咨询与建议

限定检索结果

文献类型

  • 28 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 19 篇 计算机科学与技术...
    • 8 篇 网络空间安全
    • 5 篇 软件工程
    • 4 篇 仪器科学与技术
    • 4 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
  • 13 篇 管理学
    • 13 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 32 篇 trust model
  • 3 篇 reputation
  • 3 篇 security
  • 2 篇 subjective logic
  • 2 篇 time-related tru...
  • 2 篇 blockchain
  • 2 篇 secure routing
  • 1 篇 unmanned aerial ...
  • 1 篇 bgp security
  • 1 篇 b2c
  • 1 篇 mechanism
  • 1 篇 doppler shift
  • 1 篇 trust vector
  • 1 篇 peer-to-peer (p2...
  • 1 篇 context-aware
  • 1 篇 fuzzy set
  • 1 篇 ad hoc on-demand...
  • 1 篇 trust evaluation
  • 1 篇 key
  • 1 篇 location-aided r...

机构

  • 2 篇 school of engine...
  • 2 篇 faculty of infor...
  • 1 篇 beijing national...
  • 1 篇 information secu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 schoolofcomputer...
  • 1 篇 school of comput...
  • 1 篇 school of inform...
  • 1 篇 department of in...
  • 1 篇 guangxi universi...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 college of mecha...
  • 1 篇 college of compu...
  • 1 篇 information secu...
  • 1 篇 department of e&...

作者

  • 1 篇 qixiao lin
  • 1 篇 zhi-qing wei
  • 1 篇 jian mao
  • 1 篇 uma shankar moda...
  • 1 篇 qian lei
  • 1 篇 zhu chang-sheng
  • 1 篇 xiaolan xie
  • 1 篇 xiang li
  • 1 篇 sheng gao
  • 1 篇 zhiquan liu
  • 1 篇 dilli babu m
  • 1 篇 何大可
  • 1 篇 gang wang
  • 1 篇 maode ma
  • 1 篇 wang danru
  • 1 篇 jiang chunfeng
  • 1 篇 于真
  • 1 篇 宁宇鹏
  • 1 篇 xiao-long xu
  • 1 篇 huang yanwen

语言

  • 27 篇 英文
  • 5 篇 中文
检索条件"主题词=Trust model"
32 条 记 录,以下是1-10 订阅
排序:
FCT: a fully-distributed context-aware trust model for location based service recommendation
收藏 引用
Science China(Information Sciences) 2017年 第8期60卷 101-116页
作者: Zhiquan LIU Jianfeng MA Zhongyuan JIANG Yinbin MIAO School of Computer Science and Technology Xidian University School of Cyber Engineering Xidian University
With the popularity of location based service(LBS), a vast number of trust models for LBS recommendation(LBSR) have been proposed. These trust models are centralized in essence, and the trusted third party may collude... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic trust model Based on Service Recommendation in Big Data
收藏 引用
Computers, Materials & Continua 2019年 第3期58卷 845-857页
作者: Gang Wang Mengjuan Liu Xi’an University of Finance and Economics Xi’an710100China Shaanxi Radio and Television University Xi’an710068China.
In big data of business service or transaction,it is impossible to provide entire information to both of services from cyber system,so some service providers made use of maliciously services to get more *** management... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on trust model in Container-Based Cloud Service
收藏 引用
Computers, Materials & Continua 2018年 第8期56卷 273-283页
作者: Xiaolan Xie Tianwei Yuan Xiao Zhou Xiaochun Cheng College of Information Science and Engineering Guilin University of TechnologyGuilin541004China Guangxi Universities Key Laboratory of Embedded Technology and Intelligent Information Processing Guilin University of TechnologyGuilin541004China College of Mechanical and Control Engineering Guilin University of TechnologyGuilin541004China Department of Computer Science Middlesex UniversityLondonNW44BTUK
Container virtual technology aims to provide program independence and resource *** container enables flexible cloud *** with traditional virtualization,traditional virtual machines have difficulty in resource and expe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DDoS Detection for 6G Internet of Things: Spatial-Temporal trust model and New Architecture
收藏 引用
China Communications 2022年 第5期19卷 141-149页
作者: Yinglun Ma Xu Chen Wei Feng Ning Ge Department of Electronic Engineering Tsinghua UniversityBeijing 100084China Beijing National Research Center for Information Science and Technology Beijing 100084China
With the rapid development of the sixth generation(6G)network and Internet of Things(IoT),it has become extremely challenging to efficiently detect and prevent the distributed denial of service(DDoS)attacks originatin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Bayesian cognitive trust model based self-clustering algorithm for MANETs
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 494-505页
作者: WANG Wei1,2,3 & ZENG GuoSun1,2,31Department of Computer Science & Technology, Tongji University, Shanghai 200092, China 2Tongji Branch, National Engineering & Technology Center of High Performance Computer, Shanghai 200092, China 3Key Loboratory of Embedded System and Service Computing, Ministry of Education, Shanghai 200092, China Department of Computer Science & Technology Tongji University Shanghai China Tongji Branch National Engineering & Technology Center of High Performance Computer Shanghai China Key Loboratory of Embedded System and Service Computing Ministry of Education Shanghai China
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Cross-Domain trust model of Smart City IoT Based on Self-Certification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 981-996页
作者: Yao Wang Yubo Wang Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas Faculty of Information Technology Beijing University of TechnologyBeijing100124China Department of Natural and Computing Science University of AberdeenUK School of Engineering Edith Cowan UniversityPerth6027Australia
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Secure trust model for P2P Systems Based on trusted Computing
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第1期13卷 86-90页
作者: 郝黎明 杨树堂 陆松年 陈恭亮 Department of Electronic Engineering Shanghai Jiaotong University School of Information Security Engineering Shanghai Jiaotong University Shanghai 200240 China School of Information Security Engineering Shanghai Jiaotong University
trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworth... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MEtrust: A Mutual Evaluation-based trust model for P2P Networks
收藏 引用
International Journal of Automation and computing 2012年 第1期9卷 63-71页
作者: Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao College of Computer Nanjing University of Posts and TelecommunicationsNanjing 210003PRC
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
trust model based on individual experience
收藏 引用
Journal of Southeast University(English Edition) 2007年 第3期23卷 373-376页
作者: 王少杰 郑雪峰 初俐君 于真 徐光美 北京科技大学信息工程学院 北京100083
To improve the accuracy of node trust evaluation in a distributed network, a trust model based on the experience of individuals is proposed, which establishes a new trust assessment system by introducing the experienc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reputation-based trust model in Grid Security System
收藏 引用
通讯和计算机(中英文版) 2006年 第8期3卷 41-46页
作者: Baolin Ma Jizhou Sun Ce Yu School of Electronic Information Engineering Tianfin University Tianjin 300072 China
The security problem is a hot topic in grid research due to the dynamics and uncertainty of grid system. There are three entities defined as users, applications and resources in grid environment. In such situation, us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论