Trust computation using fuzzy analyser

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Computation Based on Fuzzy Clustering Theory

Trust is part of our daily life and thus can be used as a mechanism for providing security in computer networks. In this paper, by considering the dynamic nature of trust, especially the temporal and spatial characteristics in security of society, we describe trust from four factors: access time, place, history behavior and risk control strategy and then apply fuzzy clustering method and inform...

متن کامل

Using Evidence for Trust Computation∗

Trust can have its life-cycle and we can model it and utilize it for establishing secure environment for mobile environments. We assume that entities in the collaborating environment are mobile. It is not possible to perform entity enrollment. There is no globally trusted third party. Usual authentication mechanisms can not be used. We propose use of trust based on principal behaviour observati...

متن کامل

A Fuzzy Approach to a Belief-Based Trust Computation

The approaches to the trust study are various and very different each of other. In our view, just a socio-cognitive approach to trust would be able to analyze the sub-components (the basic beliefs) on which the final decision to trust or not is taken. In this paper we show a first implementation and advance of the socio-cognitive model of trust developed in [1, 2] using the so-called Fuzzy Cogn...

متن کامل

Trust based recommender system using ant colony for trust computation

Collaborative Filtering (CF) technique has proven to be promising for implementing large scale recommender systems but its success depends mainly on locating similar neighbors. Due to data sparsity of the user–item rating matrix, the process of finding similar neighbors does not often succeed. In addition to this, it also suffers from the new user (cold start) problem as finding possible neighb...

متن کامل

Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks

Mobile ad hoc network (MANEt) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANEt are autonomous routers. Hence, they are vulnerable to security attacks. collaborative attacks such as black hole and wormhole in MANEt are difficult to be detected and prevented. trust based routing decision is an effective approach for security enhancement in MANEt. In this ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Technology, Communications and Convergence

سال: 2019

ISSN: 2042-3217,2042-3225

DOI: 10.1504/ijitcc.2019.106556