Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Certified reputation: how an agent can trust a stranger
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Investigating interactions of trust and interest similarity
Decision Support Systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
IEEE Transactions on Knowledge and Data Engineering
Rumours and reputation: evaluating multi-dimensional trust within a decentralised reputation system
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
A Trust- and Property-based Access Control Model
Electronic Notes in Theoretical Computer Science (ENTCS)
TREPPS: A Trust-based Recommender System for Peer Production Services
Expert Systems with Applications: An International Journal
BestRec: A Behavior Similarity Based Approach to Services Recommendation
SERVICES '09 Proceedings of the 2009 Congress on Services - I
Personalized Recommendation over a Customer Network for Ubiquitous Shopping
IEEE Transactions on Services Computing
Context-Aware Recommendation by Aggregating User Context
CEC '09 Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing
Electronic Notes in Theoretical Computer Science (ENTCS)
Modeling and mining of dynamic trust in complex service-oriented systems
Information Systems
The antecedent factors on trust and commitment in supply chain relationships
Computer Standards & Interfaces
Secure interoperation of identity managements among different circles of trust
Computer Standards & Interfaces
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Exploring different types of trust propagation
iTrust'06 Proceedings of the 4th international conference on Trust Management
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Trustworthiness analysis of sensor data in cyber-physical systems
Journal of Computer and System Sciences
Hi-index | 0.00 |
Obtaining sufficient information is a significant issue to compute trust about a security system in cyber space. In existing approaches, an entity considers only its experiences about a service and recommendations about the security system of the service. Such approaches are not adequate for critical services in cyber space since trust computations take quite a long time. Determining trust about critical services in a faster manner is a challenging issue. This paper presents a model to increase security experiences about a service by using similarities of security systems. We use security experiences to compute trust. The results of trust computations are used for security interoperability decision making. The case studies and simulations have shown that the proposed model significantly improves security experiences which results in fast and accurate security interoperability decision making.