Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14 2014
DOI: 10.1145/2602087.2602118
|View full text |Cite
|
Sign up to set email alerts
|

Towards trust-based recommender systems for online software services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…This service is used mainly as a recommendation driver and has a significant impact; by using it, numerous new connections have been created. Further work by [60] and [61] propose trusted-based recommendation techniques.…”
Section: Generic-based Trustworthiness Approachesmentioning
confidence: 99%
“…This service is used mainly as a recommendation driver and has a significant impact; by using it, numerous new connections have been created. Further work by [60] and [61] propose trusted-based recommendation techniques.…”
Section: Generic-based Trustworthiness Approachesmentioning
confidence: 99%
“…Lack of a sentiment analysis of conversations: In the context of social trust, frameworks have been developed to analyse the users' content, taking into consideration the overall feelings regarding what they have chosen to expose their content [17,19,51]. However, these efforts did not attempt a sentiment analysis of a post's replies by measuring the trustworthiness values.…”
Section: Lack Of An Advanced Domain-based Trustworthiness Approachesmentioning
confidence: 99%
“…This service is used mainly as a recommendation driver and has a significant impact; by using it, numerous new connections have been created. Further work by Gallege et al [14] and Sun et al [15] propose trusted-based recommendation techniques.…”
Section: Generic-based Trustworthiness Approachesmentioning
confidence: 99%
“…‐ Principle 4 (trust‐based specification): A specification of a Webcam service will indicate, in a formal manner such as a trust‐contract , the functional and non‐functional attributes of that service along with, for example, the [B, D, U]‐based quantification of these non‐functional attributes. The [B, D, U] tuple associated with the ability of the Webcam service to meet the response time deadlines may be quantified as (0.8, 0.1, 0.1) based on the evidences available from the empirical testing of that Webcam service by the developer ( i.e., the internal view) and the reviews provided by the users of this Webcam service ( i.e., the external view).…”
Section: Application Of Trust Principles To the Case Study (Section 2)mentioning
confidence: 99%
“…Similarly, the other entities (Objects Markers (OM), Discovery Service (DS), Control Service (CS), and Fusion Service (FS) in Figure ) in the DTS can follow this approach, and the trust of each subsystem can be investigated. Then the overall trust of the DTS ( T ( T S ) ) will be defined as, T(TS)=T(SS)TOMTDSTCSTFS. The earlier discussion includes a summary of a trust model – the authors' recent work provides more details of this approach.…”
Section: Application Of Trust Principles To the Case Study (Section 2)mentioning
confidence: 99%