期刊文献+
共找到2,693篇文章
< 1 2 135 >
每页显示 20 50 100
The trust system and ecological civilization:A case study of “green trust”
1
作者 WANG Zhen DONG Yu 《Ecological Economy》 2014年第2期159-163,共5页
To promote the ecological civilization has been determined as one of the significant agenda for China's development strategy. However, the shortfall of funding might hinder the progress. Therefore, new financing r... To promote the ecological civilization has been determined as one of the significant agenda for China's development strategy. However, the shortfall of funding might hinder the progress. Therefore, new financing resources and channels are urgently required. Trust has been seen as a popular investing and financing instrument due to its comprehensive benefits such as equity restricting, financial independence and continuity, etc. If trust companies provide services to environmental protection and establish "green trust" or "green funds", it would fully widen financing channel of green industry and contribute to China's sustainable development. 展开更多
关键词 trust system ECOLOGICAL CIVILIZATION green trust
下载PDF
DTAIS:Distributed trusted active identity resolution systems for the Industrial Internet
2
作者 Tao Huang Renchao Xie +7 位作者 Yuzheng Ren F.Richard Yu Zhuang Zou Lu Han Yunjie Liu Demin Cheng Yinan Li Tian Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期853-862,共10页
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are... In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness. 展开更多
关键词 Industrial Internet NFT IPFS trust Identity resolution system
下载PDF
Machine learning and human‐machine trust in healthcare:A systematic survey
3
作者 Han Lin Jiatong Han +4 位作者 Pingping Wu Jiangyan Wang Juan Tu Hao Tang Liuning Zhu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第2期286-302,共17页
As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have pro... As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have proper trust in medical machines.Intelligent machines that have applied machine learning(ML)technologies continue to penetrate deeper into the medical environment,which also places higher demands on intelligent healthcare.In order to make machines play a role in HMI in healthcare more effectively and make human‐machine cooperation more harmonious,the authors need to build good humanmachine trust(HMT)in healthcare.This article provides a systematic overview of the prominent research on ML and HMT in healthcare.In addition,this study explores and analyses ML and three important factors that influence HMT in healthcare,and then proposes a HMT model in healthcare.Finally,general trends are summarised and issues to consider addressing in future research on HMT in healthcare are identified. 展开更多
关键词 human-machine interaction machine learning trust
下载PDF
Trust in Clinical Practice: A Systematic Review
4
作者 Sereena Rambaran Dominic Harmon 《Pain Studies and Treatment》 2024年第1期1-11,共11页
Background: The aim of this study is to gain a better understanding of the true importance of trust in clinical practice by looking at how it is formed, how it affects clinical practice, and how to improve it. Methods... Background: The aim of this study is to gain a better understanding of the true importance of trust in clinical practice by looking at how it is formed, how it affects clinical practice, and how to improve it. Methods: Using the PRISMA-ScR checklist, a review of the literature was performed to identify research evaluating the importance of trust in the doctor-patient relationship. After thorough screening and removal of duplicates, 21 articles were used in the literature review. Results: The classifying themes that emerged in the selected articles were What Makes Trust and Effects of Trust. The theme of What Makes Trust garnered two subthemes as well: Impact of Doctor-Patient Relationship on Trust and Impact of Shared Decision-Making on Trust. Further to that, the overarching themes found were slightly more specific. They were Traits of Trust, Mistrust and Barriers to Trust, Positive Effects of Trust and the Effects of a Lack of Trust. We found that the best way to improve trust was to improve communication between the patient and the doctor. Additionally, we found that the biggest barrier to a trusting doctor patient relationship was a stigmatised condition, followed by a perception of a financially-motivated doctor. Finally, we found that a lack of trust can prevent patients from seeking and receiving proper treatment. Conclusions: With a better understanding of how trust is built and the extent of the role it plays in clinical practice, we hope that this growing knowledge can improve the practice of many doctors in the future. It is certain that more research needs to be done in this area, especially focusing on vulnerable and stigmatised populations such as chronic pain patients. 展开更多
关键词 trust PATIENT Clinical Practice Doctor or Physician Doctor Patient Relationship
下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
5
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 MOBILE internet CLOUD COMPUTING MOBILE agent system SUBJECTIVE trust dynamic trust management
下载PDF
A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks 被引量:7
6
作者 Alanoud Alhussain Heba Kurdi Lina Altoaimy 《Computers, Materials & Continua》 SCIE EI 2019年第6期805-815,共11页
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.... Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems. 展开更多
关键词 trust management neural networks peer to peer machine learning edge devices
下载PDF
Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments 被引量:3
7
作者 SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1493-1497,共5页
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of truste... Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. 展开更多
关键词 operating system trusted path trusted platform module (TPM) trusted software
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
8
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:1
9
作者 Weijin Jiang Yang Wang +4 位作者 Yirong Jiang Yuhui Xu Jiahui Chen Lina Tan Guo Liang 《Computers, Materials & Continua》 SCIE EI 2020年第1期123-136,共14页
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management... In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness. 展开更多
关键词 Cloud computing mobile agent system subjective trust objective trust dynamic trust management mobile Internet
下载PDF
Analysis of system trustworthiness based on information flow noninterference theory 被引量:1
10
作者 Xiangying Kong Yanhui Chen Yi Zhuang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期367-380,共14页
The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the inform... The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation. 展开更多
关键词 trusted computing trust chain intransitive noninterference(INI) dynamic trustworthiness access control
下载PDF
A Secure Trust Model for P2P Systems Based on Trusted Computing 被引量:1
11
作者 郝黎明 杨树堂 +1 位作者 陆松年 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期86-90,共5页
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworth... Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15. 展开更多
关键词 PEER-TO-PEER trust model trusted computing direct anonymous attestation pseudonym
下载PDF
An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce 被引量:4
12
作者 Mehrbakhsh Nilashi Karamollah Bagherifard +2 位作者 Othman Ibrahim Nasim Janahmadi Mousa Barisami 《Engineering(科研)》 2011年第11期1063-1071,共9页
In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites... In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites such a design of websites, security of websites and familiarity of website influence customers trust in online transactions. This paper presents an application of expert system on trust in electronic commerce. Based on experts’ judgment, a frame of work was proposed. The proposed model applies ANFIS and Mamdani inference fuzzy system to get the desired results and then results of two methods were compared. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of electronic websites. Based on AHP method, Expert Choice software was used to determine the priority of factors in the first questionnaire, and MATLAB and Excel were used for developing the fuzzy rules. Finally, the fuzzy logical kit was used to analyze the generated factors in the model. Our study findings show that trust in EC transactions is strongly mediated by perceived security. 展开更多
关键词 trust SECURITY ANFIS Fuzzy Logic Rule Based systems Electronic COMMERCE
下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
13
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
下载PDF
Toward Energy-Efficient and Trustworthy eHealth Monitoring System 被引量:1
14
作者 Ajmal Sawand Soufiene Djahel +1 位作者 Zonghua Zhang Farid Na?t-Abdesselam 《China Communications》 SCIE CSCD 2015年第1期46-65,共20页
The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant p... The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions. 展开更多
关键词 eHealthcare wireless body area networks cyber physical systems mobile crowd sensing security privacy by design trust.
下载PDF
Role of Trust, Privacy Concerns and Data Governance in Managers’ Decision on Adoption of Big Data Systems 被引量:1
15
作者 Selen Balkaya 《Management Studies》 2019年第3期229-237,共9页
This paper investigates the role of trust, privacy concerns, and data governance on managers’ intention to use big data systems. In literature, trusting beliefs, such as functionality, helpfulness, and reliability we... This paper investigates the role of trust, privacy concerns, and data governance on managers’ intention to use big data systems. In literature, trusting beliefs, such as functionality, helpfulness, and reliability were found to be antecedent of trust in technological artifacts. Notice, access, choice, and security principles were found to be crucial in eliminating privacy concerns. On the other hand, this paper focuses on data storage and data collection which have been significant criterion for managers in evaluating companies’ data governance policies. A model depicting the relationships amongst all these factors and their relation to users’ intention to adopt big data systems and a scale was proposed in the paper. 展开更多
关键词 big DATA systemS privacy CONCERNS DATA GOVERNANCE trust technology acceptance Introduction
下载PDF
Design and Implementation of Trusted-Router Based on Trust Management System
16
作者 孙斌 毛元奎 《China Communications》 SCIE CSCD 2011年第5期63-69,共7页
This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its... This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its trust value,which is the quantification of the network's expectation for this packet's and its owner's behavior in the network.We outline the algorithms to calculate the trust value of the trusted-router and the IP packet.We also introduce the trust-based QoS management algorithm and the deployment of the trusted-routers which carry out this algorithm.The simulation results show that the least trusted IP packets will be dropped to save resources for those highly trusted IP packets.This will ecourage all the elements in the network to keep a good trust record. 展开更多
关键词 network security trust management trust algorithm trusted router QOS
下载PDF
Quorum systems for intrusion-tolerance based on trusted timely computing base
17
作者 Hua Zhou Xiangru Meng Li Zhang Xiangdong Qiao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期168-174,共7页
Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous qu... Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous quorum systems are subject to DOS attacks, while asynchronous quorum systems need a larger system size (at least 3f+1 for generic data, and f fewer for self-verifying data). In order to solve the problems above, an intrusion-tolerance quorum system (ITQS) of hybrid time model based on trust timely computing base is presented (TTCB). The TTCB is a trust secure real-time component inside the server with a well defined interface and separated from the operation system. It is in the synchronous communication environment while the application layer in the server deals with read-write requests and executes update-copy protocols asynchronously. The architectural hybridization of synchrony and asynchrony can achieve the data consistency and availability correctly. We also build two kinds of ITQSes based on TTCB, i.e., the symmetrical and the asymmetrical TTCB quorum systems. In the performance evaluations, we show that TTCB quorum systems are of smaller size, lower load and higher availability. 展开更多
关键词 network security intrusion-tolerance quorum system trusted timely computing base (TTCB) CONSISTENCY availability.
下载PDF
Patients’ Experiences of Trust in the Patient-Nurse Relationship——A Systematic Review of Qualitative Studies 被引量:1
18
作者 Kristine Rortveit Britt Satre Hansen +3 位作者 Ingrid Leiknes Inge Joa Ingelin Testad Elisabeth Severinsson 《Open Journal of Nursing》 2015年第3期195-209,共15页
Aims and Objectives: To report a synthesis of the literature on the meaning of trust in the context of patients’ experiences of nursing. The review question was “How do patients describe the meaning of trust in the ... Aims and Objectives: To report a synthesis of the literature on the meaning of trust in the context of patients’ experiences of nursing. The review question was “How do patients describe the meaning of trust in the nursing relationship?” Background: Trust is essential in nursing as it has the potential to create opportunities for the human being to gain faith, hope and meaning in life as well as open up for new experiences. Trust is an interpersonal and essential element of all patient-nurse relationships and requires nurses to create a trusting relationship with the patients. Design: Systematic qualitative literature review. Methods: Systematic searches were conducted for the period January 2002 to December 2012, updated in January 2014. 20 papers were included. Results: Four categories emerged: Attitudes related to trust, indicating that trust is fundamental and existential;Experiences of trust, concerning how trust can be sensed;The patient-nurse relationship, revealing the qualities of the person who creates trust;and Where trust occurs, illuminating the contextual relevancies of trust. Conclusions: Patients’ experiences of trust in nursing are dependent on the nurses’ knowledge, level of commitment in the dialogue to creating and developing the relationship and contextual issues. Implications for nursing practice: Reflection on a trusting relationship with the patient is necessary for a deeper conceptual understanding of trust in nursing. Clinical nurse researchers nurse supervisors, managers and nurse educatorsshould discuss different areas of trust during nursing supervision and focus-group meetings as well as with nursing graduates to ensure that nurses develop knowledge of how to create a trusting patient-nurse relationship. 展开更多
关键词 Patient-Nurse Relationship Patient Experience Qualitative Literature Review trust
下载PDF
TRUSED:A Trust-Based Security Evaluation Scheme for A Distributed Control System
19
作者 Saqib Ali Raja Waseem Anwar 《Computers, Materials & Continua》 SCIE EI 2023年第2期4381-4398,共18页
Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they off... Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they offer.However,due to distributed communication,flexible network topologies and lack of central control,the traditional security strategies are inadequate formeeting the unique characteristics ofDCS.Moreover,malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network.Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node,which reduces the risk and increases network lifetime.In this research,we offer TRUSED,a trust-based security evaluation scheme that both,directly and indirectly,estimates each node’s level of trustworthiness,incorporating the cumulative trust concept.In addition,simulation results show that the proposed technique can effectively identify malicious nodes,determine their node’s trustworthiness rating,and improve the packet delivery ratio. 展开更多
关键词 MALICIOUS network lifetime risk management SECURITY trust untrustworthy
下载PDF
A Trust Scheme Based DRM Model for P2P System
20
作者 XIAO Shangqin LU Zhengding LING Hefei ZOU Fuhao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1373-1377,共5页
With the maturation of P2P technology, there are more and more challenges to the protection of digital rights. DRM for traditional Client/Server model can not satisfy the requirement of digital right protection of P2P... With the maturation of P2P technology, there are more and more challenges to the protection of digital rights. DRM for traditional Client/Server model can not satisfy the requirement of digital right protection of P2P network. With practical application of P2P network technology and new generational DRM technology, the article proposes a DRM model for P2P system based on trust degree. The proposed model shares the secret key to the trusty peers and affords necessary security ensure for digital content delivery based on P2P technology. Mathematic analyses and simulations show that, compared to the current DRM model, the proposed model is more robust toleration of transmit and security. 展开更多
关键词 P2P DRM trust scheme LICENSE
下载PDF
上一页 1 2 135 下一页 到第
使用帮助 返回顶部