2012
DOI: 10.1016/j.jnca.2011.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Extracting trust information from security system of a service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 15 publications
0
14
0
1
Order By: Relevance
“…One of the negative feelings is not being able to trust. Trust is an individual's belief or an expectation of others' ethical behaviors under various influential factors, such as subjective norms, risk, confidence, and security (Mayer et al, 1995;Grandison and Sloman, 2000;Bahtiyar and Çağlayan, 2012). Researchers use these influential factors to determine the tendency of trust (McKnight et al, 2004;Riegelsberger et al, 2005) and construct trust as a central aspect in all types of relationships (Gefen et al, 2003).…”
Section: Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the negative feelings is not being able to trust. Trust is an individual's belief or an expectation of others' ethical behaviors under various influential factors, such as subjective norms, risk, confidence, and security (Mayer et al, 1995;Grandison and Sloman, 2000;Bahtiyar and Çağlayan, 2012). Researchers use these influential factors to determine the tendency of trust (McKnight et al, 2004;Riegelsberger et al, 2005) and construct trust as a central aspect in all types of relationships (Gefen et al, 2003).…”
Section: Trustmentioning
confidence: 99%
“…Spying on employees' privacy has significantly damaged the trust relationship. The implementation of spying technologies can be described as a manipulation or an outlook of a trusted computing base, which is viewed as "a bridge between social needs and security solutions to cope with trust management vulnerabilities for distributed networks" (Sun et al, 2008;Bahtiyar and Çağlayan, 2012). However, researchers highlight that justifying the system and policy to manipulate trust is not as necessary as experimenting in practice (Gollmann, 2006).…”
Section: Trustmentioning
confidence: 99%
“…Such features increase network service surfaces, leading to frequent security risks and attacks, such as hacking, interruption, acknowledgement spoofing, DoS, man-in-the-middle attack protocol tunnelling and interception [83]. Furthermore, the Internet network, which is a key component that connects IoT devices, has different players ranging from business subscribers to individual subscribers and from a local network area (LAN) to a worldwide network area (WAN), thereby connecting a wide range of devices and servers [84]. On the one hand, the Internet can provide a wide range of services and applications that can work in synergy with the information collected from sensors to achieve a fully functional IoT system for providing intelligent services.…”
Section: ) Network Service Surfacementioning
confidence: 99%
“…A large number of trust solutions appeared in various distributed networks, such as P2P, Ad hoc, WSN [2] [4][5][6][7].…”
Section: Some Elements Of Trust Managementmentioning
confidence: 99%
“…We consider a particular condition that the depth of the trust tree t=1, suppose factors F={f 1 ,f 2 ,…,f n } denote n leaves, evaluation set S={s 1 ,s 2 …”
Section: A Extracting Trust Information 1) Trust Based On Sensor Laymentioning
confidence: 99%