Secure Pervasive Social Communications Based on Trust in a Distributed Way
نویسندگان
چکیده
منابع مشابه
Secure Trust-based Cooperative Communications in Wireless Multi-hop Networks
The word cooperate derives from the Latin words co-and operate (to work), thus it connotes the idea of “working together”. Cooperation is the strategy of a group of entities working together to achieve a common or individual goal. The main idea behind cooperation is that each cooperating entity gains by means of the unified activity. Cooperation can be seen as the action of obtaining some advan...
متن کاملSecure Migration of Mobile Agents based on Distributed Trust
Integrity of mobile agents in open environments in which no guarantees can be provided on the integrity of the hosts on which they run, is an open challenge. This paper presents a method with which tampering can be detected. This method is based on the notion of distributed trust; trust distributed over the hosts involved.
متن کاملA Distributed Trust-based Recommendation System on Social Networks
In everyday life, we seek suggestions from people we know for deciding the best place to buy a particular good or service. In this work, we put forth a framework of an automated distributed recommendation system on a social network that exploits the widely studied concept of trust, to get personalized responses. The main contribution of our model is to combine two forms in which trust is percei...
متن کاملDesigning a trust-based recommender system in Social Rating Networks
One of the most common styles of business today is electronic business, since it is considered as a principal mean for financial transactions among advanced countries. In view of the fact that due to the evolution of human knowledge and the increase of expectations following that, traditional marketing in electronic business cannot meet current generation’s needs, in order to survive, organizat...
متن کاملSupporting Pervasive and Social Communications with FRASCATI
In pervasive environments, the runtime adaptation of applications is done considering available event sources and services. To do that, the events have to be collected and processed, and the volatile services identified and accessed. However, although the event flow and service mobility are key issues in the adaptation process, existing solutions fail to deal with them in a simple and flexible ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2016
ISSN: 2169-3536
DOI: 10.1109/access.2017.2647824