systems that aggregate user data gathered by various data sources. This approach involves secondary sharing of user data and potentially benefits the user in terms of improved personalization and better experience. However, concerns regarding privacy arise when sharing user data with unknown third parties. These concerns can be alleviated...
Event stream processing has been used to construct many mission-critical event-driven applications, such as business intelligence applications and collaborative intrusion detection applications. In this paper, we argue that event stream processing is also a good fit for autonomic computing and describe how to design such a system that is resilient to both hardware failures and malicious attacks. Based...
We present an analysis of the probability that a set of devices capable of communicating wirelessly can form a fully connected, trusted network. The network model that is used accounts for the geometric properties of the physical network boundaries, the statistical nature of the propagation environment, and the notion that both trustworthy and untrustworthy devices may occupy the network domain. Two...
This study describes and evaluates a novel trust model for a range of collaborative applications. The model assumes that humans routinely choose to trust their peers by relying on few recurrent presumptions, which are domain independent and which form a recognisable trust expertise. We refer to these presumptions as trust schemes, a specialised version of Walton's argumentation schemes. Evidence is...
In the absence of legal authorities and enforcement mechanisms in open e-marketplaces, it is extremely challenging for a user to validate the quality of opinions (i.e. Ratings and reviews) of products or services provided by other users (referred as advisers). Rationally, advisers tend to be reluctant to share their truthful experience with others. In this paper, we propose an adaptive incentive mechanism,...
This paper discusses the technical, legal and sociological issues that are encountered when trying to share sensitive security information across multiple management domains. In particular, it investigates the issues encountered when these management domains are in differing legal jurisdictions, and proposes a format for a Cross-Border Information Sharing Agreement (CB-ISA).
This study contended that the largest difference between continuance intention and general behavior intention depends on the existence of satisfaction with the confirmation of the ex post expectations about the products or services. The factors of attraction of online game design, trust, perceived risk, and social motives were proposed to have associations with both satisfaction with and continuance...
In the past decade, online social networks have provided invaluable data in understanding how social networks change in time while attracting new users and fostering relationships among members. The concept of social trust was developed to explain why and how much users trust each other to become friends or expose their personal data. Existing work on social trust analyze behavioral features and profile...
Secure data transmission is a critical issue for Clustering (WSNs). Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.