The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we construct a P2P dynamic trust management system based on the concept of trust network that covers aggregation computation of trust degree, the selection of trust chains and the assessment of overall trust. In particular, we optimized the searching algorithm of trust chains and the calculation of recommendation trust. The results of simulation show that the system can ameliorate the...
Most of the existing trust models don't perform well in preventing malicious nodes from profiteering by conspiracy attack or periodic attack, and pay little attention to incentive mechanisms in the environment of Virtual Organization (VO). This paper proposes a new distributed trust mechanism in Single-core VO, which chooses the new node by Group-Choose mechanism that aggregates direct trust (Direct...
Disaster areas typical to deal with unexpected and sudden disasters, such as earthquakes and terrorist attacks, can take advantage of context-awareness, namely the capability of providing applications with full awareness of current execution context, to increase the possibility of saving human lives. Unfortunately, context-aware services in disaster areas require efficient and reliable context data...
Trust is generally based on the level and quality of interaction with the entity being trusted. In a web service or the Internet, trust is based on the level of successful and unsuccessful interactions. Successful interactions are used to model trust within the context of chains of trust in which an agent is permitted to recommend a service. This is termed trust chain since the agent need to first...
Electronic health record (EHR) systems are being introduced to overcome the limitations associated with paper-based and isolated electronic medical record (EMR) systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about the privacy and reliability (trustworthiness)...
P2P systems must handle unexpected peer failure and leaving, and thus it is more difficult to implement than server-client systems. In this paper, we propose a novel approach to implement P2P systems by using virtual peers. A virtual peer consists of multiple unstable peers. A virtual peer is a stable entity; application programs run on a virtual peer are not compromised unless a majority of the peers...
Many peer-to-peer networks are used to share different types of files. These files could be damaged, contain false content or even include malware. To be able to choose the right peers, the requesting peer needs to assess the trustworthiness of the requested peer. Embedded trust algorithms enable the requesting peers to perform this assessment without the continuous involvement of human users. Requesting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.