Results 31 to 40 of about 185,761 (273)

An Efficient Trust Management Technique Using ID3 Algorithm With Blockchain in Smart Buildings IoT

open access: yesIEEE Access, 2023
Because of the rising population density, relationships are necessary to raise living standards through sending and receiving a wide range of services.
Fathe Jeribi   +3 more
doaj   +1 more source

Managing trust and control when offshoring information systems development projects by adjusting project goals

open access: yesInternational Journal of Technology Management, 2021
This article presents a study of two projects focusing on the relationships of two Nordic clients with suppliers in low-cost countries. It explores the interplay between trust and control when offshoring information systems development projects. The key insight reveals that trust is not a substitute for control, no matter its level.
Karlsen, Jan Terje   +3 more
openaire   +3 more sources

Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)

open access: yesConnection Science, 2022
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication to supervise a group of vehicles (IVC).
R. Priya, N. Sivakumar
doaj   +1 more source

Artificial Intelligence (AI) Trust Framework and Maturity Model: Applying an Entropy Lens to Improve Security, Privacy, and Ethical AI

open access: yesEntropy, 2023
Recent advancements in artificial intelligence (AI) technology have raised concerns about the ethical, moral, and legal safeguards. There is a pressing need to improve metrics for assessing security and privacy of AI systems and to manage AI technology ...
Michael Mylrea, Nikki Robinson
doaj   +1 more source

IEEE Access Special Section Editorial: Blockchain-Enabled Trustworthy Systems

open access: yesIEEE Access, 2021
We are enjoying the benefits brought by the accelerated development of computing systems and the Internet. However, we are also facing a few security and privacy vulnerabilities caused by the increasing system complexity, heterogeneity, dynamicity, and ...
Hong-Ning Dai   +5 more
doaj   +1 more source

A Medical Implants Supply Chain System based on Blockchain Technology [PDF]

open access: yesمجله علوم پزشکی صدرا
Nowadays, medical implants are widely used around the world. Medical implant device safety is closely related to public health and national security.
Ali Tavakoligolpaygani   +2 more
doaj   +1 more source

A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications

open access: yesSensors, 2022
Securing communications in vehicle ad hoc networks is crucial for operations. Messages exchanged in vehicle ad hoc network communications hold critical information such as road safety information, or road accident information and it is essential these ...
Brian Akwirry   +3 more
doaj   +1 more source

A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions

open access: yesHigh-Confidence Computing, 2023
The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life. The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities
Himani Tyagi   +2 more
doaj  

Scalable Evaluation of Distributed On-line Network Monitoring for Behavioral Feedback in Trust Management

open access: yesТруды Института системного программирования РАН, 2018
Collaborative systems are growing in use and popularity. The need to boost the methods concerning the interoperability is growing as well; therefore, trustworthy interactions of the different systems are a priority.
Jorge Lopez   +2 more
doaj   +1 more source

A Double-Layer Blockchain Based Trust Management Model for Secure Internet of Vehicles

open access: yesSensors, 2023
The Internet of Vehicles (IoV) enables vehicles to share data that help vehicles perceive the surrounding environment. However, vehicles can spread false information to other IoV nodes; this incorrect information misleads vehicles and causes confusion in
Wenbo Ruan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy