Academic literature on the topic 'Trust models requirements'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust models requirements.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trust models requirements"
Lee, Hyo-Cheol, and Seok-Won Lee. "Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems." Sensors 23, no. 10 (May 10, 2023): 4622. http://dx.doi.org/10.3390/s23104622.
Full textTikhvinskiy, Valery O., Grigory Bochechka, and Andrey Gryazev. "QoS Requirements as Factor of Trust to 5G Network." Journal of Telecommunications and Information Technology, no. 1 (March 30, 2016): 3–8. http://dx.doi.org/10.26636/jtit.2016.1.697.
Full textHussein, Aya, Sondoss Elsawah, and Hussein Abbass. "A System Dynamics Model for Human Trust in Automation under Speed and Accuracy Requirements." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 822–26. http://dx.doi.org/10.1177/1071181319631167.
Full textWang, Jingpei, and Jie Liu. "The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios." Journal of Electrical and Computer Engineering 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/4361719.
Full textAyed, Samiha, Lamia Chaari, and Amina Fares. "A Survey on Trust Management for WBAN: Investigations and Future Directions." Sensors 20, no. 21 (October 23, 2020): 6041. http://dx.doi.org/10.3390/s20216041.
Full textSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (April 8, 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Full textSoni, Sonam. "Reliable Trust Computation model in Vehicular ad-hoc Network." American Journal of Advanced Computing 1, no. 3 (July 1, 2020): 1–5. http://dx.doi.org/10.15864/ajac.1304.
Full textAsiri, Ahmad Yahya, and Sultan S. Alshamrani. "Performance Evaluation of a B2C Model Based on Trust Requirements and Factors." Scientific Programming 2021 (May 26, 2021): 1–10. http://dx.doi.org/10.1155/2021/9935849.
Full textKulaklıoğlu, Duru. "Explainable AI: Enhancing Interpretability of Machine Learning Models." Human Computer Interaction 8, no. 1 (December 6, 2024): 91. https://doi.org/10.62802/z3pde490.
Full textKapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (May 31, 2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.
Full textDissertations / Theses on the topic "Trust models requirements"
Abidi, Rihab. "Smart Rοad Signs based trust management mοdels fοr cοοperative Ιntellgent Τranspοrtatiοn Systems." Electronic Thesis or Diss., Normandie, 2024. http://www.theses.fr/2024NORMR111.
Full textThe increasing complexity of urban traffic systems has made congestion a significant challenge, leading to severe economic, environmental, and social impacts. Intelligent Transportation Systems (ITSs) have emerged as a promising solution to mitigate these challenges by enabling dynamic traffic management. However, the reliability of data within ITSs represents an increasingly significant challenge. The introduction of erroneous data by defective or malicious sensors can lead to malfunctions or intentional disruptions of the system. In this context, trust management models assume a crucial importance.Most of the existing trust models propose vehicle-centric approaches. However, the high mobility and dynamic nature of the ITS environments affects the stability and scalabity of such systems. Accordingly, proposing novel trust models designed specifically for ITSs to enhance the accuracy, security, scalability and stabilty of traffic information dissemination constitutes the overall goal of this thesis.First, we proposed a generic architecture for a trust framework, leveraging Smart Road Signs (SRSs). The conception of this architecture was built upon the output of a deep investigation of the state of the art. This framework has been, then, developed to propose two novel trust models. The first model, considers the contextual information and multi-source data aggregation to assess the trustworthiness of reported traffic events and the different nodes of the network. Additionally, the model applies a bi-level trust evaluation combining Bayesian Inference and a dynamic weighted sum approach. Furthermore, a predictive-based Baysian Inference was proposed to enhance the accuracy of trust evaluation. Thereafter, a communication trust model was proposed, to complement the previous contribution, using Quality of Service (QoS) metrics to evaluate the SRSs behaviour. This model introduces a self-organizing trust model to track the SRSs' behaviours and establishes stable environments using a fuzzy-based Dempster Shafer Theory (DST). In fact, we consider a more realistic scenario where all the nodes are vulnerable to attacks and failure. Thus, the main objective of this model is to ensure that the system remains operational even in hostile environments, by mitigating the inherent single point of failure vulnerability characteristic of centralized network architectures.\\The proposed models were validated through simulations, showing their effectiveness in identifying malicious nodes and mitigating erroneous traffic reports. The results demonstrate that considering multi-source data aggregation and context-aware information increases the accuracy of trust evaluation. Furthermore, the adoption of an infrastructure-based framework leveraging a decentralized and hierarchical architecture enhances the scalability and stability of the trust models, which is suitable for such environment
Blatt, Nicole I. "Trust and influence in the information age operational requirements for network centric warfare." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1313.
Full textMilitary leaders and scholars alike debate the existence of a revolution in military affairs (RMA) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century. This thesis introduces the Communication Technology (CommTech) Model to explain how communication technologies affect organizations, leadership styles, and decision-making processes. Due to the growth in networking enterprises, leaders will have to relinquish their tight, centralized control over subordinates. Instead, they will have to perfect their use of softer power skills such as influence and trust as they embrace decentralized decision-making. Network Centric Warfare, Self-Synchronization, and Network Enabled Operations are concepts that provide the framework for integrating information technology into the battlespace. The debate that drives centralized versus decentralized control in network operations is analyzed with respect to the CommTech Model. A new term called Operational Trust is introduced and developed, identifying ways to make it easier to build trust among network entities. Finally, the thesis focuses on what leaders need to do to shape network culture for effective operations.
Major, United States Air Force
Books on the topic "Trust models requirements"
Watt, Gary. Equity & Trusts Law Directions. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804703.001.0001.
Full textWatt, Gary. Equity & Trusts Law Directions. 7th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198869382.001.0001.
Full textHannah, Leslie. Trust and Regulation in Corporate Capital Markets before 1914. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198782797.003.0007.
Full textWheelahan, Leesa. Rethinking Skills Development. Edited by John Buchanan, David Finegold, Ken Mayhew, and Chris Warhurst. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199655366.013.30.
Full textBook chapters on the topic "Trust models requirements"
Gol Mohammadi, Nazila, and Maritta Heisel. "Enhancing Business Process Models with Trustworthiness Requirements." In Trust Management X, 33–51. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41354-9_3.
Full textTheis, Sabine, Sophie Jentzsch, Fotini Deligiannaki, Charles Berro, Arne Peter Raulf, and Carmen Bruder. "Requirements for Explainability and Acceptance of Artificial Intelligence in Collaborative Work." In Artificial Intelligence in HCI, 355–80. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35891-3_22.
Full textSoldatos, John, Babis Ipektsidis, Nikos Kefalakis, and Angela-Maria Despotopoulou. "Reference Architecture for AI-Based Industry 5.0 Applications." In Artificial Intelligence in Manufacturing, 3–26. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-46452-2_1.
Full textMancuso, Antonio, Antonio Saporito, and Davide Tumino. "Topology Optimization Design of Internal Reinforcements in a Sailing Dinghy." In Lecture Notes in Mechanical Engineering, 73–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70566-4_13.
Full textAdula, Metasebia, Shashi Kant, and Mando Genale. "Green Financing Effect on Sustenance Finance Models With Mediation of Corporate Social Responsibility in Ethiopia." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 159–74. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3884-1.ch009.
Full textRoberta, Oppedisano. "Anti-Money Laundering and Corporate Compliance." In Business Ethics - The Competitive Advantage of Trust and Reputation [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.114226.
Full textRuotsalainen, Pekka, and Bernd Blobel. "Privacy and Trust in pHealth – Past, Present and Future." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti220968.
Full textPatil, Dimple, Nitin Liladhar Rane, and Jayesh Rane. "Challenges in implementing ChatGPT and generative artificial intelligence in various business sectors." In The Future Impact of ChatGPT on Several Business Sectors. Deep Science Publishing, 2024. http://dx.doi.org/10.70593/978-81-981367-8-7_3.
Full textYan, Gongjun, Danda B. Rawat, Bhed Bahadur Bista, and Lei Chen. "Location Security in Vehicular Wireless Networks." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, 108–33. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4691-9.ch006.
Full textSindiramutty, Siva Raja, Krishna Raj V. Prabagaran, Noor Zaman Jhanjhi, Raja Kumar Murugesan, Nazir Ahmed Malik, and Manzoor Hussain. "Ethics and Transparency in Secure Web Model Generation." In Advances in Information Security, Privacy, and Ethics, 411–64. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch012.
Full textConference papers on the topic "Trust models requirements"
Alqurashi, Saja, Indrakshi Ray, Mahmoud Abdelgawad, and Hosein Shirazi. "SR2ACM: A Methodical Approach for Translating Natural Language Security Requirements to Access Control Model." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), 303–12. IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00042.
Full textSalgado, André de Lima, and Renata Pontin de Mattos Fortes. "Usable privacy: from grounded models to new guidelines and heuristics." In Anais Estendidos do Simpósio Brasileiro de Sistemas Multimídia e Web. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/webmedia_estendido.2023.233789.
Full textSophie Charlotte Dautzenberg, Pia, and Gudrun Mechthild Irmgard Voß. "A theoretical framework for trust in automation considering its relationship to technology acceptance and its influencing factors." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002462.
Full textRiepnieks, Artis, and Harold Kirkham. "Improving Trust in Power System Measurements." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003577.
Full textJungbauer, Christoph, and Christian Luidold. "Certificates and the security of digital health information." In 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005932.
Full textMartinez Gutierrez, Rodolfo, Jorge Vicente Villa Garcia, Carmen Carey-Raygoza, and Artemio Lara Chavez. "SDG 9: Digital Innovation in Foreign Trade through Industry 5.0." In 6th International Conference on Human Systems Engineering and Design Future Trends and Applications (IHSED 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005557.
Full textSchaefer, S., and O. Revheim. "Building Trust in AI/ML Solutions: Key Factors for Successful Adoption in Drilling Optimization and Hazard Prevention." In SPE Norway Subsurface Conference. SPE, 2024. http://dx.doi.org/10.2118/218455-ms.
Full textHyo-Cheol, Lee. "An Approach to Design Trust-Aware Goal Model and Provenance Model for Intelligent Adaptive Systems." In 2019 IEEE 27th International Requirements Engineering Conference (RE). IEEE, 2019. http://dx.doi.org/10.1109/re.2019.00062.
Full textNeacsu, Mihaela gabriela, and Adrian Adascalitei. "QUALITY ASSURANCE ELEARNING RESOURCES FOR STUDENTS." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-222.
Full textHahn, Mark A., Maj D. Mirmirani, and Helen R. Boussalis. "Optimal Design of a Truss Structure for a Segmented Reflector." In ASME 1995 Design Engineering Technical Conferences collocated with the ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/detc1995-0605.
Full textReports on the topic "Trust models requirements"
Streb, Jorge M., and Gustavo Torrens. Meaningful Talk. Inter-American Development Bank, February 2015. http://dx.doi.org/10.18235/0011676.
Full textOrr, Kyla, Ali McKnight, Kathryn Logan, and Hannah Ladd-Jones. Scottish Inshore Fisheries Integrated Data System (SIFIDS): work package 7 final report engagement with inshore fisheries to promote and inform. Edited by Mark James. Marine Alliance for Science and Technology for Scotland (MASTS), 2020. http://dx.doi.org/10.15664/10023.23453.
Full textSHAKING TABLE TEST OF NEW LIGHT STEEL STRUCTURE SYSTEM. The Hong Kong Institute of Steel Construction, August 2022. http://dx.doi.org/10.18057/icass2020.p.342.
Full textA STUDY OF COLLAPSE SUSCEPTIBILITY AND RESISTANCE OF LOADED CABLE-SUPPORTED PIPE STRUCTURE SUBJECT TO A SUDDEN BREAK OF CABLE MEMBER. The Hong Kong Institute of Steel Construction, September 2021. http://dx.doi.org/10.18057/ijasc.2021.17.3.7.
Full text