نتایج جستجو برای: relations and trust

تعداد نتایج: 16850841  

2011
Bjørnar Solhaug Ketil Stølen

Trust management involves the identification and analysis of trust relations. However, adequately managing trust requires all the relevant aspects of trust to be addressed. Moreover, which aspects to address depend on the perspective of the trust management. In this position paper we relate the notion of trust to the notions of uncertainty, subjectivity and risk, and we explain how these aspect...

In India, over the last decade, a series of stewardship failures in the health system, particularly in the medical profession, have led to a massive erosion of trust in these institutions. In many low- and middle-income countries (LMICs), the situation is similar and has reached crisis proportions; this crisis requires urgent attention. This paper draws on the insights from the recent developme...

1997
Mark Fichman

Fichman & Goodman (1996) argue that understanding the relationships between customers and suppliers in industrial markets requires a multilevel analysis. The levels of analysis are individual evaluations of transactions between firms, the dyadic relation between a customer and supplier, and the network of relationships in which these dyadic relations and transactions are embedded. One must cons...

2007
Georgios Efthymios Theodorakopoulos

Title of dissertation: ROBUST NETWORK TRUST ESTABLISHMENT FOR COLLABORATIVE APPLICATIONS AND PROTOCOLS Georgios E. Theodorakopoulos Doctor of Philosophy, 2007 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering In networks without centralized control (e.g. ad-hoc or peer-to-peer networks) the users cannot always be assumed to follow the protocol t...

Journal: :Computing Systems 1994
Raphael Yahalom Birgit Klein Thomas Beth

In distributed environments entities may be associated with arbifary trust assumptions regarding other entities. A method is presented for analyzing distributed protocols that are designed to reflect such particular trust relations. A new protocol for obtaining public keys in a multidomain environment without necessarily assuming that all trust relations correspond to a global hierarchical stru...

2011
Soner Sevinc

Federating the numerous existing networking testbeds offers multiple possible benefits, but so far testbeds and federation efforts remained semi-independent, and not wholly united as a single federation. We identify several problems against federation, namely, establishing new trust relations and agreeing on a common schema between the entities. In this paper we explore practical ways to set up...

Journal: :CoRR 2016
Mohd Anuar Mat Isa Ramlan Mahmod Nur Izura Udzir Jamalul-lail Ab Manan Ali Dehghantanha

This manuscript presents a trust computation for international relations and its calculus, which related to Bayesian inference, Dempster-Shafer theory and subjective logic. We proposed a method that allows a trust computation which is previously subjective and incomputable. An example of case study for the trust computation is the United States of America–Great Britain relations. The method sup...

2008
Daniel Díaz Sánchez Andrés Marín López Florina Almenárez Mendoza Celeste Campo Alberto Cortés Carlos García-Rubio

User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies. . . . Trust Negotiation can be...

2001
Bill McEvily Akbar Zaheer Vincenzo Perrone Gerry McNamara

Although vulnerability is central to many organizational theories of trust, little systematic research exists that specifically examines the relationship between vulnerability and trust. In this paper, we extend the concept of vulnerability to interfirm exchange relations and theorize its role in influencing interorganizational trust. We argue that existing theory on vulnerability and trust hav...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید