trust modelling
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 3)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 2 (2) ◽  
pp. 101-115
Author(s):  
Kostas Kolomvatsos ◽  
Maria Kalouda ◽  
Panagiota Papadopoulou ◽  
Stathes Hadjiefthymiades

Pervasive computing applications involve the interaction between autonomous entities for performing complex tasks and producing knowledge. Autonomous entities can interact to exchange data and knowledge to fulfil applications requirements. Intelligent Agents (IAs) ‘activated’ in various devices offer a lot of advantages when representing such entities due to their autonomous nature that enables them to perform the desired tasks in a distributed way. However, in such open and dynamic environments, IAs should be based on an efficient mechanism for trusting unknown entities when exchanging data. The trust level of an entity should be automatically calculated based on an efficient methodology. Each entity is uncertain for the characteristics and the intentions of the others. Fuzzy Logic (FL) seems to be the appropriate tool for handling such kind of uncertainty. In this paper, we present a model for trust calculation under the principles of FL. Our scheme takes into consideration the social dimension of trust as well as personal experiences of entities before they decide interactions with an IA. The proposed model is a two-level system involving three FL sub-systems to calculate (a) the social trust (based on experiences retrieved by the community), (b) the individual trust (based on personal experiences) and (c) the final trust. We present our results by evaluating the proposed system compared to other models and reveal its significance.



IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Hannah Lim Jing Ting ◽  
Xin Kang ◽  
Tieyan Li ◽  
Haiguang Wang ◽  
Cheng-Kang Chu


Author(s):  
Braden Hurl ◽  
Robin Cohen ◽  
Krzysztof Czarnecki ◽  
Steven Waslander




Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1929 ◽  
Author(s):  
Farag Azzedin ◽  
Mustafa Ghaleb

The advent of Internet-of-Things (IoT) is creating an ecosystem of smart applications and services enabled by a multitude of sensors. The real value of these IoT smart applications comes from analyzing the information provided by these sensors. Information fusion improves information completeness/quality and, hence, enhances estimation about the state of things. Lack of trust and therefore, malicious activities renders the information fusion process and hence, IoT smart applications unreliable. Behavior-related issues associated with the data sources, such as trustworthiness, honesty, and accuracy, must be addressed before fully utilizing these smart applications. In this article, we argue that behavior trust modeling is indispensable to the success of information fusion and, hence, to smart applications. Unfortunately, the area is still in its infancy and needs further research to enhance information fusion. The aim of this article is to raise the awareness and the need of behavior trust modelling and its effect on information fusion. Moreover, this survey describes IoT architectures for modelling trust as well as classification of current IoT trust models. Finally, we discuss future directions towards trustworthy reliable fusion techniques.



10.29007/4q71 ◽  
2019 ◽  
Author(s):  
Aakanksha Rastogi ◽  
Kendall Nygard

Software Engineering principles have connections with design science, including cybersecurity concerns pertaining to vulnerabilities, trust and reputation. The work of this paper surveys, identifies, establishes and explores these connections. Identification and addressing of security issues and concerns during the early phases of software development life cycle, especially during the requirements analysis and design phases; and importance of inclusion of security requirements have also been illustrated. In addition to that, effective and efficient strategies and techniques to prevent, mitigate and remediate security vulnerabilities by the application of the principles of trust modelling and design science research methodology have also been presented.



Author(s):  
Mike Surridge ◽  
Gianluca Correndo ◽  
Ken Meacham ◽  
Juri Papay ◽  
Stephen C. Phillips ◽  
...  


Sign in / Sign up

Export Citation Format

Share Document