ahp techniques for trust evaluation in semantic web
نویسندگان
چکیده
the increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. through the development of semantic web, one major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. this raises the question of how much credence to give each resource. each user knows the trustworthiness of each resource. top-down or global credibility values would not be assigned due to the subjective nature of trust. trust policies and trust evaluation mechanisms are needed to filter untrustworthy resource. this problem was tackled in this research by employing a trust model for evaluating trustworthiness of each resource. this proposed model used semantic web metadata, recommendation, and reputation as based factor for evaluation algorithm. the weighting and combination methods are two main challenges for proposed trust evaluation algorithm. these factors have various type and semantic. therefore analytical hierarchy procedure (ahp) technique was applied for trust evaluation that offers justification for trust decisions and controlled trust measurement.
منابع مشابه
AHP Techniques for Trust Evaluation in Semantic Web
The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...
متن کاملAHP Techniques for Trust Evaluation in Semantic Web
The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...
متن کاملTrust Negotiation for Semantic Web Services
Semantic Web Services enable the dynamic discovery of services based on a formal, explicit specification of the requester needs. The actual Web Services that will be used to satisfy the requester’s goal are selected at run-time and, therefore, they are not known beforehand. As a consequence, determining whether the selected services can be trusted becomes an essential issue. In this paper, we p...
متن کاملTrust Based Recommender System for Semantic Web
This paper proposes the design of a recommender system that uses knowledge stored in the form of ontologies. The interactions amongst the peer agents for generating recommendations are based on the trust network that exists between them. Recommendations about a product given by peer agents are in the form of Intuitionistic Fuzzy Sets specified using degree of membership, non membership and unce...
متن کاملTrust Strategies for the Semantic Web
Enabling trust on the Semantic Web to ensure more efficient agent interaction is an important research topic. Current research on trust seems to focus on developing computational models, semantic representations, inference techniques, etc. However, little attention has been given to the plausible trust strategies or tactics that an agent can follow when interacting with other agents on the Sema...
متن کاملTrust Management for the Semantic Web
Though research on the Semantic Web has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the Semantic Web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each source. We cannot expect each user to know the trustworthiness of each source, nor would we want to assi...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
journal of advances in computer researchجلد ۲، شماره ۱، صفحات ۸۵-۹۱
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023