Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
An agent's trust decision strategy consists of the agent's policies for making trust-related decisions, such as who to trust, how trustworthy to be, what reputations to ...
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...