نتایج جستجو برای: trust management

تعداد نتایج: 902691  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

Journal: :Knowl.-Based Syst. 2014
Wenjuan Fan Harry G. Perros

In this paper, we address the problem of trust management in multi-cloud environments using a trust management architecture based on a group of distributed Trust Service Providers (TSPs). These are independent third-party providers, trusted by Cloud Providers (CPs), Cloud Service Providers (CSPs) and Cloud Service Users (CSUs), that provide trust related services to cloud participants. TSPs are...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان فارس - دانشکده ادبیات و علوم انسانی 1393

چکیده : هدف پژوهش حاضر، تعیین نقش واسطه‏ای اعتماد سازمانی در رابطه ی بین عدالت سازمانی و یادگیری سازمانی به روش تحلیل مسیر می‏باشد. برای این منظور با استفاده از روش نمونه گیری تصادفی ساده 1?0 نفر از کارکنان اداره ورزش و جوانان استان فارس انتخاب و به پرسشنامه های متشکل از ابعاد یادگیری سازمانی، عدالت سازمانی و اعتماد سازمانی پاسخ دادند. نتایج پژوهش به طور کلی نشان داد که رابطه ی عدالت سازمان...

2004
Lamia Chaffai-Sghaier Sihem Guemara-ElFatmi

Trust Management represents a vital component for the protection of business transactions. This paper considers the application of a relational-based model for Trust Management in Electronic Payment Systems. We introduce a generic payment model that provides a good framework to validate our trust model. We use the special features, new extensions and relational techniques provided by the Trust ...

Journal: :Computer Networks 2015
Hayam Mousa Sonia Ben Mokhtar Omar Hasan Osama Younes Mohey M. Hadhoud Lionel Brunie

Participatory sensing is an emerging paradigm in which citizens everywhere voluntarily use their computational devices to capture and share sensed data from their surrounding environments in order to monitor and analyze some phenomenon (e.g., weather, road traffic, pollution, etc.). Interest in participatory sensing systems has risen since a large mobile sensor network can now be opportunistica...

2007
Changyu Dong Giovanni Russello Naranker Dulay

Trust transfer is a common technique employed in trust management systems to establish relationships between parties that are strangers. It is also well known that trust is not always transferable. That is, given an existing trust relationship, it may or may not be possible to derive new trust from it. In particular, it is not known under which constraints trust is transferable. In this paper w...

Journal: :JNW 2010
Riaz Ahmed Shaikh Young-Koo Lee Sungyoung Lee

Energy consumption is one of the most important parameters for evaluation of a scheme proposed for wireless sensor networks (WSNs) because of their resource constraint nature. Comprehensive comparative analysis of proposed reputation-based trust management schemes of WSNs from this perspective is currently not available in the literature. In this paper, we have presented a theoretical and simul...

2014
TAMYKO YSA VICENTA SIERRA MARC ESTEVE

The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization networks. We go beyond current work by testing a path model for the determinants of network outcomes and ...

Journal: :JCM 2008
Jianli Hu Quanyuan Wu Bin Zhou

The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based global trust model. Most of current trust mechanisms are not only unable to restrain effectively such malicious behavior as collusive attacks, but also take no...

2007
Peng Zhang ZHENG YAN PENG ZHANG

Trust is crucial for mobile communications. However, how to manage trust in mobile enterprise networking among various mobile devices is problematic for companies using mobile enterprise solutions. This paper presents a trust management system in an enterprise’s virtual private networks (VPN). The system supports confidential content management and overcomes the diversity support of security in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید