2010
DOI: 10.1111/j.1468-5973.2010.00621.x
|View full text |Cite
|
Sign up to set email alerts
|

Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises

Abstract: The fluid, urgent nature of crises requires flexible, responsive information sharing. Recent studies show, however, that in business catastrophes and other kinds of crises conventional access control mechanisms favor security over flexibility. Our work addresses these seemingly contradictory needs for security and flexibility and designs a trust inference model based on fuzzy logic, a model that can be used with pervasive computing technologies using sensors and mobile devices. Drawing upon research on trust, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 47 publications
(60 reference statements)
0
2
0
Order By: Relevance
“…As one countermeasure, there is a method for authenticating a user prior to providing access to the user's account, the user's account being accessible via a sign-in page upon verifying the user's credentials [19]. As another way, there is a contingency trust inference model that allows the information owner to infer the trustworthiness of requesters (users) [20]. Moreover, we will consider a method to easily manage the proposed modules for service providers because each service provider must manage not only the normal account but also the emergent account and distributed data.…”
Section: Resultsmentioning
confidence: 99%
“…As one countermeasure, there is a method for authenticating a user prior to providing access to the user's account, the user's account being accessible via a sign-in page upon verifying the user's credentials [19]. As another way, there is a contingency trust inference model that allows the information owner to infer the trustworthiness of requesters (users) [20]. Moreover, we will consider a method to easily manage the proposed modules for service providers because each service provider must manage not only the normal account but also the emergent account and distributed data.…”
Section: Resultsmentioning
confidence: 99%
“…Zadeh's groundbreaking conceptualization of fuzzy sets and logic laid the early theoretical groundwork, reshaping how control systems handle imprecise data [4,29]. This foundational phase delved into the exploration of membership functions, fuzzy rules, and inference mechanisms, laying the cornerstone for managing uncertainties in decision-making processes within control systems [30].…”
Section: Literature Reviewmentioning
confidence: 99%