Sciweavers

947 search results - page 30 / 190
» HMM-Based Trust Model
Sort
View
CCS
2011
ACM
14 years 14 days ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
134
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 1 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
91
Voted
IJISEC
2007
63views more  IJISEC 2007»
15 years 12 days ago
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems
In electronic marketplaces, trust is modeled, for instance, in order to allow buying agents to make effective selection of selling agents. Familiarity is often considered to be an ...
Jie Zhang, Ali A. Ghorbani, Robin Cohen
126
Voted
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 2 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
108
Voted
IJISEC
2006
88views more  IJISEC 2006»
15 years 14 days ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...