Academic literature on the topic 'Trust model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trust model"

1

Pike, Kenneth R. "The Trust Model of Children’s Rights." Moral Philosophy and Politics 7, no. 2 (November 26, 2020): 219–37. http://dx.doi.org/10.1515/mopp-2019-0040.

Full text
Abstract:
AbstractIs parental control over children best understood in terms of trusteeship or similar fiduciary obligations? This essay contemplates the elements of legal trusts and fiduciarity as they might relate to the moral relationship between children and parents. Though many accounts of upbringing advocate parent-child relationship models with structural resemblance to trust-like relationships, it is unclear who grants moral trusts, how trustees are actually selected, or how to identify proper beneficiaries. By considering these and other classical elements of relationships of trust, this essay seeks to clarify and explore the trust model’s role, if any, in understanding children’s rights. Such exploration raises the possibility that another element of common law, the duty to rescue, may serve to enhance the trust model of children’s rights.
APA, Harvard, Vancouver, ISO, and other styles
2

Netrvalova, A., and J. Safarik. "Interpersonal Trust Model." SNE Simulation Notes Europe 18, no. 3-4 (December 2009): 55–60. http://dx.doi.org/10.11128/sne.19.tn.09953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Keon-Myung, and Kyung-Mi Lee. "A Fuzzy Trust Model incorporating Dispositional Trust, General Trust, Situational Trust and Reputation." Journal of Korean Institute of Intelligent Systems 16, no. 6 (December 25, 2006): 653–58. http://dx.doi.org/10.5391/jkiis.2006.16.6.653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

SATO, Hiroyuki, and Noriyasu YAMAMOTO. "Elastic Trust Model for Dynamically Evolving Trust Frameworks." IEICE Transactions on Information and Systems E102.D, no. 9 (September 1, 2019): 1617–24. http://dx.doi.org/10.1587/transinf.2018ofi0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al Qundus, Jamal, Adrian Paschke, Sameer Kumar, and Shivam Gupta. "Calculating trust in domain analysis: Theoretical trust model." International Journal of Information Management 48 (October 2019): 1–11. http://dx.doi.org/10.1016/j.ijinfomgt.2019.01.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bellucci, Gabriele. "A Model of Trust." Games 13, no. 3 (May 17, 2022): 39. http://dx.doi.org/10.3390/g13030039.

Full text
Abstract:
Trust is central to a large variety of social interactions. Different research fields have empirically and theoretically investigated trust, observing trusting behaviors in different situations and pinpointing their different components and constituents. However, a unifying, computational formalization of those diverse components and constituents of trust is still lacking. Previous work has mainly used computational models borrowed from other fields and developed for other purposes to explain trusting behaviors in empirical paradigms. Here, I computationally formalize verbal models of trust in a simple model (i.e., vulnerability model) that combines current and prospective action values with beliefs and expectancies about a partner’s behavior. By using the classic investment game (IG)—an economic game thought to capture some important features of trusting behaviors in social interactions—I show how variations of a single parameter of the vulnerability model generates behaviors that can be interpreted as different “trust attitudes”. I then show how these behavioral patterns change as a function of an individual’s loss aversion and expectations of the partner’s behavior. I finally show how the vulnerability model can be easily extended in a novel IG paradigm to investigate inferences on different traits of a partner. In particular, I will focus on benevolence and competence—two character traits that have previously been described as determinants of trustworthiness impressions central to trust. The vulnerability model can be employed as is or as a utility function within more complex Bayesian frameworks to fit participants’ behavior in different social environments where actions are associated with subjective values and weighted by individual beliefs about others’ behaviors. Hence, the vulnerability model provides an important building block for future theoretical and empirical work across a variety of research fields.
APA, Harvard, Vancouver, ISO, and other styles
7

Gordon, Gus, and Jerry W. Gilley. "A trust-leadership model." Performance Improvement 51, no. 7 (August 2012): 28–35. http://dx.doi.org/10.1002/pfi.21284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yamagishi, Toshio, Satoshi Akutsu, Kisuk Cho, Yumi Inoue, Yang Li, and Yoshie Matsumoto. "Two-Component Model of General Trust: Predicting Behavioral Trust from Attitudinal Trust." Social Cognition 33, no. 5 (October 2015): 436–58. http://dx.doi.org/10.1521/soco.2015.33.5.436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Etherton, Terence. "CONSTRUCTIVE TRUSTS: A NEW MODEL FOR EQUITY AND UNJUST ENRICHMENT." Cambridge Law Journal 67, no. 2 (June 19, 2008): 265–87. http://dx.doi.org/10.1017/s0008197308000342.

Full text
Abstract:
A comprehensive review, or what has been variously described as the classification or mapping or taxonomy, of constructive trusts would require analysis of areas of law as diverse as vendor and purchaser transactions, the perfection of imperfect gifts, fully secret and half secret trusts, breach of fiduciary duty, and accessory liability for breach of trust, among several others. The search for an acceptable, universally acknowledged, principle for the establishment of a constructive trust, which gives coherence to past decisions and provides a clear guide for the future, will certainly prove elusive in relation to the many different areas of law and fact in which constructive trusts arise.
APA, Harvard, Vancouver, ISO, and other styles
10

Oriola, Oluwafemi. "Collaborative-Based Dynamic Trust Model for Bring-Your-Own-Device Access Control Management in Cloud Environment." British Journal of Computer, Networking and Information Technology 6, no. 1 (September 13, 2023): 20–34. http://dx.doi.org/10.52589/bjcnit-qakc5nij.

Full text
Abstract:
The operation of bring-your-own-device (BYOD) in the cloud has not only opened cloud servers to more threats but inflicted additional costs on cloud security as it would have to monitor employee devices and their operations. Many organizations therefore have adopted zero trust scheme for BYOD access control management in cloud environment. However, zero trust model introduces extra cost and hostility against internal employees, who have a certain level of trust, as against outsiders. This paper posits that trust quantification for BYOD access control management should be determined by cloud service providers and employers in a dynamic and continuous manner based on session and information values. The paper therefore presents a collaborative-based dynamic trust model that fuses the perspectives of BYOD employer and cloud service provider agents (trustees) for BYOD Nodes (trustors) access control management. The trustees provide prior evidences about the BYOD requests from which plausible inferences are drawn. Three framing of trusts including employee, device and program trusts are formulated based on reliable trust metrics. Dempster-Shafer Belief Function is used to evaluate the belief scores of the trustors’ requests from the probabilities assigned by the trustees. The model is applied to two BYOD nodes, with varying session and information values. The outcomes reveal that the collaborative-based dynamic trust model ensures reduced cost and improved usability compared to zero trust model.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Trust model"

1

Kramdi, Seifeddine. "A modal approach to model computational trust." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30146/document.

Full text
Abstract:
Le concept de confiance est un concept sociocognitif qui adresse la question de l'interaction dans les systèmes concurrents. Quand la complexité d'un système informatique prohibe l'utilisation de solutions traditionnelles de sécurité informatique en amont du processus de développement (solutions dites de type dur), la confiance est un concept candidat, pour le développement de systèmes d'aide à l'interaction. Dans cette thèse, notre but majeur est de présenter une vue d'ensemble de la discipline de la modélisation de la confiance dans les systèmes informatiques, et de proposer quelques modèles logiques pour le développement de module de confiance. Nous adoptons comme contexte applicatif majeur, les applications basées sur les architectures orientées services, qui sont utilisées pour modéliser des systèmes ouverts telle que les applications web. Nous utiliserons pour cela une abstraction qui modélisera ce genre de systèmes comme des systèmes multi-agents. Notre travail est divisé en trois parties, la première propose une étude de la discipline, nous y présentons les pratiques utilisées par les chercheurs et les praticiens de la confiance pour modéliser et utiliser ce concept dans différents systèmes, cette analyse nous permet de définir un certain nombre de points critiques, que la discipline doit aborder pour se développer. La deuxième partie de notre travail présente notre premier modèle de confiance. Cette première solution basée sur un formalisme logique (logique dynamique épistémique), démarre d'une interprétation de la confiance comme une croyance sociocognitive, ce modèle présentera une première modélisation de la confiance. Apres avoir prouvé la décidabilité de notre formalisme. Nous proposons une méthodologie pour inférer la confiance en des actions complexes : à partir de notre confiance dans des actions atomiques, nous illustrons ensuite comment notre solution peut être mise en pratique dans un cas d'utilisation basée sur la combinaison de service dans les architectures orientées services. La dernière partie de notre travail consiste en un modèle de confiance, où cette notion sera perçue comme une spécialisation du raisonnement causal tel qu'implémenté dans le formalisme des règles de production. Après avoir adapté ce formalisme au cas épistémique, nous décrivons trois modèles basés sur l'idée d'associer la confiance au raisonnement non monotone. Ces trois modèles permettent respectivement d'étudier comment la confiance est générée, comment elle-même génère les croyances d'un agent et finalement, sa relation avec son contexte d'utilisation
The concept of trust is a socio-cognitive concept that plays an important role in representing interactions within concurrent systems. When the complexity of a computational system and its unpredictability makes standard security solutions (commonly called hard security solutions) inapplicable, computational trust is one of the most useful concepts to design protocols of interaction. In this work, our main objective is to present a prospective survey of the field of study of computational trust. We will also present two trust models, based on logical formalisms, and show how they can be studied and used. While trying to stay general in our study, we use service-oriented architecture paradigm as a context of study when examples are needed. Our work is subdivided into three chapters. The first chapter presents a general view of the computational trust studies. Our approach is to present trust studies in three main steps. Introducing trust theories as first attempts to grasp notions linked to the concept of trust, fields of application, that explicit the uses that are traditionally associated to computational trust, and finally trust models, as an instantiation of a trust theory, w.r.t. some formal framework. Our survey ends with a set of issues that we deem important to deal with in priority in order to help the advancement of the field. The next two chapters present two models of trust. Our first model is an instantiation of Castelfranchi & Falcone's socio-cognitive trust theory. Our model is implemented using a Dynamic Epistemic Logic that we propose. The main originality of our solution is the fact that our trust definition extends the original model to complex action (programs, composed services, etc.) and the use of authored assignment as a special kind of atomic actions. The use of our model is then illustrated in a case study related to service-oriented architecture. Our second model extends our socio-cognitive definition to an abductive framework that allows us to associate trust to explanations. Our framework is an adaptation of Bochman's production relations to the epistemic case. Since Bochman approach was initially proposed to study causality, our definition of trust in this second model presents trust as a special case of causal reasoning, applied to a social context. We end our manuscript with a conclusion that presents how we would like to extend our work
APA, Harvard, Vancouver, ISO, and other styles
2

Almoaber, Basmah. "Bootstrapping Trust Evaluation Using a Trust Certificate Model." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32141.

Full text
Abstract:
Trust plays a vital role in the decision to initiate any interaction. Rational agents may use past experiences and other agents’ opinions to decide to trust, but due to the nature of open multi-agent systems, where agents can dynamically join and leave the system at any time, agents may find themselves dealing with complete strangers whom neither they nor their friends have encountered before. This situation forces the agents to choose partners randomly, which significantly increases the risk of encountering unreliable agents. For instance, service requesters may become reluctant to initiate communication with newly-joined service providers. And when the newcomers are service requesters, who are willing to exploit the environment, service providers may also hesitate to start any connection with them. As a result, newcomers are excluded from the competition and old agents lose the possibility of interacting with better agents. In this thesis, we address that issue by creating a Trust Certificate (TC) model in which each agent is equipped with a certificate that works as a reference by providing information about its holder. The information is obtained and stored by the agent itself and is available to other agents who request it to evaluate the holder’s trustworthiness for a potential interaction. The stored information is about the agent’s role in the society and its performance in past interactions. The TC model allows agents to retrieve reputation information and make initial trust evaluations when evidence is unavailable. It also helps agents to avoid the need to make random partner selection due to the information scarcity. We show how this model enhances the interaction process between agents by evaluating it in the context of a simulated multi-agent system.
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Jianqiang. "A trust model with statistical foundation." Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/27038.

Full text
Abstract:
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In the face of increasing uncertainty and risk, users and machines must be allowed to reason effectively about the trustworthiness of other entities. In this thesis, we propose a trust model that assists users and machines with decision-making in online interactions by using past behavior as a predictor of likely future behavior. We develop a general method to automatically compute trust based on self-experience and the recommendations of others. Our trust model solves the problem of recommendation combination and detection of unfair recommendations. Our approach involves data analysis methods (Bayesian estimation, Dirichlet distribution), and machine learning methods (Weighted Majority Algorithm). Furthermore, we apply our trust model to several utility models to increase the accuracy of decision-making in different contexts of Web Services. We describe simulation experiments to illustrate its effectiveness, robustness and the evolution of trust.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Xin. "Trust in national identification systems a trust model based on the TRA/TPB /." Online access for everyone, 2004. http://www.dissertations.wsu.edu/Dissertations/summer2004/Xin%5FLi%5F071304.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

ZHU, Peihu. "An improved model for trust-aware recommender systems based on multi-faceted trust." Digital Commons @ Lingnan University, 2016. https://commons.ln.edu.hk/cds_etd/15.

Full text
Abstract:
As customers enjoy the convenience of online shopping today, they face the problem of selecting from hundreds of thousands of products. Recommender systems, which make recommendations by matching products to customers based on the features of the products and the purchasing history of customers, are increasingly being incorporated into e-commerce websites. Collaborative filtering is a major approach to design algorithms for these systems. Much research has been directed toward enhancing the performance of recommender systems by considering various psychological and behavioural factors affecting the behaviour of users, e.g. trust and emotion. While e-commerce firms are keen to exploit information on social trust available on social networks to improve their services, conventional trust-aware collaborative filtering does not consider the multi-facets of social trust. In this research, we assume that a consumer tends to trust different people for recommendations on different types of product. For example, a user trusts a certain reviewer on popular items but may not place as much trust on the same reviewer on unpopular items. Furthermore, this thesis postulates that if we, as online shoppers, choose to establish trust on an individual while we ourselves are reviewing certain products, we value this individual’s opinions on these products and we most likely will value his/her opinions on similar products in future. Based on the above assumptions, this thesis proposes a new collaborative filtering algorithm for deriving multi-faceted trust based on trust establishment time. Experimental results based on historical data from Epinions show that the new algorithm can perform better in terms of accuracy when compared with conventional algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Lu, Gehao. "Neural trust model for multi-agent systems." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17817/.

Full text
Abstract:
Introducing trust and reputation into multi-agent systems can significantly improve the quality and efficiency of the systems. The computational trust and reputation also creates an environment of survival of the fittest to help agents recognize and eliminate malevolent agents in the virtual society. The thesis redefines the computational trust and analyzes its features from different aspects. A systematic model called Neural Trust Model for Multi-agent Systems is proposed to support trust learning, trust estimating, reputation generation, and reputation propagation. In this model, the thesis innovates the traditional Self Organizing Map (SOM) and creates a SOM based Trust Learning (STL) algorithm and SOM based Trust Estimation (STE) algorithm. The STL algorithm solves the problem of learning trust from agents' past interactions and the STE solve the problem of estimating the trustworthiness with the help of the previous patterns. The thesis also proposes a multi-agent reputation mechanism for generating and propagating the reputations. The mechanism exploits the patterns learned from STL algorithm and generates the reputation of the specific agent. Three propagation methods are also designed as part of the mechanism to guide path selection of the reputation. For evaluation, the thesis designs and implements a test bed to evaluate the model in a simulated electronic commerce scenario. The proposed model is compared with a traditional arithmetic based trust model and it is also compared to itself in situations where there is no reputation mechanism. The results state that the model can significantly improve the quality and efficacy of the test bed based scenario. Some design considerations and rationale behind the algorithms are also discussed based on the results.
APA, Harvard, Vancouver, ISO, and other styles
7

Guirguis, Michel. "A multifactor model of investment trust discounts." Thesis, Bournemouth University, 2005. http://eprints.bournemouth.ac.uk/346/.

Full text
Abstract:
A closed-end fund, known as an investment trust in the UK and closed-end fund in the US, is a collective investment company that invests in shares of other companies. This study attempts to describe and explain the persistence of the excess discount return on UK investment trusts and US closed-end funds. The ability to identify which factors best capture return variation is central to applications of multifactor pricing models. So the main purpose of this thesis is the application of a multifactor risk model that will explain the-existence of the excess discount return. Hence, the title of the thesis: "A Multifactor Model of Investment Trust Discounts. A Comparative Study of UK Investment Trusts and US Closed-End Funds" First, the time-series properties of the closed-end funds' net asset values (NAVs) and discounts are investigated. In terms of normality, we find that the UK and US excess NAV returns and discounts are approximately normally distributed. In addition, through Augmented Dickey-Fuller tests, we find that the UK and US discounts are non-stationary, but the excess discount returns and the excess NAV returns are stationary. In terms of multicollinearity, we find that the independent variables included in our models are not closely correlated, so we do not have problems in using them in the regression models in Chapters 7 and 8. Finally, there are no significant differences in the discount during the month of January and other months. In Chapter 7, we study the importance of management performance in terms of excess NAV returns and discount persistence. We use three approaches: Fama and French's (1993) three-factor model, an extended Fama and French model which incorporates a market timing variable, and a performance persistence model used by Carhart (1997) and Dimson and Minio-Kozerski (2001). On average, the six-factor model developed in the thesis can explain 67% of the variation in the excess discount return in the UK market by taking into consideration the market effect, size, the book-to-market effect, momentum, sentiment and expenses. In contrast, Fama and French's (1993) three-factor and Carhart's (1997) four-factor models explain only 42% of the variation of the excess discount return. Similarly, the six-factor model can explain 66% of the variation in the excess discount return in the US market by taking into consideration the same six independent variables. In contrast, Fama and French's (1993) three-factor model explains 59% of the excess discount return variation and Carhart's (1997) four-factor model explains 65% of the variation.
APA, Harvard, Vancouver, ISO, and other styles
8

Wongse-Ek, Woraluck. "Towards a trust model in e-learning." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/400246/.

Full text
Abstract:
When a student is faced with uncertainty in the trustworthiness of a learning activity to meet their intended learning goals, it may cause anxiety and a lack of confidence in the learning. A student’s trust in the learning activity is needed to reduce this uncertainty. This work develops a conceptual trust model for e-learning activities. The proposed student’s trust model is the Learning Outcome-based Trust (LOT) model. The antecedents of trust are represented based on the intended learning outcome (ILO) structures and are used to estimate the trustworthiness values of the learning activity. Once values based on the antecedents of trust are known, these values are used to assess how much the student can trust the learning activity. The LOT model was evaluate in two real learning situation: (1) where information about the trustworthiness of the learning activity was ambiguous, and (2) where information about the trustworthiness of the learning activity was clear. Students’ trust mainly related to their propensity to trust and their prior knowledge when the trustworthiness of the learning activity was ambiguous. In contrast, students’ trust mainly related to their perceived trustworthiness of the learning activity when the trustworthiness of the learning activity was clear. The LOT model showed significant prediction of student’s trust. In addition, when the student learning path was used, trust was predicted significantly better than when the learning path was not given. The LOT model may have useful application in recommendation systems or intelligent tutoring systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Zuppa, Diodoro. "Model for developing trust in construction management." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Popa, Clara L. "Initial Trust Formation in Temporary Small Task Groups: Testing a Model of Swift Trust." [Kent, Ohio] : Kent State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1113573275.

Full text
Abstract:
Thesis (Ph.D.)--Kent State University, 2005.
Title from PDF t.p. (viewed Sept. 12, 2006). Advisor: Rebecca R. Rubin. Keywords: temporary groups; swift trust; trust; organizational task groups. Includes survey instruments. Includes bibliographical references (p. 113-121).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Trust model"

1

Rino, Falcone, ed. Trust theory: A socio-cognitive and computational model. Chichester: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Castelfranchi, Cristiano. Trust theory: A socio-cognitive and computational model. Chichester: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Castelfranchi, Cristiano. Trust theory: A socio-cognitive and computational model. Chichester, West Sussex, U.K: J. Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mukherjee, Amarendra Nath. Mukherjee on the Indian Trusts Act, 1882, the Charitable & Religious Trusts Act, 1920, model trust deeds. 4th ed. Kolkata: Kamal Law House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mukherjee, Amarendra Nath. Mukherjee on the Indian Trusts Act, 1882, the Charitable & Religious Trusts Act, 1920, model trust deeds. 4th ed. Kolkata: Kamal Law House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mukherjee, Amarendra Nath. Mukherjee on the Indian Trusts Act, 1882, the Charitable & Religious Trusts Act, 1920, model trust deeds. 4th ed. Kolkata: Kamal Law House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mishler, William. What are the political consequences of trust?: A Russian structural equation model. Glasgow: University of Strathclyde, Centre for the Study of Public Policy, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Majumdar, R. Law of trust: Magnificant work brings a absolutely fresh approach to the law relating to trust with model forms. Allahabad: Dwivedi Law Agency, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Poquiz, Romeo D. V. Financial planning model for the Armed Forces of the Philippines Provident Trust Fund. Monterey, Calif: Naval Postgraduate School, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saarloos, Wim, and José Dijck. The Dutch Polder Model in science and research. NL Amsterdam: Amsterdam University Press, 2017. http://dx.doi.org/10.5117/9789462988163.

Full text
Abstract:
Scientific research in the Netherlands is doing remarkably well. Dutch researchers, universities and institutes reside at or near the top of international rankings. In this essay, José van Dijck and Wim van Saarloos, the president and vice-president of the Royal Netherlands Academy of Arts and Sciences (KNAW), explore how such a small country could become a global player in science and research. They highlight interconnectedness, collaboration, trust, and interwoven research and education among the quintessentially Dutch factors that paved the way to the success. They also show, however, that the country's efforts to reach the top sometimes chip away at these trusted foundations. Investments in its research base are lagging, and some typically Dutch strengths have recently come under pressure. They close off with some suggestions on how the country may turn the tide, prolong its great achievements, and ensure a leading role for Dutch research in the nation's future.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Trust model"

1

Botêlho, Vanderson, Fabríco Enembreck, Bráulio C. ávila, Hilton Azevedo, and Edson E. Scalabrin. "Certified Trust Model." In IFIP Advances in Information and Communication Technology, 41–49. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0221-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garbis, Jason, and Jerry W. Chapman. "A Zero Trust Policy Model." In Zero Trust Security, 211–38. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Davies, Jeanie. "The model:." In The Trust Revolution in Schools, 36–38. Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429344992-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Melaye, Dimitri, and Yves Demazeau. "Bayesian Dynamic Trust Model." In Multi-Agent Systems and Applications IV, 480–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11559221_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Audet, Charles, and Warren Hare. "Model-Based Trust Region." In Derivative-Free and Blackbox Optimization, 201–18. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68913-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

ElSalamouny, Ehab, Vladimiro Sassone, and Mogens Nielsen. "HMM-Based Trust Model." In Formal Aspects in Security and Trust, 21–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12459-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Špánek, Roman, and Pavel Tyl. "The Heritage Trust Model." In Communications in Computer and Information Science, 307–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22027-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Banafa, Ahmed. "The Zero Trust Model." In Quantum Computing and Other Transformative Technologies, 127–29. New York: River Publishers, 2023. http://dx.doi.org/10.1201/9781003339175-31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dong, Yucheng, Zhaogang Ding, and Gang Kou. "Strategic Manipulations with Trust Relationships." In Social Network DeGroot Model, 83–112. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0421-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Noor, Talal H., Quan Z. Sheng, and Athman Bouguettaya. "Scalable Availability Model." In Trust Management in Cloud Services, 59–68. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12250-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trust model"

1

Kolybelnikov, Alexander I. "Trust Model." In 2018 Engineering and Telecommunication (EnT-MIPT). IEEE, 2018. http://dx.doi.org/10.1109/ent-mipt.2018.00041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rahman, S. M. Mizanoor, Behzad Sadrfaridpour, and Yue Wang. "Trust-Based Optimal Subtask Allocation and Model Predictive Control for Human-Robot Collaborative Assembly in Manufacturing." In ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9850.

Full text
Abstract:
We develop a one human-one robot hybrid cell for collaborative assembly in manufacturing. The selected task is to assemble a few LEGO parts into a final assembled product following specified instructions and sequence in collaboration between the human and the robot. We develop a two-level feedforward optimization strategy that determines the optimal subtask allocation between the human and the robot for the selected assembly before the assembly starts. We derive dynamics models for human’s trust in the robot and the robot’s trust in the human for the assembly and estimate the trusts. The aim is to maintain satisfactory trust levels between the human and the robot through the application of the optimal subtask allocation. Again, subtask re-allocation is proposed to regain trusts if the trusts reduce to below the specified levels. Furthermore, it is hypothesized that fluctuations in human’s trust in the robot may cause fluctuations in human’s speeds and the human may appreciate if the robot adjusts its speeds with changes in human speeds. Hence, trust-based Model Predictive Control (MPC) is proposed to minimize the variations between human and robot speeds and to maximize the trusts. Experiment results prove the effectiveness of the hybrid cell, the feedforward optimal subtask allocation and of the trust-based MPC. The results also show that the overall assembly performance can be enhanced and the performance status can be monitored through a single dynamic parameter, i.e. the trust.
APA, Harvard, Vancouver, ISO, and other styles
3

Netrvalova, Arnostka, and Jiri Safarik. "Phenomenal Trust Model." In 23rd European Conference on Modelling and Simulation. ECMS, 2009. http://dx.doi.org/10.7148/2009-0328-0333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dang, Quang-Vinh, and Claudia-Lavinia Ignat. "Computational Trust Model for Repeated Trust Games." In 2016 IEEE Trustcom/BigDataSE/I​SPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Yanli, Keqiu Li, Yong Zhang, and Lianpeng Xu. "A Service Trust Model with Passive Trust." In 2008 IFIP International Conference on Network and Parallel Computing (NPC). IEEE, 2008. http://dx.doi.org/10.1109/npc.2008.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang Haowei and Tan Yubo. "P2P trust model in the trust value." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5564867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jiang, Hao, Yang Li, and Yongjun Xu. "User-Centered Trust Model Visibility of Trust Technologies." In Trusted Computing (UIC/ATC). IEEE, 2010. http://dx.doi.org/10.1109/uic-atc.2010.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abd El-Haleem, Ahmed M., Ihab A. Ali, Ibrahim I. Ibrahim, and Abdel Rahman H. El-Sawy. "Trust model for TRIDNT trust based routing Protocol." In 2010 2nd International Conference on Computer Technology and Development (ICCTD). IEEE, 2010. http://dx.doi.org/10.1109/icctd.2010.5645954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Wenzhong, Cuanhe Huang, Bo Wang, Tong Wang, and Zhenyu Zhang. "A General Trust Model Based on Trust Algebra." In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kodali, Ravi Kishore, and SreeRamya Soratkal. "Trust model for WSN." In 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 2015. http://dx.doi.org/10.1109/icatcct.2015.7457012.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trust model"

1

Morrow, Timothy B., Christopher Larkin, II Stoddard, Elm Robert W., and Joseph P. Wireless Emergency Alerts: Trust Model Simulations. Fort Belvoir, VA: Defense Technical Information Center, February 2014. http://dx.doi.org/10.21236/ada610096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Mei Hua, Charlene Schwartz, Joseph Lyons, Kevin Eschleman, Fang Chen, and Johanna Culbertson. Exploring a Dynamic Model of Trust Management. Fort Belvoir, VA: Defense Technical Information Center, June 2014. http://dx.doi.org/10.21236/ada609553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Booth, Harold, and Adam Halbardier. Trust model for security automation data 1.0 (TMSAD). Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schwartz, Charlene, Joseph Lyons, Kevin Eschleman, Mei Hua Lin, Fang Chen, Asif Khawaja, Natalie Ruiz, Johanna Culbertson, Patrick Clark, and Corinne Wright. Exploring a Dynamic Model of Trust Management Presentation. Fort Belvoir, VA: Defense Technical Information Center, August 2013. http://dx.doi.org/10.21236/ada601994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reith, Mark G., Jianwei Niu, and William H. Winsborough. Apply Model Checking to Security Analysis in Trust Management. Fort Belvoir, VA: Defense Technical Information Center, February 2007. http://dx.doi.org/10.21236/ada462754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Walker, David. The InCommon Federation Trust Model and the Steward Program. Internet2, August 2016. http://dx.doi.org/10.26869/ti.126.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maiden, Wendy M. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems. Office of Scientific and Technical Information (OSTI), May 2010. http://dx.doi.org/10.2172/1021296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ray, Indrajit, and Indrakshi Ray. A Model of Trust for Developing Trustworthy Systems From Untrustworthy Actors. Fort Belvoir, VA: Defense Technical Information Center, April 2007. http://dx.doi.org/10.21236/ada468853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zuniga, Jorge, Malcolm McCurry, and J. G. Trafton. A Process Model of Trust in Automation: A Signal Detection Theory Based Approach. Fort Belvoir, VA: Defense Technical Information Center, January 2014. http://dx.doi.org/10.21236/ada618894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eilam, David. An Animal Model for Collective Behavior in Humans: The Impact of Manipulated Trust and Aggression. Fort Belvoir, VA: Defense Technical Information Center, April 2014. http://dx.doi.org/10.21236/ada611566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography