2013
DOI: 10.1016/j.knosys.2013.08.012
|View full text |Cite
|
Sign up to set email alerts
|

Security similarity based trust in cyber space

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…International Trust Management (GTM) system was proposed and demonstrated that accurate, robust and effective in controlling unwanted traffic on our previous work (7). Bahtiyar et al (8) in their paper "Security similarity based trust in cyber space" present a model for enhancing security in the case of a service experience with similar systems, using our security practices for the calculation of confidence (9). Yan noted that Chen et al Proposed an approach to quantitatively measure Compare the quality and access control mechanisms (ACMs) across platforms KIANI M.…”
Section: Introductionmentioning
confidence: 99%
“…International Trust Management (GTM) system was proposed and demonstrated that accurate, robust and effective in controlling unwanted traffic on our previous work (7). Bahtiyar et al (8) in their paper "Security similarity based trust in cyber space" present a model for enhancing security in the case of a service experience with similar systems, using our security practices for the calculation of confidence (9). Yan noted that Chen et al Proposed an approach to quantitatively measure Compare the quality and access control mechanisms (ACMs) across platforms KIANI M.…”
Section: Introductionmentioning
confidence: 99%