Journal articles on the topic 'Trust models requirements'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trust models requirements.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Hyo-Cheol, and Seok-Won Lee. "Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems." Sensors 23, no. 10 (May 10, 2023): 4622. http://dx.doi.org/10.3390/s23104622.
Full textTikhvinskiy, Valery O., Grigory Bochechka, and Andrey Gryazev. "QoS Requirements as Factor of Trust to 5G Network." Journal of Telecommunications and Information Technology, no. 1 (March 30, 2016): 3–8. http://dx.doi.org/10.26636/jtit.2016.1.697.
Full textHussein, Aya, Sondoss Elsawah, and Hussein Abbass. "A System Dynamics Model for Human Trust in Automation under Speed and Accuracy Requirements." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 822–26. http://dx.doi.org/10.1177/1071181319631167.
Full textWang, Jingpei, and Jie Liu. "The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios." Journal of Electrical and Computer Engineering 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/4361719.
Full textAyed, Samiha, Lamia Chaari, and Amina Fares. "A Survey on Trust Management for WBAN: Investigations and Future Directions." Sensors 20, no. 21 (October 23, 2020): 6041. http://dx.doi.org/10.3390/s20216041.
Full textSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (April 8, 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Full textSoni, Sonam. "Reliable Trust Computation model in Vehicular ad-hoc Network." American Journal of Advanced Computing 1, no. 3 (July 1, 2020): 1–5. http://dx.doi.org/10.15864/ajac.1304.
Full textAsiri, Ahmad Yahya, and Sultan S. Alshamrani. "Performance Evaluation of a B2C Model Based on Trust Requirements and Factors." Scientific Programming 2021 (May 26, 2021): 1–10. http://dx.doi.org/10.1155/2021/9935849.
Full textKulaklıoğlu, Duru. "Explainable AI: Enhancing Interpretability of Machine Learning Models." Human Computer Interaction 8, no. 1 (December 6, 2024): 91. https://doi.org/10.62802/z3pde490.
Full textKapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (May 31, 2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.
Full textGupta, Punit, and Deepika Agrawal. "Trusted Cloud Platform for Cloud Infrastructure." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 8 (August 30, 2013): 1884–91. http://dx.doi.org/10.24297/ijct.v10i8.1473.
Full textSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.
Full textMohammad, Abdulghafour. "Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review." Journal of Cybersecurity and Privacy 2, no. 1 (March 4, 2022): 107–23. http://dx.doi.org/10.3390/jcp2010008.
Full textWang, Jiuru, Zhiyuan Wang, Jingcheng Song, and Hongyuan Cheng. "Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV." Electronics 12, no. 23 (November 29, 2023): 4825. http://dx.doi.org/10.3390/electronics12234825.
Full textSenan Mahmod Attar Bashi, Zainab, and Shayma Senan. "A Comprehensive Review of Zero Trust Network Architecture (ZTNA) and Deployment Frameworks." International Journal on Perceptive and Cognitive Computing 11, no. 1 (January 30, 2025): 148–53. https://doi.org/10.31436/ijpcc.v11i1.494.
Full textBaslyman, Malak, Daniel Amyot, and John Mylopoulos. "Reasoning about Confidence in Goal Satisfaction." Algorithms 15, no. 10 (September 23, 2022): 343. http://dx.doi.org/10.3390/a15100343.
Full textBrazhuk, A. I., and E. V. Olizarovich. "Towards the computer systems design based on Zero Trust Architecture." Informatics 21, no. 4 (December 30, 2024): 85–98. https://doi.org/10.37661/1816-0301-2024-21-4-85-98.
Full textKrul, Evan, Hye-young Paik, Sushmita Ruj, and Salil S. Kanhere. "SoK: Trusting Self-Sovereign Identity." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (July 2024): 297–313. http://dx.doi.org/10.56553/popets-2024-0079.
Full textFarayola, Michael Mayowa, Irina Tal, Regina Connolly, Takfarinas Saber, and Malika Bendechache. "Ethics and Trustworthiness of AI for Predicting the Risk of Recidivism: A Systematic Literature Review." Information 14, no. 8 (July 27, 2023): 426. http://dx.doi.org/10.3390/info14080426.
Full textArora, Shakti, and Surjeet Dalal. "Trust Evaluation Factors in Cloud Computing with Open Stack." Journal of Computational and Theoretical Nanoscience 16, no. 12 (December 1, 2019): 5073–77. http://dx.doi.org/10.1166/jctn.2019.8566.
Full textKang, Hongzhaoning, Gang Liu, Quan Wang, Lei Meng, and Jing Liu. "Theory and Application of Zero Trust Security: A Brief Survey." Entropy 25, no. 12 (November 28, 2023): 1595. http://dx.doi.org/10.3390/e25121595.
Full textAluvalu, Rajanikanth, Krishna Keerthi Chennam, M. A.Jabbar, and Shaik Sarfaraz Ahamed. "Risk aware Access Control model for Trust Based collaborative organizations in cloud." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.6.20235.
Full textDjamaluddin, Nursyamsi, Ayub I. Anwar, Burhanuddin Pasiga, Fuad H. Akbar, Rasmidar Samad, Hasanuddin H, and Yu Ri-Kim. "The intersection of trust and satisfaction in Dentist-Patient interactions in Indonesia." Journal of Dentomaxillofacial Science 9, no. 1 (April 1, 2024): 22–27. http://dx.doi.org/10.15562/jdmfs.v9i1.1689.
Full textAlrahhal, Hosam, Razan Jamous, Rabie Ramadan, Abdulaziz M. Alayba, and Kusum Yadav. "Utilising Acknowledge for the Trust in Wireless Sensor Networks." Applied Sciences 12, no. 4 (February 16, 2022): 2045. http://dx.doi.org/10.3390/app12042045.
Full textQi, Ping, Fucheng Wang, and Shu Hong. "A Novel Trust Model Based on Node Recovery Technique for WSN." Security and Communication Networks 2019 (September 3, 2019): 1–12. http://dx.doi.org/10.1155/2019/2545129.
Full textXin, Ruyue, Jingye Wang, Peng Chen, and Zhiming Zhao. "Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review." ACM Computing Surveys 57, no. 5 (January 9, 2025): 1–37. https://doi.org/10.1145/3701740.
Full textSchnabel, Georg, Roberto Capote, and Daniel L. Aldama. "Why trust nuclear data evaluations with Bayesian networks." EPJ Web of Conferences 284 (2023): 12004. http://dx.doi.org/10.1051/epjconf/202328412004.
Full textTrudy-Ann Campbell, Samson Eromonsei, and Olusegun Afolabi. "Efficient compliance with GDPR through automating privacy policy captions in web and mobile application." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (July 30, 2024): 446–67. http://dx.doi.org/10.30574/wjaets.2024.12.2.0317.
Full textStanešić, Josip, Zlatan Morić, Damir Regvart, and Ivan Bencarić. "Digital signatures and their legal significance." Edelweiss Applied Science and Technology 9, no. 1 (January 9, 2025): 431–40. https://doi.org/10.55214/25768484.v9i1.4154.
Full textKolomvatsos, Kostas, Maria Kalouda, Panagiota Papadopoulou, and Stathes Hadjiefthymiades. "Fuzzy Trust Modelling for Pervasive Computing Applications." Journal of Data Intelligence 2, no. 2 (June 2021): 101–15. http://dx.doi.org/10.26421/jdi2.2-1.
Full textGelei, Andrea, and Imre Dobos. "Evolving trust in business relationships – A behavioural experiment." Acta Oeconomica 72, no. 2 (June 23, 2022): 231–47. http://dx.doi.org/10.1556/032.2022.00013.
Full textAli, Ali Mohammed Omar. "Explainability in AI: Interpretable Models for Data Science." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (February 28, 2025): 766–71. https://doi.org/10.22214/ijraset.2025.66968.
Full textGharbi, Atef, and Saleh M. Altowaijri. "A Multi-Robot-Based Architecture and a Trust Model for Intelligent Fault Management and Control Systems." Electronics 12, no. 17 (August 31, 2023): 3679. http://dx.doi.org/10.3390/electronics12173679.
Full textGeitz, Sarah, Brian Moon, Anita D'Amico, Robert R. Hoffman, and Rob Page. "Beyond Requirements: Improving Software Tools for Intelligence Analysts." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 10 (September 2005): 932–35. http://dx.doi.org/10.1177/154193120504901013.
Full textShah, Syed Alamdar Ali, Raditya Sukmana, and Bayu Arie Fianto. "Duration model for maturity gap risk management in Islamic banks." Journal of Modelling in Management 15, no. 3 (February 12, 2020): 1167–86. http://dx.doi.org/10.1108/jm2-08-2019-0184.
Full textZelensky, A. A., T. K. Abdullin, M. M. Zhdanova, V. V. Voronin, and A. A. Gribkov. "Challenge of the performance management of trust control systems with deep learning." Advanced Engineering Research 22, no. 1 (March 30, 2022): 57–66. http://dx.doi.org/10.23947/2687-1653-2022-22-1-57-66.
Full textHellani, Houssein, Layth Sliman, Abed Ellatif Samhat, and Ernesto Exposito. "Overview on the Blockchain-Based Supply Chain Systematics and Their Scalability Tools." Emerging Science Journal 4 (August 23, 2021): 45–69. http://dx.doi.org/10.28991/esj-2021-sp1-04.
Full textAraddhana Arvind Deshmukh,. "Explainable AI for Adversarial Machine Learning: Enhancing Transparency and Trust in Cyber Security." Journal of Electrical Systems 20, no. 1s (March 28, 2024): 11–27. http://dx.doi.org/10.52783/jes.749.
Full textBarugahara, Florence. "Financial Inclusion in Zimbabwe: Determinants, Challenges, and Opportunities." International Journal of Financial Research 12, no. 3 (February 4, 2021): 261. http://dx.doi.org/10.5430/ijfr.v12n3p261.
Full textWu, Kewei, Yiran Wang, Xiaogang He, Jinyu Yan, Yang Guo, Zhuqing Jiang, Xing Zhang, et al. "Semi-Open Set Object Detection Algorithm Leveraged by Multi-Modal Large Language Models." Big Data and Cognitive Computing 8, no. 12 (November 29, 2024): 175. https://doi.org/10.3390/bdcc8120175.
Full textWhaiduzzaman, Md, Mohammad Nazmul Haque, Md Rejaul Karim Chowdhury, and Abdullah Gani. "A Study on Strategic Provisioning of Cloud Computing Services." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/894362.
Full textNoardo, Francesca, Rob A. Atkinson, Alejandro Villar, Piotr Zaborowski, and Ingo Simonis. "Profiling Standards to Improve Practical Interoperability." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVIII-4-2024 (October 21, 2024): 359–66. http://dx.doi.org/10.5194/isprs-archives-xlviii-4-2024-359-2024.
Full textRahman, Ashiqur Md, and Rashedur M. Rahman. "CAPM Indexed Hybrid E-Negotiation for Resource Allocation in Grid Computing." International Journal of Grid and High Performance Computing 5, no. 2 (April 2013): 72–91. http://dx.doi.org/10.4018/jghpc.2013040105.
Full textBrazil, Debbie, Charlotte Moss, and Karen Blinko. "Acute hospital preoperative assessment redesign: streamlining the patient pathway and reducing on-the-day surgery cancellations." BMJ Open Quality 10, no. 3 (September 2021): e001338. http://dx.doi.org/10.1136/bmjoq-2021-001338.
Full textYuan, Ziyao, Houjun Fang, Binqiang Han, and Zejiong Zhou. "A Comparative Study on Poverty Reduction Models of Rural Collective Economic Organizations from the Perspective of Relative Poverty." International Journal of Education and Humanities 5, no. 3 (November 16, 2022): 177–84. http://dx.doi.org/10.54097/ijeh.v5i3.2798.
Full textEnglund, Cristofer, Eren Erdal Aksoy, Fernando Alonso-Fernandez, Martin Daniel Cooney, Sepideh Pashami, and Björn Åstrand. "AI Perspectives in Smart Cities and Communities to Enable Road Vehicle Automation and Smart Traffic Control." Smart Cities 4, no. 2 (May 18, 2021): 783–802. http://dx.doi.org/10.3390/smartcities4020040.
Full textDrin, Svitlana, and Fedir Serdiuk. "Expected credit loss modeling." Mohyla Mathematical Journal 6 (April 18, 2024): 14–19. http://dx.doi.org/10.18523/2617-70806202314-19.
Full textRehman, Abdul, Mohd Fadzil Hassan, Kwang Hooi Yew, Irving Paputungan, and Duc Chung Tran. "State-of-the-art IoV trust management a meta-synthesis systematic literature review (SLR)." PeerJ Computer Science 6 (December 14, 2020): e334. http://dx.doi.org/10.7717/peerj-cs.334.
Full textZhang, Peng, and Maged N. Kamel Boulos. "Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges." Future Internet 15, no. 9 (August 24, 2023): 286. http://dx.doi.org/10.3390/fi15090286.
Full textSmruti P. Patil. "Design of an Efficient QOS Aware Trust-Based Security Model with Bioinspired Sidechains for Healthcare Deployments." Communications on Applied Nonlinear Analysis 32, no. 3 (October 11, 2024): 181–96. http://dx.doi.org/10.52783/cana.v32.1938.
Full text