A Time Self-Decay Trust Management Algorithm for P2P Computing Security

2007 ◽  
Vol 44 (1) ◽  
pp. 1 ◽  
Author(s):  
Zhiguo Shi
2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1442
Author(s):  
Amal Alqahtani ◽  
Heba Kurdi ◽  
Majed Abdulghani

Peer-to-peer (P2P) platforms are gaining increasing popularity due to their scalability, robustness and self-organization. In P2P systems, peers interact directly with each other to share resources or exchange services without a central authority to manage the interaction. However, these features expose P2P platforms to malicious attacks that reduce the level of trust between peers and in extreme situations, may cause the entire system to shut down. Therefore, it is essential to employ a trust management system that establishes trust relationships among peers. Current P2P trust management systems use binary categorization to classify peers as trustworthy or not trustworthy. However, in the real world, trustworthiness is a vague concept; peers have different levels of trustworthiness that affect their overall trust value. Therefore, in this paper, we developed a novel trust management algorithm for P2P platforms based on Hadith science where Hadiths are systematically classified into multiple levels of trustworthiness, based on the quality of narrator and content. To benchmark our proposed system, HadithTrust, we used two state-of-art trust management systems, EigenTrust and InterTrust, with no-trust algorithm as a baseline scenario. Various experimental results demonstrated the superiority of HadithTrust considering eight performance measures.


2018 ◽  
Vol 75 (7) ◽  
pp. 3534-3554 ◽  
Author(s):  
Heba Kurdi ◽  
Auhood Alfaries ◽  
Abeer Al-Anazi ◽  
Sara Alkharji ◽  
Maimona Addegaither ◽  
...  

Swiss Surgery ◽  
2003 ◽  
Vol 9 (2) ◽  
pp. 55-62 ◽  
Author(s):  
Bartanusz ◽  
Porchet

The treatment of metastatic spinal cord compression is complex. The three treatment modalities that are currently applied (in a histologically non-specific manner) are surgery, radiotherapy and the administration of steroids. The development of new spinal instrumentations and surgical approaches considerably changed the extent of therapeutic options in this field. These new surgical techniques have made it possible to resect these tumours totally, with subsequent vertebral reconstruction and spinal stabilization. In this respect, it is important to clearly identify those patients who can benefit from such an extensive surgery. We present our management algorithm to help select patients for surgery and at the same time identifying those for whom primary non-surgical therapy would be indicated. The retrospective review of surgically treated patients in our department in the last four years reveals a meagre application of conventional guidelines for the selection of the appropriate operative approach in the surgical management of these patients. The reasons for this discrepancy are discussed.


Sign in / Sign up

Export Citation Format

Share Document