2015
DOI: 10.14257/ijsia.2015.9.5.03
|View full text |Cite
|
Sign up to set email alerts
|

Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…In reputations based systems [14], the most reputed users have the heaviest impact on the final trust value evaluated from the weighted sum method [48]. Other approaches described by Guo et al [36] include Bayesian Systems [49] [50] [51], Regression Analysis [52], Belief Models [53], Fuzzy Models [54] [55] [56] [57] [40] [58] [29], and Flow Models [59] [60] [61]. Bayesian systems and Fuzzy models are the two most widespread trust evaluation strategies.…”
Section: Trust Value Computation and Evaluation Strategiesmentioning
confidence: 99%
“…In reputations based systems [14], the most reputed users have the heaviest impact on the final trust value evaluated from the weighted sum method [48]. Other approaches described by Guo et al [36] include Bayesian Systems [49] [50] [51], Regression Analysis [52], Belief Models [53], Fuzzy Models [54] [55] [56] [57] [40] [58] [29], and Flow Models [59] [60] [61]. Bayesian systems and Fuzzy models are the two most widespread trust evaluation strategies.…”
Section: Trust Value Computation and Evaluation Strategiesmentioning
confidence: 99%
“…is paper uses [23] to calculate the direct trust method to evaluate the risk of user interaction. We assume that there are m interactions between the user and the security domain.…”
Section: Risk Assessment Centermentioning
confidence: 99%
“…e number of successful interactions between user u and security domain d is S ud , and the number of user u failures with security domain d is F ud . It can be known from [23] that the risk probability θ e ∧ of the interaction between the user and the security domain conforms to the Beta distribution in the probability distribution. e calculation method is as follows:…”
Section: Risk Assessment Centermentioning
confidence: 99%
“…To do so, in this book chapter question number two has been split into two questions and struggles to answer these two questions which have been mention before. Figure 4 illustrates the components of common trust framework which is based on the [13].…”
Section: Evaluation Criteriamentioning
confidence: 99%