StoRM combining a set of features is able to address many of the challenges of trust management in the Internet of Things while it is one of the first approaches that involve the microservice architecture in a trust management model. Finally, a multi-agent simulation is presented that ...
The Internet of Things (IoT) is a paradigm that facilitates autonomous communications among various IoT devices with minimal human intervention. This raises many security challenges, which are critical and must be addressed to allow for the wide deployment of IoT. Trust must be provisioned among ...
Online peer-to-peer (P2P) lending is a new but essential financing method for small and micro enterprises that is conducted on the Internet and excludes the involvement of collateral and financial institutions. To tackle the inherent risk of this new financing method, trust must be cultivated. ...
Trust Model Evaluation (TME) ToolRecommendation systems have taken the turn of the new uses of the Internet, with the emergence of trust-based recommendation systems. These use trust relationships between users to predict ratings based on experiences and feedback. To obtain these ratings, we need...
Abstract This article deals with the choice of individual trust models adapted to networks. We consider trust as a social and effective multi-agent process. We introduce the notion of trust networks viewed as a set of one-to-one trust relationships, we wonder which trust model should be chosen...
The internet racing ahead of the scientific evidence: the case of "liberation treatment" for multiple sclerosis. to patients why a treatment that has been highly praised (on the internet) cannot be recommended based on partial medical results that await confirmation... Yára,Dadalti,Fragoso - 《...
A Zero Trust model provides security against ransomware and cybersecurity threats by assigning the least required access needed to perform specific tasks.
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination ...
Zero Trust isn't a tool, but a security model. Using this model, when it comes to securing your network, there are two key objectives: Try to limit damage from an attack and the rate at which it spreads. Make it more difficult for a cybercriminal to attack your network. ...
Due to the large scale of the typical deployments and the involvement of moving objects to the Internet of Things, participating nodes opportunistically establish data exchanging connections, spanning across multiple organizations and security domains. This opportunistic behavior causes the impossibility of ...