A survey of attack and defense techniques for reputation systems
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a
given domain for each identity within the system. These systems seek to generate an …
given domain for each identity within the system. These systems seek to generate an …
Trust management in distributed systems
H Li, M Singhal - Computer, 2007 - ieeexplore.ieee.org
Distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks
involve numerous entities, many of which haven't previously interacted. Trust management …
involve numerous entities, many of which haven't previously interacted. Trust management …
A novel trust management framework for multi-cloud environments based on trust service providers
W Fan, H Perros - Knowledge-Based Systems, 2014 - Elsevier
In this paper, we address the problem of trust management in multi-cloud environments
based on a set of distributed Trust Service Providers (TSPs). These are independent third …
based on a set of distributed Trust Service Providers (TSPs). These are independent third …
Dynamic ranking of cloud services for web-based cloud communities: efficient algorithm for rating-based discovery and multi-level ranking of cloud services
AQ Md, V Vijayakumar - International Journal of Web …, 2019 - inderscienceonline.com
Trust assessment in cloud depends on QoS attributes. While evaluating the trustworthiness
of the CSPs, traditional methods of trust assessment do not take into account QoS attributes …
of the CSPs, traditional methods of trust assessment do not take into account QoS attributes …
Two-dimensional trust rating aggregations in service-oriented applications
In most existing trust evaluation studies, a single value is computed based on the ratings
given to a service provider to indicate the current trust level. This is useful but may not …
given to a service provider to indicate the current trust level. This is useful but may not …
A case study in simulating PCS networks using Time Warp
There has been rapid growth in the demand for mobile communications over the past few
years. This has led to intensive research and development efforts for complex PCS …
years. This has led to intensive research and development efforts for complex PCS …
On desideratum for B2C e-commerce reputation systems
A Gutowska, A Sloane, KA Buckley - Journal of computer science and …, 2009 - Springer
This paper reviews existing approaches to reputation systems, their constraints as well as
available solutions. Furthermore, it presents and evaluates a novel and comprehensive …
available solutions. Furthermore, it presents and evaluates a novel and comprehensive …
Trust-abac towards an access control system for the internet of things
H Ouechtati, NB Azzouna - Green, Pervasive, and Cloud Computing: 12th …, 2017 - Springer
In order to cope with certain challenges posed by device capacity and the nature of IoT
networks, a lightweight access control model is needed to resolve security and privacy …
networks, a lightweight access control model is needed to resolve security and privacy …
Role-based recommendation and trust evaluation
Y Wang, V Varadharajan - … , E-Commerce and E-Services (CEC …, 2007 - ieeexplore.ieee.org
In general, in most trust evaluation systems, the evaluation of a target party under
investigation relies on the trust ratings from responding peers/parties who have direct …
investigation relies on the trust ratings from responding peers/parties who have direct …
[图书][B] Near field communications handbook
SA Ahson, M Ilyas - 2011 - books.google.com
From basic concepts to research grade material and future directions, the Near Field
Communications Handbook provides comprehensive technical coverage of this rapidly …
Communications Handbook provides comprehensive technical coverage of this rapidly …