2015
DOI: 10.1109/jsyst.2014.2345912
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 36 publications
0
13
0
Order By: Relevance
“…Most practically applied methods of trust computation are based on simple operations such as average or sum [7,26]. This kind of method is widely used in the process of evaluation of e-commerce websites.…”
Section: Trust-related Computation Methods In E-commercementioning
confidence: 99%
See 1 more Smart Citation
“…Most practically applied methods of trust computation are based on simple operations such as average or sum [7,26]. This kind of method is widely used in the process of evaluation of e-commerce websites.…”
Section: Trust-related Computation Methods In E-commercementioning
confidence: 99%
“…In [25], the authors introduced an adaptive and dynamic reputation-based trust model to evaluate trustworthiness, based on community feedback about participants' past behavior. The paper [26] proposed a computational model for trust establishment based on a reputation mechanism, which incorporates direct experiences and information disseminated from past experiences in pervasive systems. The paper [27] proposed an adaptive and attribute-based trust model for service-level agreement guarantees in cloud computing.…”
Section: Trust-related Research In Pervasive Networkmentioning
confidence: 99%
“…In the article by Wu et al (2013), the authors developed a protected mobile cloud based medicinal services system using wireless body are networks. In the article by Kraounakis et al (2015), the authors provided AC mechanism for reliable and extensible elegant data in cloud computing.…”
Section: Reputationmentioning
confidence: 99%
“…This approach can be found in several reputation-based mechanisms in Wireless Sensor Networks (WSNs), for instance, package transmissions between two nodes are considered as interactions; and if a transmission is successful, then the outcome is 1, and vice versa [14]. Another example is file transfer transactions as interactions in peer-to-peer networks (P2P) [15]. If a file is successfully transferred, then the outcome is 1; otherwise it is 0.…”
Section: A Experience Concept Under the Perspective Of Trustmentioning
confidence: 99%