To see the other types of publications on this topic, follow the link: Trust model.

Journal articles on the topic 'Trust model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trust model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pike, Kenneth R. "The Trust Model of Children’s Rights." Moral Philosophy and Politics 7, no. 2 (November 26, 2020): 219–37. http://dx.doi.org/10.1515/mopp-2019-0040.

Full text
Abstract:
AbstractIs parental control over children best understood in terms of trusteeship or similar fiduciary obligations? This essay contemplates the elements of legal trusts and fiduciarity as they might relate to the moral relationship between children and parents. Though many accounts of upbringing advocate parent-child relationship models with structural resemblance to trust-like relationships, it is unclear who grants moral trusts, how trustees are actually selected, or how to identify proper beneficiaries. By considering these and other classical elements of relationships of trust, this essay seeks to clarify and explore the trust model’s role, if any, in understanding children’s rights. Such exploration raises the possibility that another element of common law, the duty to rescue, may serve to enhance the trust model of children’s rights.
APA, Harvard, Vancouver, ISO, and other styles
2

Netrvalova, A., and J. Safarik. "Interpersonal Trust Model." SNE Simulation Notes Europe 18, no. 3-4 (December 2009): 55–60. http://dx.doi.org/10.11128/sne.19.tn.09953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Keon-Myung, and Kyung-Mi Lee. "A Fuzzy Trust Model incorporating Dispositional Trust, General Trust, Situational Trust and Reputation." Journal of Korean Institute of Intelligent Systems 16, no. 6 (December 25, 2006): 653–58. http://dx.doi.org/10.5391/jkiis.2006.16.6.653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

SATO, Hiroyuki, and Noriyasu YAMAMOTO. "Elastic Trust Model for Dynamically Evolving Trust Frameworks." IEICE Transactions on Information and Systems E102.D, no. 9 (September 1, 2019): 1617–24. http://dx.doi.org/10.1587/transinf.2018ofi0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al Qundus, Jamal, Adrian Paschke, Sameer Kumar, and Shivam Gupta. "Calculating trust in domain analysis: Theoretical trust model." International Journal of Information Management 48 (October 2019): 1–11. http://dx.doi.org/10.1016/j.ijinfomgt.2019.01.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bellucci, Gabriele. "A Model of Trust." Games 13, no. 3 (May 17, 2022): 39. http://dx.doi.org/10.3390/g13030039.

Full text
Abstract:
Trust is central to a large variety of social interactions. Different research fields have empirically and theoretically investigated trust, observing trusting behaviors in different situations and pinpointing their different components and constituents. However, a unifying, computational formalization of those diverse components and constituents of trust is still lacking. Previous work has mainly used computational models borrowed from other fields and developed for other purposes to explain trusting behaviors in empirical paradigms. Here, I computationally formalize verbal models of trust in a simple model (i.e., vulnerability model) that combines current and prospective action values with beliefs and expectancies about a partner’s behavior. By using the classic investment game (IG)—an economic game thought to capture some important features of trusting behaviors in social interactions—I show how variations of a single parameter of the vulnerability model generates behaviors that can be interpreted as different “trust attitudes”. I then show how these behavioral patterns change as a function of an individual’s loss aversion and expectations of the partner’s behavior. I finally show how the vulnerability model can be easily extended in a novel IG paradigm to investigate inferences on different traits of a partner. In particular, I will focus on benevolence and competence—two character traits that have previously been described as determinants of trustworthiness impressions central to trust. The vulnerability model can be employed as is or as a utility function within more complex Bayesian frameworks to fit participants’ behavior in different social environments where actions are associated with subjective values and weighted by individual beliefs about others’ behaviors. Hence, the vulnerability model provides an important building block for future theoretical and empirical work across a variety of research fields.
APA, Harvard, Vancouver, ISO, and other styles
7

Gordon, Gus, and Jerry W. Gilley. "A trust-leadership model." Performance Improvement 51, no. 7 (August 2012): 28–35. http://dx.doi.org/10.1002/pfi.21284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yamagishi, Toshio, Satoshi Akutsu, Kisuk Cho, Yumi Inoue, Yang Li, and Yoshie Matsumoto. "Two-Component Model of General Trust: Predicting Behavioral Trust from Attitudinal Trust." Social Cognition 33, no. 5 (October 2015): 436–58. http://dx.doi.org/10.1521/soco.2015.33.5.436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Etherton, Terence. "CONSTRUCTIVE TRUSTS: A NEW MODEL FOR EQUITY AND UNJUST ENRICHMENT." Cambridge Law Journal 67, no. 2 (June 19, 2008): 265–87. http://dx.doi.org/10.1017/s0008197308000342.

Full text
Abstract:
A comprehensive review, or what has been variously described as the classification or mapping or taxonomy, of constructive trusts would require analysis of areas of law as diverse as vendor and purchaser transactions, the perfection of imperfect gifts, fully secret and half secret trusts, breach of fiduciary duty, and accessory liability for breach of trust, among several others. The search for an acceptable, universally acknowledged, principle for the establishment of a constructive trust, which gives coherence to past decisions and provides a clear guide for the future, will certainly prove elusive in relation to the many different areas of law and fact in which constructive trusts arise.
APA, Harvard, Vancouver, ISO, and other styles
10

Oriola, Oluwafemi. "Collaborative-Based Dynamic Trust Model for Bring-Your-Own-Device Access Control Management in Cloud Environment." British Journal of Computer, Networking and Information Technology 6, no. 1 (September 13, 2023): 20–34. http://dx.doi.org/10.52589/bjcnit-qakc5nij.

Full text
Abstract:
The operation of bring-your-own-device (BYOD) in the cloud has not only opened cloud servers to more threats but inflicted additional costs on cloud security as it would have to monitor employee devices and their operations. Many organizations therefore have adopted zero trust scheme for BYOD access control management in cloud environment. However, zero trust model introduces extra cost and hostility against internal employees, who have a certain level of trust, as against outsiders. This paper posits that trust quantification for BYOD access control management should be determined by cloud service providers and employers in a dynamic and continuous manner based on session and information values. The paper therefore presents a collaborative-based dynamic trust model that fuses the perspectives of BYOD employer and cloud service provider agents (trustees) for BYOD Nodes (trustors) access control management. The trustees provide prior evidences about the BYOD requests from which plausible inferences are drawn. Three framing of trusts including employee, device and program trusts are formulated based on reliable trust metrics. Dempster-Shafer Belief Function is used to evaluate the belief scores of the trustors’ requests from the probabilities assigned by the trustees. The model is applied to two BYOD nodes, with varying session and information values. The outcomes reveal that the collaborative-based dynamic trust model ensures reduced cost and improved usability compared to zero trust model.
APA, Harvard, Vancouver, ISO, and other styles
11

Zohra Filali, Fatima, and Belabbes Yagoubi. "Global Trust: A Trust Model for Cloud Service Selection." International Journal of Computer Network and Information Security 7, no. 5 (April 8, 2015): 41–50. http://dx.doi.org/10.5815/ijcnis.2015.05.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Xu, Zhiyun, Xiaoyao Zheng, Haiyan Zhang, and Yonglong Luo. "A Novel Travel Group Recommendation Model Based on User Trust and Social Influence." Mobile Information Systems 2021 (August 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/7080116.

Full text
Abstract:
The interactions between group members often have a significant impact on the results of group recommendations. The traditional group recommendation algorithm does not consider the trust and social influence among users. It involves a low utilization rate of social relationship information, which leads to a low accuracy and satisfaction of group recommendations. Considering these issues, in this study, we propose a travel group recommendation model based on user trust and social influence. Based on the user trust relationship, this model defines the user direct and indirect trust and calculates the user global trust by combining the two trusts. Subsequently, the PageRank algorithm is used to calculate the social influence of users based on their interaction relationship history. Thereafter, a consensus model integrating the intra- and intergroup prediction scores is designed by integrating users’ global trust and social influence to realize group recommendations for tourist attractions. Comparison experiments with several well-known group recommendation models for datasets of different scenic spots in Beijing demonstrate that the proposed model provides a better recommendation performance.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Guanfeng, Yan Wang, and Mehmet Orgun. "Trust Transitivity in Complex Social Networks." Proceedings of the AAAI Conference on Artificial Intelligence 25, no. 1 (August 4, 2011): 1222–29. http://dx.doi.org/10.1609/aaai.v25i1.8087.

Full text
Abstract:
In Online Social Networks (OSNs), participants can conduct rich activities, where trust is one of the most important factors for their decision making. This necessitates the evaluation of the trustworthiness between two unknown participants along the social trust paths between them based on the trust transitivity properties (i.e., if A trusts B and B trusts C, then A can trust C to some extent). In order to compute more reasonable trust value between two unknown participants, a critical and challenging problem is to make clear how and to what extent trust is transitive along a social trust path. To address this problem, we first propose a new complex social network structure that takes, besides trust, social relationships, recommendation roles and preference similarity between participants into account. These factors have significant influence on trust transitivity. We then propose a general concept, called Quality of Trust Transitivity (QoTT), that takes any factor with impact on trust transitivity as an attribute to illustrate the ability of a trust path to guarantee a certain level of quality in trust transitivity. Finally, we propose a novel Multiple QoTT Constrained Trust Transitivity (MQCTT) model. The results of our experiments demonstrate that our proposed MQCTT model follows the properties of trust and the principles illustrated in social psychology, and thus can compute more resonable trust values than existing methods that consider neither the impact of social aspects nor the properties of trust.
APA, Harvard, Vancouver, ISO, and other styles
14

Blanchard, Anita L., Jennifer L. Welbourne, and Marla D. Boughton. "A MODEL OF ONLINE TRUST." Information, Communication & Society 14, no. 1 (February 2011): 76–106. http://dx.doi.org/10.1080/13691181003739633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Martin, Dick. "Towards a model of trust." Journal of Business Strategy 35, no. 4 (July 15, 2014): 45–51. http://dx.doi.org/10.1108/jbs-05-2014-0053.

Full text
Abstract:
Purpose – This article aims to hypothesize a model of trust in both senses of the word – a model, as in something to emulate, and a model as in a structural framework that describes its components. Almost all business people agree that winning and keeping the trust of customers, investors, employees and other stakeholders is critical to business success. There is also broad agreement that trust in business and government has been in serious decline over the past few decades, as documented in a number of studies. Ironically, however, there is little agreement on the nature of trust. Researchers and strategists use the word loosely, without a common definition of its components and with no clear understanding of the process by which it is built, nurtured – and lost. Design/methodology/approach – Based on syndicated research and the more than three-decades experience in public relations, the author suggests that trust has both rational and emotional components that arise from stakeholders’ perception of their own affinity with a brand, company or individual, as well as their judgments of its competencies and purpose. Stakeholder perceptions along these dimensions can be displayed within a three-dimensional matrix, which can explain a range of rational/emotional reactions ranging from simple disappointment and begrudging respect to complete distrust and unquestioned trust. Findings – The model of trust is useful for analyzing a brand, company or individual’s present trust position. It will also enable strategists to design a thoughtful, balanced approach to maintaining or improving stakeholder trust. The model allows strategists to articulate a set of actions and behaviors that will build on strengths, fill voids and correct past errors. Research limitations/implications – This is a theoretical hypothesis that still needs to be tested, but it appears to present a useful approach to considering issues of trust. Originality/value – The new model builds on existing research to address an issue that has become even more critical to organizations and individuals in a world of instant communication and everyman publishing. Applying the model to business decision-making will protect firms from inadvertently losing stakeholder trust and enhance their ability to build even stronger stakeholder relationships.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhao, Yi-zhu, Yan-hua Zhao, and Hong-wei Lu. "History-based trust negotiation model." Journal of Shanghai University (English Edition) 13, no. 2 (April 2009): 150–54. http://dx.doi.org/10.1007/s11741-009-0212-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tajeddine, Ayman, Ayman Kayssi, Ali Chehab, and Hassan Artail. "Fuzzy reputation-based trust model." Applied Soft Computing 11, no. 1 (January 2011): 345–55. http://dx.doi.org/10.1016/j.asoc.2009.11.025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Martins, Nico. "A model for managing trust." International Journal of Manpower 23, no. 8 (December 2002): 754–69. http://dx.doi.org/10.1108/01437720210453984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Knapp, Joshua R., Therese A. Sprinkle, Michael J. Urick, and Kelly A. Delaney‐Klinger. "The belonging model of trust." Nonprofit Management and Leadership 30, no. 1 (May 24, 2019): 133–53. http://dx.doi.org/10.1002/nml.21370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chadwick, D. W., A. J. Young, and N. K. Cicovic. "Merging and extending the PGP and PEM trust models-the ICE-TEL trust model." IEEE Network 11, no. 3 (1997): 16–24. http://dx.doi.org/10.1109/65.587045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Xia, and Zhengli Zhai. "Trust computation in web services based on Beth's trust model." International Journal of Intelligent Internet of Things Computing 1, no. 3 (2021): 173. http://dx.doi.org/10.1504/ijiitc.2021.115709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zhai, Zhengli, and Xia Sun. "Trust computation in web services based on Beth's trust model." International Journal of Intelligent Internet of Things Computing 1, no. 3 (2021): 173. http://dx.doi.org/10.1504/ijiitc.2021.10038546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Li, Fengyin, Shuang Zhao, and Jian Zhou. "Research on dynamic trust model based on recommendation trust iteration." International Journal of Computing Science and Mathematics 7, no. 1 (2016): 20. http://dx.doi.org/10.1504/ijcsm.2016.076037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

E, Hai-hong, Hai-long LIU, Mei-na SONG, and Hai-song ZHANG. "A trans-domain convergence trust model for network trust architecture." Journal of China Universities of Posts and Telecommunications 14 (October 2007): 119–23. http://dx.doi.org/10.1016/s1005-8885(08)60025-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Xin, Anwitaman Datta, and Krzysztof Rzadca. "Trust beyond reputation: A computational trust model based on stereotypes." Electronic Commerce Research and Applications 12, no. 1 (January 2013): 24–39. http://dx.doi.org/10.1016/j.elerap.2012.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Shibin, Zhihai Xie, Yifen Yin, Yan Chang, Zhiwei Sheng, Lili Yan, Haichun Wang, Guihua Han, Yuanyuan Huang, and Guogen Wan. "Study on Quantum Trust Model Based on Node Trust Evaluation." Chinese Journal of Electronics 26, no. 3 (May 1, 2017): 608–13. http://dx.doi.org/10.1049/cje.2016.11.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Bellini, Luca, and Matteo Pettinari. "I trust per i soggetti deboli." gennaio-febbraio, no. 1 (February 3, 2022): 210–18. http://dx.doi.org/10.35948/1590-5586/2022.65.

Full text
Abstract:
TesiL’articolo individua nello svantaggio e negli ostacoli che intervengono nella vita, la ragione principale dei trust per soggetti deboli. In seguito, presenta un’analisi dello scopo di questi trust e introduce il modello del Trust Dopo di Noi, sottolineandone il suo particolare valore umano e sociale. The author's viewThe article identifies the main reason why trusts for vulnerable people are made in disadvantage and in life’s obstacles. In addition, the paper presents an analysis of these trusts’ purpose and introduces the “Trust Dopo di Noi” model pointing out it’s peculiar human and social value.
APA, Harvard, Vancouver, ISO, and other styles
28

Al-Rakhami, Mabrook S., and Majed Al-Mashari. "A Blockchain-Based Trust Model for the Internet of Things Supply Chain Management." Sensors 21, no. 5 (March 4, 2021): 1759. http://dx.doi.org/10.3390/s21051759.

Full text
Abstract:
Accurate data and strategic business processes are crucial to all parties in a supply chain system. However, the absence of mutual trust can create a barrier to implementation. Several studies have shown that supply chains face challenges arising from a lack of trust with respect to the sharing of data. How well each party trusts the data they receive can have a profound influence on management decisions. Blockchain technology has been widely used to process cryptocurrency transactions. Recently, it has also proved to be effective in creating trust in the Internet of things (IoT) domain. Blockchain technology can facilitate mutual trust between parties who would otherwise have been doubtful of each other’s data, allowing for more effective and secure sharing of data. However, if the blockchain is not IoT-optimized, companies can experience significant delays and the need for extensive computational capacity. Moreover, there are still some limitations regarding the consensus between the nodes in the traditional consensus approaches. Here, we propose an alternative approach to creating trust in supply chains with diverse IoT elements. Our streamlined trust model simplifies data sharing and reduces computational, storage, and latency requirements while increasing the security of the IoT-based supply chain management. We evaluate the suggested model using simulations and highlight its viability.
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Feng Yin, and Pei Yu Liu. "A Trust Management Model in Electronic Commerce Applications." Applied Mechanics and Materials 263-266 (December 2012): 2669–72. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2669.

Full text
Abstract:
Most current trust management systems cannot precisely reflect the dynamic feature of trust status. Based on the fundamental trust management principles and the thin client requirements in electronic commerce applications, by introducing the concept of Important Factor in trust calculation, a centralized trust management architecture and an efficient trust evaluation method were proposed. The trust evaluation method advocates defining as less formulae as possible to enable a simple and efficient trust evaluation system. And the parameters in trust evaluation equation can vary to adapt to different application environments. The simulation shows the new trust management model could precisely reflect the dynamic feature of trust status.
APA, Harvard, Vancouver, ISO, and other styles
30

Yuan, Lian Hai, and Hua Chun Liu. "PKI Trust Model Analysis and Research." Applied Mechanics and Materials 427-429 (September 2013): 2445–48. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2445.

Full text
Abstract:
The basic idea of trust model is to define and expect the entity trustiness according to the history behavior of an entity; it was firstly proposed to solve the question of the trust evaluation in distributed system. And the trustiness is an important reference for choosing an object entity to cooperate. The choice of trust model process in the implementation of public key infrastructure is a key starting step. Paper firstly introduces the concept of trust and trust model, and then the situation of the study was introduced. Finally we compared typically trust model.
APA, Harvard, Vancouver, ISO, and other styles
31

Zhenzhen Liu, Zhenzhen Liu, Rui Zhou Zhenzhen Liu, Kangqian Huang Rui Zhou, Xin Hu Kangqian Huang, Kaiyang Deng Xin Hu, Binsi Cai Kaiyang Deng, and Kaiguo Yuan Binsi Cai. "An Efficient and Reliable Blockchain-based Trust Management Model for Electricity Trading Terminal." 電腦學刊 34, no. 3 (June 2023): 251–71. http://dx.doi.org/10.53106/199115992023063403018.

Full text
Abstract:
<p>A safe and reliable terminal environment is crucial to ensure the security of the electricity trading system. The existing terminal security system based on identity authentication and access control has internal threats that are difficult to solve. For example, multiple internal malicious nodes cause broadcast message tampering attacks and malicious packet loss, resulting in message dissemination failure. Existing blockchain-based trust management systems are good for addressing insider threats, but suffer from low efficiency. In order to solve the internal threat problem of the electric electricity trading system, from the perspective of trust evaluation and trust management of the terminal environment, an efficient and reliable blockchain-based electric trading terminal (ERBTM) trust management model is proposed. First of all, we collect a variety of trust factors to evaluate the credibility of the terminal, which solves the problem of accuracy in the process of trust assessment; secondly, we improve the speed of storing trust values on the chain and ensure the robustness of the system by improving the consensus algorithm; Finally, we designed the structure of the block that stores the trust value to ensure that the trust value is not tampered with. The experimental results show that, compared with similar methods, the ERBTM model can effectively deal with the endogenous security threats of terminals in the electricity trading environment, and has significant advantages in terms of efficiency and reliability. </p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Rubin, Victoria. "Trust Incident Account Model: Preliminary Indicators for Trust Rhetoric and Trust or Distrust in Blogs." Proceedings of the International AAAI Conference on Web and Social Media 3, no. 1 (March 20, 2009): 300–303. http://dx.doi.org/10.1609/icwsm.v3i1.13990.

Full text
Abstract:
This paper defines a concept of trust incident accounts as verbal reports of empirical episodes in which a trustor has reached a state of positive or negative expectations of a trustee’s behavior under associated risks. Such expectations are equated to trust and distrust, correspondingly, and present a sharp contrast with hypocritical use of trust rhetoric with ulterior motives such as an attempt to manipulate readers or gain trustworthiness. Distinguishing the three: trust, distrust, and trust rhetoric, is formulated as a new challenge in sentiment analysis and opinion-mining. Based on a preliminary exploration of trust narratives in blogs, 14 categories of textual indicators were identified manually. The finer-grain analytical model of trust incident accounts is proposed to include 12 information extraction frame components: trustor, trustee, source, textual clue, trust valence, risks, reasons, actions, trustor-trustee relationship, narrow context, broad domain, and complements. The study draws a cross-disciplinary theoretical bridge from social science and information technology trust literature to opinion-mining, and emphasizes the value of understanding trust in longer-term social relations.
APA, Harvard, Vancouver, ISO, and other styles
33

McLeary, Carvell N., and Paula A. Cruise. "A context-specific model of organizational trust." Cross Cultural Management 22, no. 2 (May 5, 2015): 297–320. http://dx.doi.org/10.1108/ccm-11-2013-0180.

Full text
Abstract:
Purpose – Employee trust research has been criticized for restricted theoretical conceptualization, limited contextual application and low replication of measures in organizational studies. The purpose of this paper is to expand the theoretical framework underpinning individual-level organizational trust to include cognitive and socio-affective components in order to examine trust determinants in a unique cultural setting. Design/methodology/approach – A national survey of 653 employees from six companies in Jamaica completed the perceived organizational support scale, perceived organizational justice scale, employee trust propensity scale and the organizational trust measure (Rawlins, 2008) after focus groups revealed the role of socio-cultural values in employee trust relationships. Findings – Controlling for common methods variance, confirmatory factor analyses revealed that a model of organizational trust that included a combination of cognitive and socio-affective determinants was more valid in the Jamaican culture than a model comprised of cognitive determinants alone. National social values of justice and respect were significant determinants of employee trust. Results also provide validity evidence for the previously non-replicated Rawlins trust scale, thereby, providing future researchers with a measure that can be readily replicated. Research limitations/implications – Employee trust levels influenced participation and consequently restricted the sample size and industry profile of the survey. Cross-cultural trust researchers are, therefore, encouraged to design studies with similar subject loss projections. Originality/value – Strict focus on the collectivistic/individualistic dimension of culture restricts researchers’ ability to measure trust effectively across a range of settings. The authors, therefore, propose the uncertainty avoidance dimension as a more valid paradigm to understand inter-cultural differences in trust orientations, particularly in restricted trust domains.
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Feng, and Ya Li Si. "A Dynamic Trust Evaluation Model for Internet Computing." Applied Mechanics and Materials 397-400 (September 2013): 1949–53. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1949.

Full text
Abstract:
Trust mechanism has been identified as one of key areas in the field of Internet security. Our objective in this paper is to develop a dynamic trust evaluation model for Internet computing. The proposed scheme divides the recommendation trust into the direct recommendation trust and the indirect recommendation trust, and considers variety of factors to calculate the two types of recommendation trust degree. Simulation results show that, compared to the existing trust model, the model can effectively improve the accuracy of trust evaluation, and provide a better capacity of resisting malicious entities.
APA, Harvard, Vancouver, ISO, and other styles
35

Elghomary, Khadija, Driss Bouzidi, and Najima Daoudi. "Study and review of OSN and SIoT trust models: towards a dynamic MOOC trust model." International Journal of Multimedia Intelligence and Security 3, no. 4 (2020): 407. http://dx.doi.org/10.1504/ijmis.2020.114796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Elghomary, Khadija, Driss Bouzidi, and Najima Daoudi. "Study and review of OSN and SIoT trust models: towards a dynamic MOOC trust model." International Journal of Multimedia Intelligence and Security 3, no. 4 (2020): 407. http://dx.doi.org/10.1504/ijmis.2020.10037143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zou, Hong, Tian Wang, Li Hao Wei, and Lei Cui. "A Trust Model Award Content Security and Rating Supervision Model." Advanced Materials Research 655-657 (January 2013): 1765–69. http://dx.doi.org/10.4028/www.scientific.net/amr.655-657.1765.

Full text
Abstract:
With the rapid expansion of negative information in the Internet, the content rating technology is developed. This paper proposed a rating supervision model based on content rating considering trust model. We firstly analyze the behavior and reputation of network entities from the following dimensions: data dimension, time dimension and application dimension, and then applied artificial neural network to construct the trust model referred to the trust relationship in human society network. At last, we proposed the rating supervision model based on the trust model. It is proved that the rating supervision model can not only meet the standard of PICS, but also take the behavior and reputation of network entities into consideration. As a result, the rating supervision model can provide a variety of security services to enhance the credibility of the information by combination of rating label and network entity reputation.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhenling Wang. "A Trust Evaluation Algorithm in P2P Network based on Trust Model." International Journal of Digital Content Technology and its Applications 5, no. 8 (August 31, 2011): 275–81. http://dx.doi.org/10.4156/jdcta.vol5.issue8.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Fatima, Syeda Gauhar. "Secure Geographic Routing in WSN based on Trust Adaptive Trust Model." International Journal for Research in Applied Science and Engineering Technology 7, no. 4 (April 30, 2019): 672–80. http://dx.doi.org/10.22214/ijraset.2019.4121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Yu, Yang, Chunhe Xia, Shiying Li, and Zhong Li. "Trust type based trust bootstrapping model of computer network collaborative defense." China Communications 12, no. 12 (December 2015): 133–46. http://dx.doi.org/10.1109/cc.2015.7385521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Habib, Sami J., and Paulvanna N. Marimuthu. "Analysis of data trust through an intelligent–transparent–trust triangulation model." Expert Systems 36, no. 3 (May 22, 2018): e12287. http://dx.doi.org/10.1111/exsy.12287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Moysidou, Krystallia, and J. Piet Hausberg. "In crowdfunding we trust: A trust-building model in lending crowdfunding." Journal of Small Business Management 58, no. 3 (November 8, 2019): 511–43. http://dx.doi.org/10.1080/00472778.2019.1661682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Brand, Michael, Davood Babazadeh, Sebastian Lehnhoff, and Dominik Engel. "Trust in control: a trust model for power system network assessment." EPJ Web of Conferences 217 (2019): 01008. http://dx.doi.org/10.1051/epjconf/201921701008.

Full text
Abstract:
The question of whether a process variable transmitted from a device in the field to a power system control center is trustworthy is of high importance nowadays. Traditional bad data detection schemes have their limits in cases of elaborated cyberattacks and cascading failures in a system of systems such as a digitalized power system. This paper proposes a trust model designed for power system network assessment (PSNA). Different to other domains, where trust models already exist (e.g., OC-Trust for organic computing systems), the environment for PSNA is more centralized, and the focus lies on other facets than in organic computing due to the nature of the environment. Therefore, OC-Trust is tailored by categorizing its facets regarding their relevance for PSNA on the one hand. On the other hand, the trust model is extended to realize context-sensitive intersections of trust values. Furthermore, an example of an instantiation of the resulting PSNA-Trust model is given. Two security metrics and one credibility metric based on literature are presented as well as an equation for a context-sensitive intersection.
APA, Harvard, Vancouver, ISO, and other styles
44

Doloswala, Kalika Navin. "Eroding trust – An agent based model to explore how trust flows." Australasian Marketing Journal (AMJ) 22, no. 1 (February 2014): 51–53. http://dx.doi.org/10.1016/j.ausmj.2013.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bai, Qing Hai, Ying Zheng, Lin Na Zhao, Hua Chun, and Chun Ying Cheng. "Research on Mechanism of PKI Trust Model." Applied Mechanics and Materials 536-537 (April 2014): 694–97. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.694.

Full text
Abstract:
Trust model is the foundation of the whole secure architecture because it determines the trust form adopted and the risk to adopt it in network. So the research of trust model in PKI has been the hot spot of PKI technology. Firstly, some backgrounds of PKI and trust model as well as the problems to be solved by the model are discussed. Through analyzing and comparing several extant CA-based trust model, their advantages and disadvantages are described. Finally, PKI trust models are summarized, and the future research directions were discussed.
APA, Harvard, Vancouver, ISO, and other styles
46

Suyanto, Mohamad Afan, and Sasmita R. Setiawan. "Model Kepercayaan Mahasiswa." Gorontalo Management Research 2, no. 2 (October 31, 2019): 117. http://dx.doi.org/10.32662/gomares.v2i2.767.

Full text
Abstract:
ABSTRAK Tujuan dari penelitian ini adalah : 1) untuk menganalisis pengaruh kualitas pelayanan terhadap citra institusi pada Universitas Gorontalo, 2) untuk menganalisis pengaruh kualitas pelayanan terhadap kepercayaan mahasiswa pada Universitas Gorontalo, 3) untuk menganalisis pengaruh citra institusi terhadap kepercayaan mahasiswa pada Universitas Gorontalo dan 4) untuk menganalisis pengaruh kualitas pelayanan terhadap kepercayaan mahasiswa melalui citra institusi pada Universitas Gorontalo.Pengumpulan data dilakukan dengan metode observasi, wawancara dan kuisioner. Data yang terkumpul diolah dengan menggunakan alat analisis deskriptif dan kuantitatif. Teknik analisa yang dipergunakan untuk menganalisis data adalah analisis SEM (Structural Equation Model).Hasil penelitian menunjukan bahwa : 1) Terdapat pengaruh positif dan signifikan kualitas pelayanan terhadap citra institusi, 2) Terdapat pengaruh positif dan signifikan kualitas pelayanan terhadap kepercayaan mahasiswa, 3) Terdapat pengaruh positif dan signifikan citra institusi terhadap kepercayaan mahasiswa dan 4) Terdapat pengaruh positif dan signifikan kualitas pelayanan terhadap kepercayaan mahasiswa melalui citra institusi sebagai variable antara Kata kunci: Kualitas Pelayanan, Citra Institusi, Kepercayaan Mahasiswa ABSTRACT The purpose of this research : 1) to analyze the effect of service quality on institutional image at Gorontalo University, 2) to analyze the effect of service quality on student trust at Gorontalo University, 3) to analyze the effect of institutional image on student trust at Gorontalo University and 4) to analyze the effect of service quality on student trust through the image of the institution at Gorontalo University.Data collection is done by the method of observation, interviews and questionnaires. The collected data is processed using descriptive and quantitative analysis tools. The analysis technique used to analyze data is SEM (Structural Equation Model) analysis.The results showed that: 1) There was a positive and significant influence on the quality of service on the image of the institution, 2) There was a positive and significant effect on the quality of service on student trust, 3) There was a positive and significant effect on the image of the institution on student trust and 4) There was a positive and significant quality of service to student trust through the image of the institution as an intermediate variablekeyword: Service Quality, Institusional Image, Student Trust
APA, Harvard, Vancouver, ISO, and other styles
47

Ye, Zhengwang, Tao Wen, Zhenyu Liu, Xiaoying Song, and Chongguo Fu. "An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks." Journal of Sensors 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/7864671.

Full text
Abstract:
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs). In this paper, an efficient dynamic trust evaluation model (DTEM) for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.
APA, Harvard, Vancouver, ISO, and other styles
48

Austin, Lisa, and David Lie. "Data Trusts and the Governance of Smart Environments: Lessons from the Failure of Sidewalk Labs’ Urban Data Trust." Surveillance & Society 19, no. 2 (June 25, 2021): 255–61. http://dx.doi.org/10.24908/ss.v19i2.14409.

Full text
Abstract:
Data trusts are an increasingly popular proposal for managing complex data governance questions, although what they are remains contested. Sidewalk Labs proposed creating an “Urban Data Trust” as part of the Sidewalk Toronto “smart” redevelopment of a portion of Toronto’s waterfront. This part of its proposal was rejected before Sidewalk Labs cancelled the project. This research note briefly places the Urban Data Trust within the general debate regarding data trusts and then discusses one set of reasons for its failure: its incoherence as a model. The Urban Data Trust was a failed model because it lacked clarity regarding the nature of the problem(s) to which it is a solution, how accountability and oversight are secured, and its relation to existing data protection law. These are important lessons for the more general debate regarding data trusts and their role in data governance.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Li, Bin Zhang, Anqing Liu, and Liudong Xing. "Reliability Model Based Dynamic Multi-Level Trust Analysis." Applied Sciences 10, no. 17 (August 24, 2020): 5854. http://dx.doi.org/10.3390/app10175854.

Full text
Abstract:
Trust assessment is of great significance to related issues such as privacy protection and rumor transmission in online social networks. At present, there are mainly two types of trust models: discrete type and continuous, type. Little work has been done on considering distrust and trust at the same time, especially on the propagation mechanism of distrust. To this end, this paper proposes a multilevel trust model and a corresponding trust evaluation method based on a reliability model called multivalued decision diagrams (MDDs). The proposed trust model combines characteristics of both discrete and continuous trust and considers the dynamic changing mechanism of the multilevel trust. The propagation of distrust and conflicts of opinions are also handled. Experimental results show that the proposed method outperforms other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
50

Sreenivasulu, N., and R. Vijaya. "Analysis of Trust-Based Recommendation for Recommendation Model in Data Mining." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 2506–11. http://dx.doi.org/10.31142/ijtsrd12809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography