Behrouz Tork Ladani
[ 1 ] - GGRA: a grouped gossip-based reputation aggregation algorithm
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...
[ 2 ] - GTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
[ 3 ] - A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
[ 4 ] - وارسی استحکام سامانههای اعتماد
اعتماد و شهرت، مفاهیمی شناختهشده در علوم اجتماعی هستند که امروزه در قالب سامانههای اعتماد، کاربردهای روزافزونی در علوم رایانه و ارتباطات پیدا کردهاند. این سامانهها با ارائۀ مدلی محاسباتی و بر پایه مجموعهای از تجربیات و توصیهها، مقادیر اعتماد (یا شهرت که نوع خاصی از اعتماد است) را محاسبه میکنند. این مقادیر به موجودیتها در شناسایی و سپس منزوی ساختن موجودیتهای غیردرستکار جامعه یاری می...
[ 5 ] - Interdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
[ 6 ] - Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
[ 7 ] - فراتحلیل تاثیر کاربرد فناوری اطلاعات و ارتباطات بر عملکرد آموزشی و پژوهشی اعضای هیات علمی دانشگاهها
هدف پژوهش حاضر فراتحلیل پژوهشهای انجام شده در زمینه تأثیر استفاده از فناوری اطلاعات و ارتباطات بر عملکرد آموزشی و پژوهشی اساتید، جهت برآورد اندازه اثر واقعی فناوری اطلاعات و ارتباطات بر عملکرد آموزشی و پژوهشی اساتید بود. کلیه پژوهشهای انجام شده، تا پایان سال 1396 در زمینه رابطهی میزان استفاده از فناوری اطلاعات با عملکرد آموزشی و پژوهشی اعضای هیأت علمی در ایران جامعه پژوهشی میباشد. ابزار پژو...
Co-Authors