2015
DOI: 10.1109/tdsc.2014.2309126
|View full text |Cite
|
Sign up to set email alerts
|

A Computational Dynamic Trust Model for User Authorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…The paper [1] proposed a trust management architecture that can evolve and maintain the behavior trust based on user's historical behavior as well as correspondent trust level; The paper [2] detail a procedure for computing reputationbased trust assessments relying on user demographics and from provenance, and then proposed a procedure for computing trust values based on provenance information, represented using w3c prov model; The paper [3] built a dynamic trust model based on indirect trust relationship, this method take advantage of keynote to build the dynamic trust model, in which used an indirect trust algorithm to calculate the trust value of indirect trust relationship; The paper [4] provided a security framework suitable for dependent people by using the hug and various contextual data issued from the sensors deployed in smart environments; The paper [5] improved the calculation method of indirect credibility by thinking the existing problems of the user behavior trust evaluation method in the subjective weight and dynamic adaptability; The paper [6] proposed a computational dynamic trust model for user authorization, rooted in findings from social science, unlikely most existing computational trust models, this model distinguishes trusting belief in in tegrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters; The paper [7] recognized reputation, recommendation and rating systems as online trust representatives and explores the biased behavior resulting from users' perception of those systems, and then built a framework for addressing some of the issues attributed to users ' biased behavior.…”
Section: Stage Of the Researchmentioning
confidence: 99%
“…The paper [1] proposed a trust management architecture that can evolve and maintain the behavior trust based on user's historical behavior as well as correspondent trust level; The paper [2] detail a procedure for computing reputationbased trust assessments relying on user demographics and from provenance, and then proposed a procedure for computing trust values based on provenance information, represented using w3c prov model; The paper [3] built a dynamic trust model based on indirect trust relationship, this method take advantage of keynote to build the dynamic trust model, in which used an indirect trust algorithm to calculate the trust value of indirect trust relationship; The paper [4] provided a security framework suitable for dependent people by using the hug and various contextual data issued from the sensors deployed in smart environments; The paper [5] improved the calculation method of indirect credibility by thinking the existing problems of the user behavior trust evaluation method in the subjective weight and dynamic adaptability; The paper [6] proposed a computational dynamic trust model for user authorization, rooted in findings from social science, unlikely most existing computational trust models, this model distinguishes trusting belief in in tegrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters; The paper [7] recognized reputation, recommendation and rating systems as online trust representatives and explores the biased behavior resulting from users' perception of those systems, and then built a framework for addressing some of the issues attributed to users ' biased behavior.…”
Section: Stage Of the Researchmentioning
confidence: 99%
“…Terzi et al [16] introduce an algorithm to classify users and assign them roles based on trust relationships. Zhong [17] proposes a dynamic trust concept based on McKnight's social trust model [18]. When building trust relationships, uncertain evidences are evaluated using second-order probability and Dempster-Shaferian framework.…”
Section: Related Workmentioning
confidence: 99%
“…Competence belief represents how well an acquaintance satisfied the needs of past interactions [18], [17], [46]. Let cb ij denote the competence belief of p i about p j in the service context.…”
Section: Service Trust Metric (St Ij )mentioning
confidence: 99%
See 1 more Smart Citation
“…The everyday increasing wealth of knowledge out there on-line has created secure info access mechanisms an essential a part of information systems these days [1][2][3]. The thought analysis efforts for user authorization mechanisms in environments wherever a possible user's permission set isn't predefined, principally concentrate on role-based access management (RBAC), that divides the authorization method into the role-permission and user-role assignment [4][5][6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%