Journal articles on the topic 'Trustworthy service management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trustworthy service management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Luo, Zongwei, and Tianle Zhang. "A Mobile Service Platform for Trustworthy E-Learning Service Provisioning." International Journal of Dependable and Trustworthy Information Systems 1, no. 3 (July 2010): 1–13. http://dx.doi.org/10.4018/jdtis.2010070101.
Full textFarahbakhsh, Bahareh, Ali Fanian, and Mohammad Hossein Manshaei. "TGSM: Towards trustworthy group-based service management for social IoT." Internet of Things 13 (March 2021): 100312. http://dx.doi.org/10.1016/j.iot.2020.100312.
Full textKurdi, Heba, Bushra Alshayban, Lina Altoaimy, and Shada Alsalamah. "TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/1073216.
Full textPerepelkin, Jason, and David Di Zhang. "Quality alone is not enough to be trustworthy." International Journal of Pharmaceutical and Healthcare Marketing 8, no. 2 (May 27, 2014): 226–42. http://dx.doi.org/10.1108/ijphm-02-2013-0006.
Full textMoustafa, Ahmed, Minjie Zhang, and Quan Bai. "Trustworthy Stigmergic Service Compositionand Adaptation in Decentralized Environments." IEEE Transactions on Services Computing 9, no. 2 (March 2016): 317–29. http://dx.doi.org/10.1109/tsc.2014.2298873.
Full textBhatia, Sugandh, and Jyoteesh Malhotra. "CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3756. http://dx.doi.org/10.11591/ijece.v8i5.pp3756-3766.
Full textHWANG, JUNSEOK, SO YOUNG KIM, HAK-JIN KIM, and JIHYOUN PARK. "AN OPTIMAL TRUST MANAGEMENT METHOD TO PROTECT PRIVACY AND STRENGTHEN OBJECTIVITY IN UTILITY COMPUTING SERVICES." International Journal of Information Technology & Decision Making 10, no. 02 (March 2011): 287–308. http://dx.doi.org/10.1142/s0219622011004336.
Full textAbdullah, Lamya, and Juan Quintero. "Sealed computation: a mechanism to support privacy-aware trustworthy cloud service." Information & Computer Security 27, no. 5 (November 11, 2019): 601–20. http://dx.doi.org/10.1108/ics-11-2018-0133.
Full textRobles, Tomás, Borja Bordel, Ramón Alcarria, and Diego Sánchez-de-Rivera. "Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091211. http://dx.doi.org/10.1177/1550147720912110.
Full textAlam, Masoom, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung, and Quratulain Alam. "Behavioral Attestation for Web Services Based Business Processes." International Journal of Web Services Research 7, no. 3 (July 2010): 52–72. http://dx.doi.org/10.4018/jwsr.2010070103.
Full textWinter, A. "The Future of Medical Informatics." Methods of Information in Medicine 48, no. 01 (2009): 62–65. http://dx.doi.org/10.3414/me9138.
Full textSultana, Mehbooba, Ditalak Mpanme, and Jaynal Uddin Ahmed. "Customer Relationship Management Practices and Employee Sensitivities of Private Sector Banks: An Analysis in Indian Context." Business and Economic Research 12, no. 4 (December 13, 2022): 68. http://dx.doi.org/10.5296/ber.v12i4.20426.
Full textAnisetti, Marco, Claudio Agostino Ardagna, Ernesto Damiani, and Filippo Gaudenzi. "A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification." IEEE Transactions on Services Computing 13, no. 1 (January 1, 2020): 30–43. http://dx.doi.org/10.1109/tsc.2017.2657505.
Full textSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (April 8, 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Full textZhang, Jian Hong, Xue Liu, and Cheng Lian Liu. "A RSA-Based Data Integrity Check without Original Data in the Cloud Computing." Applied Mechanics and Materials 44-47 (December 2010): 3726–30. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3726.
Full textEmmy Dwi Setyaningsih. "SHARIA MANAGEMENT AND BENEFITS FOR FOOD TRADERS." Al-Idarah : Jurnal Manajemen dan Bisnis Islam 3, no. 1 (February 20, 2022): 82–88. http://dx.doi.org/10.35316/idarah.2022.v3i1.82-88.
Full textWexler, Mark N., and Judy Oberlander. "Robo-advisors (RAs): the programmed self-service market for professional advice." Journal of Service Theory and Practice 31, no. 3 (January 8, 2021): 351–65. http://dx.doi.org/10.1108/jstp-07-2020-0153.
Full textGroth Andersson, Signe, and Verner Denvall. "Data Recording in Performance Management." American Journal of Evaluation 38, no. 2 (December 16, 2016): 190–204. http://dx.doi.org/10.1177/1098214016681510.
Full textSylla, Tidiane, Mohamed Aymen Chalouf, Francine Krief, and Karim Samaké. "SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things." Security and Communication Networks 2021 (April 14, 2021): 1–24. http://dx.doi.org/10.1155/2021/6632747.
Full textBerry, Leonard L., Tracey S. Danaher, Lerzan Aksoy, and Timothy L. Keiningham. "Service Safety in the Pandemic Age." Journal of Service Research 23, no. 4 (July 29, 2020): 391–95. http://dx.doi.org/10.1177/1094670520944608.
Full textBrown, Antony, Paul Sant, Nik Bessis, Tim French, and Carsten Maple. "Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures." International Journal of Systems and Service-Oriented Engineering 1, no. 4 (October 2010): 1–18. http://dx.doi.org/10.4018/jssoe.2010100101.
Full textHendra, Hendra, Ravel Ravel, Novel Firdhaus, Michael Ari Kurniawan, and Gilbert Platina. "E-HEALTH PERSONAL DATA PROTECTION IN INDONESIA." JURNAL HUKUM KESEHATAN INDONESIA 1, no. 02 (April 13, 2022): 121–31. http://dx.doi.org/10.53337/jhki.v1i02.15.
Full textL'Hours, Hervé, Mari Kleemola, and Lisa De Leeuw. "CoreTrustSeal: From academic collaboration to sustainable services." IASSIST Quarterly 43, no. 1 (May 10, 2019): 1–17. http://dx.doi.org/10.29173/iq936.
Full textSaadoon, Karzan J., Mustafa Muhlis, and Rezhan O. Mohammed. "Architecture Students’ Satisfaction in Iraqi Private Universities: TIU-S in Focus." International Journal of Sustainable Development and Planning 17, no. 4 (July 27, 2022): 1349–54. http://dx.doi.org/10.18280/ijsdp.170432.
Full textMujawar, Tabassum N., and Lokesh B. Bhajantri. "The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijcac.308273.
Full textGrott, Emily Mary, Jesus Cambra-Fierro, Lourdes Perez, and Mirella Yani-de-Soriano. "How cross-culture affects the outcomes of co-creation." European Business Review 31, no. 4 (June 10, 2019): 544–66. http://dx.doi.org/10.1108/ebr-01-2018-0022.
Full textRana, Kajol, Ajay Vikram Singh, and P. Vijaya. "Intelligent Trust based Security Framework for Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 2s (December 31, 2022): 14–22. http://dx.doi.org/10.17762/ijritcc.v10i2s.5907.
Full textDai, Huan, Pengzhan Shi, He Huang, Ruyu Chen, and Jun Zhao. "Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/3050953.
Full textBlobel, B. G. M. E. "Educational Challenge of Health Information Systems’ Interoperability." Methods of Information in Medicine 46, no. 01 (2007): 52–56. http://dx.doi.org/10.1055/s-0038-1628132.
Full textKang, Yunhee, Jaehyuk Cho, and Young B. Park. "An Empirical Study of a Trustworthy Cloud Common Data Model Using Decentralized Identifiers." Applied Sciences 11, no. 19 (September 27, 2021): 8984. http://dx.doi.org/10.3390/app11198984.
Full textAlonso, Juncal, Leire Orue-Echevarria, Eneko Osaba, Jesús López Lobo, Iñigo Martinez, Josu Diaz de Arcaya, and Iñaki Etxaniz. "Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum." Information 12, no. 8 (July 30, 2021): 308. http://dx.doi.org/10.3390/info12080308.
Full textBamakan, Seyed Mojtaba Hosseini, Najmeh Faregh, and Ahad ZareRavasan. "Di-ANFIS: an integrated blockchain–IoT–big data-enabled framework for evaluating service supply chain performance." Journal of Computational Design and Engineering 8, no. 2 (February 17, 2021): 676–90. http://dx.doi.org/10.1093/jcde/qwab007.
Full textAlshaabani, Ayman, Khadija Aya Hamza, and Ildikó Rudnák. "Impact of Diversity Management on Employees’ Engagement: The Role of Organizational Trust and Job Insecurity." Sustainability 14, no. 1 (December 31, 2021): 420. http://dx.doi.org/10.3390/su14010420.
Full textArseni, Ștefan-Ciprian, Bogdan-Cosmin Chifor, Mihai Coca, Mirabela Medvei, Ion Bica, and Ioana Matei. "RESFIT: A Reputation and Security Monitoring Platform for IoT Applications." Electronics 10, no. 15 (July 31, 2021): 1840. http://dx.doi.org/10.3390/electronics10151840.
Full textMaulida, Eva Fahmadia Jilan, and Ahmad Muhtadi Anshor. "Strategi Lembaga Amil Zakat Infak Shadaqah Muhammadiyah Kabupaten Tulungagung Dalam Meningkatkan Kepercayaan Muzakki." ZAWA: Management of Zakat and Waqf Journal 2, no. 1 (June 30, 2022): 1. http://dx.doi.org/10.31958/zawa.v2i1.6368.
Full textRasouli, Mohammad R., Rik Eshuis, Paul W. P. J. Grefen, Jos J. M. Trienekens, and Rob J. Kusters. "Information Governance in Dynamic Networked Business Process Management." International Journal of Cooperative Information Systems 25, no. 04 (December 2016): 1740004. http://dx.doi.org/10.1142/s0218843017400044.
Full textSingh, Vaishali, Amit Jain, and Sapna Choraria. "Exploring the Role of Complaint Handling among Complaining Consumers." Vision: The Journal of Business Perspective 20, no. 4 (December 2016): 331–44. http://dx.doi.org/10.1177/0972262916668739.
Full textSubhadra, Akella. "An Analysis of Data Security and Privacy for Cloud Computing." Asian Journal of Computer Science and Technology 9, no. 1 (May 5, 2020): 27–39. http://dx.doi.org/10.51983/ajcst-2020.9.1.2153.
Full textChang, Hangbae, and Gwangmin Park. "A study on medical information leakage protection to construct a trustworthy medical service oriented architecture in IoT environment: case study of medical tour service in South Korea." International Journal of Services Technology and Management 25, no. 3/4 (2019): 215. http://dx.doi.org/10.1504/ijstm.2019.100046.
Full textChang, Hangbae, and Gwangmin Park. "A study on medical information leakage protection to construct a trustworthy medical service oriented architecture in IoT environment: case study of medical tour service in South Korea." International Journal of Services Technology and Management 25, no. 3/4 (2019): 215. http://dx.doi.org/10.1504/ijstm.2019.10021596.
Full textSaleem, Mahreen, M. R. Warsi, Saiful Islam, Areesha Anjum, and Nadia Siddiquii. "Trust Management in the World of Cloud Computing. Past Trends and Some New Directions." Scalable Computing: Practice and Experience 22, no. 4 (December 12, 2021): 425–44. http://dx.doi.org/10.12694/scpe.v22i4.1952.
Full textRen, Wei, and Xiaochen Wu. "Application of Intelligent Medical Equipment Management System Based on Internet of Things Technology." Journal of Healthcare Engineering 2022 (February 23, 2022): 1–12. http://dx.doi.org/10.1155/2022/9149996.
Full textVan, Nguyen Thi Thanh, Vasiliki Vrana, Nguyen Thien Duy, Doan Xuan Huy Minh, Pham Tien Dzung, Subhra R. Mondal, and Subhankar Das. "The Role of Human–Machine Interactive Devices for Post-COVID-19 Innovative Sustainable Tourism in Ho Chi Minh City, Vietnam." Sustainability 12, no. 22 (November 16, 2020): 9523. http://dx.doi.org/10.3390/su12229523.
Full textArya, Mukesh Kumar, and Namit Gupta. "Adoptive Cloud Application in Semantic Web." International Journal of Advance Research and Innovation 2, no. 2 (2014): 48–51. http://dx.doi.org/10.51976/ijari.221407.
Full textNanda Herijal Putra. "Administrasi Publik Dalam Perspektif Islam: Kajian Pada Sistem Pemerintahan Umar Bin Khattab." Politica: Jurnal Hukum Tata Negara dan Politik Islam 8, no. 2 (December 1, 2021): 17–24. http://dx.doi.org/10.32505/politica.v8i2.3541.
Full textChen, Guo You, Jia Jia Miao, Feng Xie, and Han Dong Mao. "A Framework for Storage Security in Cloud Computing." Applied Mechanics and Materials 278-280 (January 2013): 1767–70. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1767.
Full textLiu, Zhen, Tzuhui Wu, Fenghong Wang, Mohamed Osmani, and Peter Demian. "Blockchain Enhanced Construction Waste Information Management: A Conceptual Framework." Sustainability 14, no. 19 (September 26, 2022): 12145. http://dx.doi.org/10.3390/su141912145.
Full textMusyafaah, Nur Lailatul, and Arif Wijaya. "Pelayanan Publik Pada Dinas Kependudukan dan Pencatatan Sipil di Kabupaten Lamongan Dalam Perspektif Fikih Siyasah." Al-Daulah: Jurnal Hukum dan Perundangan Islam 10, no. 2 (October 4, 2020): 251–74. http://dx.doi.org/10.15642/ad.2020.10.2.251-274.
Full textOlsen, Christine S., and Bruce A. Shindler. "Trust, acceptance, and citizen - agency interactions after large fires: influences on planning processes." International Journal of Wildland Fire 19, no. 1 (2010): 137. http://dx.doi.org/10.1071/wf08168.
Full textLee, Daniel, Robert Cronin, Jamie Robinson, Shilo Anders, Kim Unertl, Katherine Kelly, Heather Hankins, Ryan Skeens, and Gretchen Jackson. "Common Consumer Health-Related Needs in the Pediatric Hospital Setting: Lessons from an Engagement Consultation Service." Applied Clinical Informatics 09, no. 03 (July 2018): 595–603. http://dx.doi.org/10.1055/s-0038-1667205.
Full text