To see the other types of publications on this topic, follow the link: Trust evaluation.

Journal articles on the topic 'Trust evaluation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trust evaluation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kenneth Malefo, Boikanyo, Heng-Hsing Hsieh, and Kathleen Hodnett. "Performance evaluation of actively managed mutual funds." Investment Management and Financial Innovations 13, no. 4 (2016): 188–95. http://dx.doi.org/10.21511/imfi.13(4-1).2016.04.

Full text
Abstract:
Motivated by the growing attraction of the mutual fund industry worldwide, this research seeks to explore the economic benefits contributed by the South African equity unit trust managers over the period from 6 January 2002 to 2 September 2012. The performance statistics of selected equity unit trusts are examined for the overall examination period and two sub-periods: 6 January 2002 to 6 May 2007 and 7 May 2007 to 2 September 2012. The first sub-period captures the bullish performance of the unit trusts before the 2008 global financial crisis. The second sub-period captures the global financi
APA, Harvard, Vancouver, ISO, and other styles
2

Bo, Tian, and Wang Jia. "Recommended Trust Evaluation in B2C E-Commerce Based on Fuzzy Analytic Hierarchy Process." International Journal of Knowledge and Systems Science 3, no. 3 (2012): 60–69. http://dx.doi.org/10.4018/jkss.2012070106.

Full text
Abstract:
Trust investigation in Business-To-Customer (B2C) E-commerce is usually based on analyzing relative compositions of B2C E-commerce, and mainly focuses on direct perceived trust of consumers. But in real B2C E-commerce, recommended trust of mature consumer is an important channel to enhance trust for a new consumer. A recommended trust evaluation method in B2C E-commerce is proposed based on fuzzy analytic hierarchy process. Firstly, compositions that affect online trust in B2C electronic-commerce are analyzed comprehensively. An individual trust evaluation system is established. Furthermore, f
APA, Harvard, Vancouver, ISO, and other styles
3

Mostafa, Heidarzadeh Kalahroudy, Rahsepar Fard Kheirollah, and Farjami Yaghoob. "Developing a trust model using graph and ranking trust of social messaging system." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 997–1007. https://doi.org/10.11591/ijece.v13i1.pp997-1007.

Full text
Abstract:
Trust is an important issue in social interactions, especially in using cyberspace services. In this paper, a trust and evaluation model are proposed based on which the government can provide reliable services to users. The model is a distributed and hierarchical model. First, the number 12 trust criteria and the weight of these criteria were extracted using the analytical hierarchy process (AHP) and analytic network process (ANP) techniques. Second, to obtain the trust in the service examined, for each criterion, a graph of trusted entities is proposed. Then, a weighted graph with the number
APA, Harvard, Vancouver, ISO, and other styles
4

Ragul, M., A. Aloysius, and V. Arulkumar. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal Of Science And Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/ijst/v18i7.3783.

Full text
Abstract:
Objectives: The research presents Dynamic Trust Evaluation (DTEF) as a blockchain-powered framework for IoT security which implements real-time assessment of trust while adapting policies and detecting anomalies. The system intends to overcome scalability and privacy problems that result from operating large-scale IoT networks. Methods: Secure trust evaluations and blockchain network policy enforcement is made possible through the integration of Attribute-Based Access Control (ABAC) and Elliptic Curve Digital Signature Algorithm (ECDSA) within DTEF. Performance evaluation was conducted by test
APA, Harvard, Vancouver, ISO, and other styles
5

Oudina, Zina, Makhlouf Derdour, Rachid Boudour, Ahmed Dib, and Mohamed Amine Yakoubi. "Trust Cyber Physical Systems: Trust Degree Framework and Evaluation." International Journal of Safety and Security Engineering 13, no. 2 (2023): 213–25. http://dx.doi.org/10.18280/ijsse.130204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Zhiquan, Jianfeng Ma, Zhongyuan Jiang, Hui Zhu, and Yinbin Miao. "LSOT: A Lightweight Self-Organized Trust Model in VANETs." Mobile Information Systems 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/7628231.

Full text
Abstract:
With the advances in automobile industry and wireless communication technology, Vehicular Ad hoc Networks (VANETs) have attracted the attention of a large number of researchers. Trust management plays an important role in VANETs. However, it is still at the preliminary stage and the existing trust models cannot entirely conform to the characteristics of VANETs. This work proposes a novel Lightweight Self-Organized Trust (LSOT) model which contains trust certificate-based and recommendation-based trust evaluations. Both the supernodes and trusted third parties are not needed in our model. In ad
APA, Harvard, Vancouver, ISO, and other styles
7

Lloyd-Smith, Walter. "Misplaced Trust? Occupational Therapy and NHS Trusts." British Journal of Occupational Therapy 57, no. 2 (1994): 40–44. http://dx.doi.org/10.1177/030802269405700202.

Full text
Abstract:
The present governmental reforms of the National Health Service are the most far-reaching to date and have fundamental implications for health professionals. The focus of this article is to raise some of these issues in relation to occupational therapy. The introduction of trusts, the purchaser/provider split and the internal market are some of the mechanisms by which the government hoped to tackle the funding crisis of the late 1980s. These reforms have been operating since 1991, but little has been published on the impact of the self-governing trust movement on occupational therapy. Some obs
APA, Harvard, Vancouver, ISO, and other styles
8

Yan, Zheng, Qinghua Zheng, Laurence T. Yang, and Robert H. Deng. "Data Fusion for Trust Evaluation." Information Fusion 76 (December 2021): 187–88. http://dx.doi.org/10.1016/j.inffus.2021.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Osterwalder, Daniel. "Trust Through Evaluation and Certification?" Social Science Computer Review 19, no. 1 (2001): 32–46. http://dx.doi.org/10.1177/089443930101900104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Steward, Emily. "Interprofessional team trust in maternity services: a service evaluation." British Journal of Midwifery 31, no. 3 (2023): 126–32. http://dx.doi.org/10.12968/bjom.2023.31.3.126.

Full text
Abstract:
Background/Aims A climate of trust in maternity may improve the experiences of staff and women accessing maternity services. The aim of this study was to explore how a climate of trust was promoted through creation of a regular virtual maternity multidisciplinary forum, known as a maternal medicine huddle, during the COVID-19 pandemic and what influence this had on the organisational culture of a local maternity system and the experiences of women receiving maternity care. Methods Through a critical feminist methodology, six participants were interviewed using a semi-structured interview sched
APA, Harvard, Vancouver, ISO, and other styles
11

CHEN, Zhi-kui, Bing-jie ZI, Guo-hai JIANG, and Yang LIU. "Trust evaluation for wireless sensor networks based on trust-cloud." Journal of Computer Applications 30, no. 12 (2011): 3346–48. http://dx.doi.org/10.3724/sp.j.1087.2010.03346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Shibin, Zhihai Xie, Yifen Yin, et al. "Study on Quantum Trust Model Based on Node Trust Evaluation." Chinese Journal of Electronics 26, no. 3 (2017): 608–13. http://dx.doi.org/10.1049/cje.2016.11.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tao, Li Min, and Xi Kun Liang. "Research on Trust Cloud-Based Trust Evaluation Model for C2C Electronic Commerce." Applied Mechanics and Materials 543-547 (March 2014): 4243–50. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4243.

Full text
Abstract:
In order to solve the problem of the transaction security in C2C e-commerce, this paper proposes an evaluation model based on cloud model theory. The created definition of the trust cloud and the standard cloud in the valuation model show the ambiguity and random of the trust and realize transferring quantitative data to qualitative data. This paper puts forward the synthesis, similarity calculation method and realizes comprehensive evaluation and decision-making based on trust cloud. The calculation examples show that the model is feasible and effective. So, a new trust evaluation model based
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Feng Yin, and Pei Yu Liu. "A Trust Management Model in Electronic Commerce Applications." Applied Mechanics and Materials 263-266 (December 2012): 2669–72. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2669.

Full text
Abstract:
Most current trust management systems cannot precisely reflect the dynamic feature of trust status. Based on the fundamental trust management principles and the thin client requirements in electronic commerce applications, by introducing the concept of Important Factor in trust calculation, a centralized trust management architecture and an efficient trust evaluation method were proposed. The trust evaluation method advocates defining as less formulae as possible to enable a simple and efficient trust evaluation system. And the parameters in trust evaluation equation can vary to adapt to diffe
APA, Harvard, Vancouver, ISO, and other styles
15

Reda, Alaa, Mahmoud Ali Mousa, and Ibrahim Ziedan. "A Comprehensive Trust Evaluation Model for Financial Service Providers Using Fuzzy Inference Systems." Statistics, Optimization & Information Computing 13, no. 5 (2025): 2044–59. https://doi.org/10.19139/soic-2310-5070-2373.

Full text
Abstract:
This paper presents a hybrid trust evaluation model for financial service providers based on fuzzy inferencesystems (FIS) and machine learning methods. The proposed model aggregates FSLA compliance measures, operational performance information, and user feedback to calculate dynamic, multidimensional trust scores. The model utilizes both the strengths of fuzzy logic in handling uncertainty and ambiguity, as well as the predictive power and real-time robustness of machine learning. The effectiveness of this hybrid method in overcoming the constraints of existing trust evaluation frameworks was
APA, Harvard, Vancouver, ISO, and other styles
16

Ye, Zhengwang, Tao Wen, Zhenyu Liu, Xiaoying Song, and Chongguo Fu. "An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks." Journal of Sensors 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/7864671.

Full text
Abstract:
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs). In this paper, an efficient dynamic trust evaluation model (DTEM) for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The
APA, Harvard, Vancouver, ISO, and other styles
17

HONARI, SINA, BRIGITTE JAUMARD, and JAMAL BENTAHAR. "UNCERTAINTY-BASED TRUST ESTIMATION IN A MULTI-VALUED TRUST ENVIRONMENT." International Journal on Artificial Intelligence Tools 22, no. 05 (2013): 1360003. http://dx.doi.org/10.1142/s0218213013600038.

Full text
Abstract:
Despite the widespread usage of the evaluation mediums for online services by the clients, there is a requirement for a trust evaluation tool that provides the clients with the degree of trustworthiness of the service providers. Such a tool can provide increased familiarity with unknown third party entities, e.g. service providers, especially when those entities neither project completely trustworthy nor totally untrustworthy behaviour. Indeed, developing some metrics for trust evaluation under uncertainty can come handy, e.g., for customers interested in evaluating the trustworthiness of an u
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Ying, Yan Wang, and Xian You Sun. "Research on Behavior Trust Evaluation Method of Cloud Services Based on Membership Theory." Applied Mechanics and Materials 427-429 (September 2013): 2377–82. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2377.

Full text
Abstract:
Among the wide range of cloud service providers with different performance characteristics, in order to let the cloud users find cloud services which satisfy its performance preferences and specific trust levels,it needs to establish a reasonable and scientific cloud service trust evaluation system. This paper introduces a membership degree theory into trust evaluation model. First, it designs the trust evaluation system framework of cloud services, and establishes a trust evaluation model of cloud services. Next, it calculates the trust level of cloud services with the comprehensive trust clo
APA, Harvard, Vancouver, ISO, and other styles
19

Liao, Xin Fei. "Research on Subject Trust Evaluation Based on Fuzzy Theory." Advanced Engineering Forum 1 (September 2011): 52–56. http://dx.doi.org/10.4028/www.scientific.net/aef.1.52.

Full text
Abstract:
Trust management is now one of the interesting research topics in the field of web security. Firstly, several existing trust models are analyzed. Aiming at flaws of these models, the subject trust model based on fuzzy comprehensive evaluation is proposed, thus solving the evaluation problem of subjects trust degree in trust model. An effective evaluation strategy for trust degree vector of subject trust model is given. Finally, a concrete example is provided and has proved the rationality and feasibility of the model.
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Feng, and Ya Li Si. "A Dynamic Trust Evaluation Model for Internet Computing." Applied Mechanics and Materials 397-400 (September 2013): 1949–53. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1949.

Full text
Abstract:
Trust mechanism has been identified as one of key areas in the field of Internet security. Our objective in this paper is to develop a dynamic trust evaluation model for Internet computing. The proposed scheme divides the recommendation trust into the direct recommendation trust and the indirect recommendation trust, and considers variety of factors to calculate the two types of recommendation trust degree. Simulation results show that, compared to the existing trust model, the model can effectively improve the accuracy of trust evaluation, and provide a better capacity of resisting malicious
APA, Harvard, Vancouver, ISO, and other styles
21

Niu, Jing Chun, and Li Min Shen. "Application Research of Fuzzy Evaluation on Direct Trust Evaluation in the Supply Chain." Applied Mechanics and Materials 687-691 (November 2014): 5136–41. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.5136.

Full text
Abstract:
In order to accurately and effectively evaluate the trust level between enterprises whose supply chain exists in direct transactions, this paper proposed a trust level evaluation method based on reputation, this method by introducing corporate transactions satisfaction level, corporate transaction amount, corporate transactions time, corporate transactions number and rewards and punishments factor five factors, which make description and measurement of corporate reputation more accurate. Meanwhile, in order to improve the measurement accuracy of corporate transactions satisfaction level, this
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Guanfeng, Yan Wang, and Mehmet Orgun. "Trust Transitivity in Complex Social Networks." Proceedings of the AAAI Conference on Artificial Intelligence 25, no. 1 (2011): 1222–29. http://dx.doi.org/10.1609/aaai.v25i1.8087.

Full text
Abstract:
In Online Social Networks (OSNs), participants can conduct rich activities, where trust is one of the most important factors for their decision making. This necessitates the evaluation of the trustworthiness between two unknown participants along the social trust paths between them based on the trust transitivity properties (i.e., if A trusts B and B trusts C, then A can trust C to some extent). In order to compute more reasonable trust value between two unknown participants, a critical and challenging problem is to make clear how and to what extent trust is transitive along a social trust pat
APA, Harvard, Vancouver, ISO, and other styles
23

Zhenling Wang. "A Trust Evaluation Algorithm in P2P Network based on Trust Model." International Journal of Digital Content Technology and its Applications 5, no. 8 (2011): 275–81. http://dx.doi.org/10.4156/jdcta.vol5.issue8.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Theodorakopoulos, G., and J. S. Baras. "On trust models and trust evaluation metrics for ad hoc networks." IEEE Journal on Selected Areas in Communications 24, no. 2 (2006): 318–28. http://dx.doi.org/10.1109/jsac.2005.861390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

M, Ragul, Aloysius A, and Arulkumar V. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal of Science and Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/IJST/v18i7.3783.

Full text
Abstract:
<strong>Objectives:</strong>&nbsp;The research presents Dynamic Trust Evaluation (DTEF) as a blockchain-powered framework for IoT security which implements real-time assessment of trust while adapting policies and detecting anomalies. The system intends to overcome scalability and privacy problems that result from operating large-scale IoT networks.&nbsp;<strong>Methods:</strong>&nbsp;Secure trust evaluations and blockchain network policy enforcement is made possible through the integration of Attribute-Based Access Control (ABAC) and Elliptic Curve Digital Signature Algorithm (ECDSA) within D
APA, Harvard, Vancouver, ISO, and other styles
26

RiadHwsein, Ramee, S. Jeyachandran, R. Satish, Muhidinov Ayubbek Nuritdinovich, P. Sundara Bala Murugan, and Atul Dattatraya Ghate. "Evaluation Metrics for User Trust in Information Systems." Indian Journal of Information Sources and Services 15, no. 2 (2025): 45–50. https://doi.org/10.51983/ijiss-2025.ijiss.15.2.07.

Full text
Abstract:
User Information Systems (ISs) Trust has emerged as a central indicator of system adoption, continuance of use, and user satisfaction on the system itself. Trust is bounding with user's digital activities from participating in various e-commerce activities, healthcare, e-governance and much more. Gaining the ability and flexibility to measure and evaluate user trust is of high importance. This paper aims to present a particular set of evaluation criteria that are captured in a comprehensive framework which is trust in information systems. Different aspects of trust are shaped by the reliabilit
APA, Harvard, Vancouver, ISO, and other styles
27

Schwarz, Christine, and Gerlinde Struhkamp. "Does Evaluation Build or Destroy Trust?" Evaluation 13, no. 3 (2007): 323–39. http://dx.doi.org/10.1177/1356389007078625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Zhao, Bin, Jingsha He, Yixuan Zhang, et al. "Dynamic trust evaluation in open networks." Intelligent Automation & Soft Computing 22, no. 4 (2016): 631–38. http://dx.doi.org/10.1080/10798587.2016.1167438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ahmed, Usama, Imran Raza, and Syed Asad Hussain. "Trust Evaluation in Cross-Cloud Federation." ACM Computing Surveys 52, no. 1 (2019): 1–37. http://dx.doi.org/10.1145/3292499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhou, Guoqiang, Fangrui Pan, Weifeng Zhang, and Jian Guo. "Research progress of trust evaluation model." Wuhan University Journal of Natural Sciences 13, no. 4 (2008): 391–95. http://dx.doi.org/10.1007/s11859-008-0402-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Schnabel, Georg, Roberto Capote, and Daniel L. Aldama. "Why trust nuclear data evaluations with Bayesian networks." EPJ Web of Conferences 284 (2023): 12004. http://dx.doi.org/10.1051/epjconf/202328412004.

Full text
Abstract:
Bayesian networks were recently suggested as a framework for nuclear data evaluation. Their theory was to some extent described in a recent preprint and some example evaluations were presented. However, due to their newness in the context of nuclear data evaluation and consequently the lack of experience with them within the community makes it dicult to develop trust in the underlying methodology and consequently also the results produced by it. In this contribution, we aim to make a case why evaluators can trust this methodology in principle but will also elaborate on the fact that Bayesian n
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Guanqun, Mengxi Liu, and Guangjun Zai. "A Blockchain-Based IoT Terminal Trust Mechanism Management Scheme." Journal of Physics: Conference Series 2404, no. 1 (2022): 012049. http://dx.doi.org/10.1088/1742-6596/2404/1/012049.

Full text
Abstract:
Abstract Traditional centralized Internet of Things (IoT) management cannot effectively defend against internal attacks from compromised devices due to its own limitations, while distributed IoT node management has certain requirements for the communication environment and resource consumption of the nodes themselves. And the trust authentication of the nodes cannot be easily resolved in a distributed manner. This paper presents a blockchain-based trust management solution. Trust management of nodes based on blockchain also greatly reduces resource consumption. Specifically, the trust value is
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Changtao, Jun Ye, Fanglin An, and Weili Jiang. "An Adaptive Trust Evaluation Model for Detecting Abnormal Nodes in Underwater Acoustic Sensor Networks." Sensors 24, no. 9 (2024): 2880. http://dx.doi.org/10.3390/s24092880.

Full text
Abstract:
Underwater acoustic sensor networks have a wide range of applications in both civil and military fields, but the complex and changing underwater environment makes them vulnerable to multiple security threats. Trust mechanisms are effective ways to enhance network security and reliability. In order to improve the accuracy of trust evaluation and the detection rate of abnormal nodes, this paper proposes an adaptive trust evaluation model based on fuzzy logic. This model adopts a variable weight fuzzy comprehensive evaluation algorithm to dynamically adjust the weights of three direct trust indic
APA, Harvard, Vancouver, ISO, and other styles
34

Marche, Claudio, and Michele Nitti. "Can We Trust Trust Management Systems?" IoT 3, no. 2 (2022): 262–72. http://dx.doi.org/10.3390/iot3020015.

Full text
Abstract:
The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object cooperation allows us to develop complex applications in which each node contributes one or more services. Therefore, the information moves from a provider to a requester node in a peer-to-peer network. In that scenario, trust management systems (TMSs) have been developed to prevent the manipulation of data by unauthorized entities and guarantee the detection of malicious behaviour. The community concentrates effort on designing complex trust techniques to increase their effectiveness; however, two
APA, Harvard, Vancouver, ISO, and other styles
35

Yin, Yujia, and He Fang. "A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network." Sensors 23, no. 15 (2023): 6751. http://dx.doi.org/10.3390/s23156751.

Full text
Abstract:
Six-generation (6G) networks will contain a higher density of users, base stations, and communication equipment, which poses a significant challenge to secure communications and collaborations due to the complex network and environment as well as the number of resource-constraint devices used. Trust evaluation is the basis for secure communications and collaborations, providing an access criterion for interconnecting different nodes. Without a trust evaluation mechanism, the risk of cyberattacks on 6G networks will be greatly increased, which will eventually lead to the failure of network coll
APA, Harvard, Vancouver, ISO, and other styles
36

Shpakou, A., and A. Shpakau. "Evaluation of the possibility of using Anderson and Dedrick’s Trust in Physician Scale in Belarusian conditions." Progress in Health Sciences 7, no. 2 (2017): 50–59. http://dx.doi.org/10.5604/01.3001.0010.7850.

Full text
Abstract:
Introduction: A patient that trusts a doctor feels safer and more easily adapts to a doctor's recommendations. Aim of the study: To assess the possibility of using the patient's trust scale by Anderson and Dedrick in Belarusian conditions. Materials and Methods: The study used the Trust in Physician Scale (TPS) by Anderson and Dedrick. Validation was performed on a group of 251 randomly selected individuals. The validation process consisted of two parts: translation and evaluation of the psychometric properties of the newly translated instrument, and its purpose was to compare the results obta
APA, Harvard, Vancouver, ISO, and other styles
37

Jiang, Jian Hua, Bu Yun Sheng, and Ming Zhong Yang. "A Trading Practice Based Trust Evaluation Model in Dynamic Virtual Enterprise." Applied Mechanics and Materials 44-47 (December 2010): 71–75. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.71.

Full text
Abstract:
In allusion to the trust evaluation of partner in Dynamic Virtual Enterprise, a trading practice based trust evaluation model was constructed. The trust evaluation process was divided into real-time feedback information based evaluation, trading history based evaluation and comprehensive evaluation, and the computing methods of every process were put forward. In trading history based evaluation, the relative between the weight of every trading and its trading time was researched. A correction factor of evaluation value was introduced in the process of comprehensive evaluation to reduce the inf
APA, Harvard, Vancouver, ISO, and other styles
38

Sharma, Dolly, Shailendra Singh, and Mamta Mittal. "Trust Models in Grid Computing: A Review." Recent Patents on Engineering 13, no. 2 (2019): 94–100. http://dx.doi.org/10.2174/1872212112666180427143757.

Full text
Abstract:
Background: Grid computing relates to a pool of resources to be shared by users in Grid Environment. Security of the resources from users and vice-versa is a significant issue. This is where the notion of trust comes into existence. A number of researchers have proposed models for evaluation of trust in grid computing, but they fail to spot one or the other parameters for trust evaluation. The essence of trust models in grid computing is that they offer autonomic trust management. An autonomic trust model has been patented by Z. Yan and C. Prehofer in 2009. Another patent was published by Anna
APA, Harvard, Vancouver, ISO, and other styles
39

Yin, Pei, Xiao Lan Xie, and De Jian Zhou. "Research on Reputation and Risk Evaluation-Trust for Cloud Environment." Applied Mechanics and Materials 488-489 (January 2014): 1331–35. http://dx.doi.org/10.4028/www.scientific.net/amm.488-489.1331.

Full text
Abstract:
This paper which starts from the characteristics of human social trust relationship, researches the trust in cloud computing environment. At present, the commercial cloud environment exist two main safe problems: one is the cloud platform trust security problems in their own special environment, the second is the security issues on the network of cheating, false, malicious ads and spam trust security . Aiming at solving this problem, on the basis of the existing trust models, this paper studies the cloud environment trust models according to the characteristics of the cloud environment, constr
APA, Harvard, Vancouver, ISO, and other styles
40

Sun, Panjun. "Research on cloud computing service based on trust access control." International Journal of Engineering Business Management 12 (January 1, 2020): 184797901989744. http://dx.doi.org/10.1177/1847979019897444.

Full text
Abstract:
Recently, more and more network fraud incidents have damaged the interests of cloud service traders. To enhance mutual trust and win–win cooperation between the users and the cloud service provider, in the article, we construct a trust access control model for cloud services. First, we propose a trust evaluation method based on direct trust, trust risk, feedback trust, reward penalty, and obligation trust to express the complexity and uncertainty of trust relationship. Second, we propose trust evaluation and weight algorithm of trust factor by information entropy and maximum dispersion; theref
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Siyuan, Robert F. Siegle, and Scotty D. Craig. "Case report for the learning science evaluation checklist." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 561–65. http://dx.doi.org/10.1177/1071181321651133.

Full text
Abstract:
eLearning practitioners are eager to know what factors affect the effectiveness of online learning and how they can implement evidence-based evaluation to examine and improve their organizations. This study adopted the learning sciences evaluation checklist to successfully evaluate a military-based training and learning organization via a semi-structured interview and provide actionable recommendations afterward. The criteria include educational networks, human-centered evaluations, administrator-instructor trust, institution-student trust, organization support-level strategies, support servic
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, Zenan, Liqin Tian, Yi Zhang, and Zhigang Wang. "Web User Trust Evaluation: A Novel Approach Using Fuzzy Petri Net and Behavior Analysis." Symmetry 13, no. 8 (2021): 1487. http://dx.doi.org/10.3390/sym13081487.

Full text
Abstract:
With the development of society and information technology, people’s dependence on the Internet has gradually increased, including online shopping, downloading files, reading books, and online banking. However, how to ensure the safety and legitimacy of these network user behaviors has become the focus of attention. As we all know, cybersecurity and system resilience originate from symmetry. Due to the diversity and unpredictability of cyber-attacks, absolute cybersecurity is difficult to achieve; system resilience indicates that protecting system security should shift from resisting attacks t
APA, Harvard, Vancouver, ISO, and other styles
43

Xu, Zhaosheng. "Research on software trustworthiness measurement evaluation model based on data driven." MATEC Web of Conferences 336 (2021): 08014. http://dx.doi.org/10.1051/matecconf/202133608014.

Full text
Abstract:
in this paper, we construct a data-driven trust evaluation model based on perceptual source. The model takes the monitoring module as the evaluation unit, and the relay node completes the trust evaluation of the sensing node in its monitoring module. The direct trust calculation is realized by the relationship between the sensing node's own data, and the recommended trust is calculated by using the relationship between the neighbor nodes in the monitoring module. Combined with the historical trust, the comprehensive trust of the sensing node is output. In this paper, the credibility of existin
APA, Harvard, Vancouver, ISO, and other styles
44

Walker, Rae. "Can I trust thee? Self-management, trust and evaluation in chronic disease." Australian Journal of Primary Health 9, no. 3 (2003): 34. http://dx.doi.org/10.1071/py03021.

Full text
Abstract:
In this paper trust is viewed as a major issue in the relationship between consumers and providers of health care to people living with chronic diseases. The qualities of trust-based relationships are identified and their relevance to chronic disease self-management discussed. Finally, it is argued that an appropriately conceptualised approach to trust should be included in service evaluations as a means of improving the quality of the relationship between consumers and health care providers.
APA, Harvard, Vancouver, ISO, and other styles
45

S. Ramesh, Et al. "Identifying Trustful Node Using Hybrid Trust Evaluation Method." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2231–37. http://dx.doi.org/10.17762/ijritcc.v11i10.8932.

Full text
Abstract:
A wireless sensor network referred as (WSN) is defined as a collection of distributed sensor nodes to work together for monitoring the physical and environmental conditions. Trust metrics in the wireless sensor networks is denoted as the important problem and it helps in solving the problem of access control, reliable communication, privacy and secure routing scheme. This paper establishes a new kind of approach to evaluate the trust value in WSN. The proposed algorithm and its evaluation made on the trust value of each node seen in the network depends on the metrics, trust attributesand trust
APA, Harvard, Vancouver, ISO, and other styles
46

Zhu, Jinghua. "Wireless Sensor Network Technology Based on Security Trust Evaluation Model." International Journal of Online Engineering (iJOE) 14, no. 04 (2018): 211. http://dx.doi.org/10.3991/ijoe.v14i04.8590.

Full text
Abstract:
Because the current research on wireless sensor networks is not thorough enough, with such shortcomings as lack of objectivity and insufficient accuracy of the trust evaluation model of network nodes, this paper proposes a trust evaluation model with multi-factor comprehensive consideration and Bayesian model, an improved trust evaluation model, by combining trust management mechanism, trust factor, fuzzy set and D-S evidence theory, solving factor singleness and imprecise evaluation in the original model. The simulation results show that the proposed model has good dynamic adaptability, highe
APA, Harvard, Vancouver, ISO, and other styles
47

Zhu, Jian Xin. "A Trustworthy Software Designing Approach and Credibility Evaluation." Applied Mechanics and Materials 513-517 (February 2014): 602–5. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.602.

Full text
Abstract:
Aiming at the problem that the trust chain of TCG cannot insure the dynamic trustworthiness, this paper expands the trust chain and brings in the the trust chain of the trustworthy software driven by trustworthy engine.
APA, Harvard, Vancouver, ISO, and other styles
48

Gogarty, Eoin, Ge Yu, Ioannis Bakolis, Ray McGrath, and Fiona Gaughran. "Economic Evaluation of a Novel Physical Healthcare Advice and Guidance Service in a Mental Health Trust." BJPsych Open 11, S1 (2025): S6. https://doi.org/10.1192/bjo.2025.10088.

Full text
Abstract:
Aims: People with severe mental illnesses experience poorer physical health outcomes compared with the general population, partially related to fragmented care. The Integrating our Mental and Physical Healthcare Systems project implemented an Advice and Guidance Line, supported by colleagues in King’s Health Partners, using the Consultant Connect (CC) app in the South London and Maudsley NHS Foundation Trust to enhance collaborative physical healthcare. This study evaluates the app’s impact on inpatient transfers from mental health wards to acute hospitals, focusing on clinical outcomes and co
APA, Harvard, Vancouver, ISO, and other styles
49

Pan Jun, Sun. "A Trust-Game-Based Access Control Model for Cloud Service." Mobile Information Systems 2020 (July 24, 2020): 1–14. http://dx.doi.org/10.1155/2020/4651205.

Full text
Abstract:
In order to promote mutual trust and win-win cooperation between the users and the providers, we propose a trust-game-based access control model for cloud service in the paper. First, we construct a trust evaluation model based on multiple factors, such as the direct trust, feedback trust, reward punishment, and trust risk and further propose a weight method by maximum discrete degree and information entropy theory; second, we combine trust evaluation with the payoff matrix for game analysis and calculate the mixed Nash equilibrium strategy for the users and service providers; third, we give t
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Junwei, Deyu Li, and Xiaoqin Fan. "A Customer-Centric Trust Evaluation Model for Personalized Service Selection." Scientific Programming 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/4819195.

Full text
Abstract:
Trust is a very important criterion when service customers select desired Web services from a cluster of Web services with the same function. Most existing trust models cannot effectively implement personalized service selection with regard to consumer preferences and expectations. This paper designs a novel trust management method based on peer-to-peer network and presents a customer-centric trust evaluation model for personalized service selection. The trust evaluation model firstly maintains consumer-to-consumer trust values that are calculated according to preference similarity between cus
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!