Dynamic trust modelPDTMPervasive computingSecurity and privacy is a big problem that feazing computer researchers all along. In the pervasive computing, because the traditional methods of user authorization and access control are no longer adapted, the security and privacy becomes much more difficult ...
R Yahalom,B Klein,T Beth - IEEE Computer Society Symposium on Research in Security & Privacy 被引量: 590发表: 1993年 A Bayesian Model for Event-based Trust The application scenarios envisioned for 'global ubiquitous computing' have unique requirements that are often incompatible with traditional s...
Research of trust model based on fuzzy theory in mobile ad hoc networks The performance of ad hoc networks depends on the cooperative and trust nature of the distributed nodes. To enhance security in ad hoc networks, it is impo... Hui,Xia,Zhiping,... - 《Information Security Iet》 被引量...
Security has been the focus of the grid system recently. As an important part of security, trust in Grid computing has been researched extensively. Based on Subjective Logic, a flexible trust model has been established to enhance the security of Grid system. A trust degree threshold function ...
Experimental results using the Making Agent Teams Evoke Synergy (MATES) testbed demonstrate the success of using trust model incorpo- rated into AON. Also, incorporating a trust model into a Supply Chain Management application based on AON will be discussed. In this work, we propose to add a ...
In order to solve some trust-related security problems existing in current Web service networks and improve the security and reliability of Web services, this paper proposes an improved adaptive trust model of Web services, namely, iWSTrust, and the corresponding evaluation algorithms of its trustwort...
We show both the simulation and implementation results that verify the correctness of this model and the effects of its various model parameters. 展开 关键词: Practical/ distributed processing security of data/ trust model distributed system reputation-based trust model computer network security/ C6150...
Trust has attracted extensive attention in social science and computer science as a solution to enhance the security of the system. This paper proposes a trust evaluation model based on D-S evidence theory and sliding windows for cloud computing. The timeliness of the interaction evidence as the ...
In order to deal with the problems in P2P systems such as unreliability of the Service, security risk and attacks caused by malicious peers, a novel trust model MSL-TM based on the Multinomial Subjective Logic is proposed. The model uses multinomial ratings and Dirichlet distribution to compute ...
The substation’s constraints pose challenges for implementing security measures such as encryption and intrusion detection systems. To address this, we propose a comprehensive trust-based framework aimed at enhancing substation security. The framework comprises a trust model, a risk posture model, and ...