Статті в журналах з теми "Trust by the way of security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Trust by the way of security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (June 2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Wang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (April 19, 2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (April 2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam, and Mustafa M. Barakat. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (April 10, 2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Zhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Kim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (April 30, 2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Cao, Xiao Mei, Hai Tao Zhu, He Yang Shen, and Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network." Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Siriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Kumawat, Shyamlal, and Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, no. 2 (October 25, 2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Sreevidya, B., and Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (March 29, 2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
El-Sayed, Hesham, Sharmi Sankar, Heng Yu, and Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs." International Journal of Computers Communications & Control 12, no. 5 (September 10, 2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.
Xu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (February 4, 2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Pavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts." International Journal of Secure Software Engineering 3, no. 2 (April 2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.
Zhi, Kuiyun, Qiurong Tan, Si Chen, Yongjin Chen, Xiaoqin Wu, Chenkai Xue, and Anbang Song. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction." International Journal of Environmental Research and Public Health 19, no. 11 (June 3, 2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.
Joshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (January 31, 2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Yan, Ye, and Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective." Sustainability 10, no. 7 (July 17, 2018): 2495. http://dx.doi.org/10.3390/su10072495.
Manalu, Ignasius Falentino, Basrah Saidani, and Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta." Jurnal Bisnis, Manajemen, dan Keuangan 3, no. 1 (October 21, 2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.
Singh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Sun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (April 8, 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Usman, Aminu Bello, William Liu, Quan Bai, and Ajit Narayanan. "Trust of the Same." International Journal of Information Security and Privacy 9, no. 2 (April 2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.
Lalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (November 5, 2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Curtis, Shelby R., Jessica Rose Carre, and Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach." Managerial Auditing Journal 33, no. 4 (April 3, 2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.
Negi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Nurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (December 21, 2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Wenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination." Review of European Administrative Law 13, no. 3 (October 15, 2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.
Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Udayana, IBN, Putri Dwi Cahyani, and Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)." Journal Competency of Business 2, no. 1 (July 2, 2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.
Chen, Guangxuan, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen, and Qiang Liu. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud." International Journal of Digital Crime and Forensics 10, no. 1 (January 2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.
Leahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Urmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (April 2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.
Sa’diyah, Mima Halimatus, and Dedi Sulistiyo Soegoto. "The Effect of Perceived Security towards Intention to Use Digital Payment through a Trust." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 2 (December 1, 2021): 233–38. http://dx.doi.org/10.34010/icobest.v2i.277.
Nitta, Mellania Ariya, and Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen." Journal of Management and Bussines (JOMB) 4, no. 2 (December 19, 2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.
Gupta, Vishwajit, and Sumitra Shukla. "Consumer Trust in Digital Banking: A Qualitative Study of Legal and Regulatory Impacts." Interdisciplinary Studies in Society, Law, and Politics 3, no. 2 (2024): 18–24. http://dx.doi.org/10.61838/kman.isslp.3.2.4.
Ma, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu, and Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization." Future Internet 16, no. 5 (May 10, 2024): 163. http://dx.doi.org/10.3390/fi16050163.
Olaniyi, Oluwaseun Oladeji. "Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies." Asian Journal of Research in Computer Science 17, no. 5 (March 15, 2024): 172–89. http://dx.doi.org/10.9734/ajrcos/2024/v17i5447.
Nasreen, Irfana, Kashif Rathore, and Kashif Ali. "WORKPLACE SECURITY;." Professional Medical Journal 24, no. 01 (January 18, 2017): 150–65. http://dx.doi.org/10.29309/tpmj/2017.24.01.422.
M. Habash, Rania, and Mahmood Khalel. "ZERO TRUST SECURITY MODEL FOR ENTERPRISE NETWORKS." Iraqi Journal of Information and Communication Technology 6, no. 2 (August 31, 2023): 68–77. http://dx.doi.org/10.31987/ijict.6.2.223.
Þórisdóttir, Hulda, and Eva Heiða Önnudóttir. "Need for security and system fairness on the political extremes." Veftímaritið Stjórnmál og stjórnsýsla 11, no. 2 (December 15, 2015): 115. http://dx.doi.org/10.13177/irpa.a.2015.11.2.1.
Prokin, A. A. "Cloud Security Data Critical Review." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4715–17. http://dx.doi.org/10.1166/jctn.2020.9366.
Agrawal, Arpit, and Shubhangi Verma. "A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol." Oriental journal of computer science and technology 10, no. 2 (May 26, 2017): 460–66. http://dx.doi.org/10.13005/ojcst/10.02.29.
Li, Dawei, Enzhun Zhang, Ming Lei, and Chunxiao Song. "Zero trust in edge computing environment: a blockchain based practical scheme." Mathematical Biosciences and Engineering 19, no. 4 (2022): 4196–216. http://dx.doi.org/10.3934/mbe.2022194.
Farooq, Umer, Muhammad Asim, Noshina Tariq, Thar Baker, and Ali Ismail Awad. "Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security." Sensors 22, no. 12 (June 16, 2022): 4539. http://dx.doi.org/10.3390/s22124539.
Mannix, Kealan, Aengus Gorey, Donna O’Shea, and Thomas Newe. "Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them." Journal of Sensor and Actuator Networks 11, no. 3 (August 8, 2022): 43. http://dx.doi.org/10.3390/jsan11030043.
Li, Jing, and Qinyuan Li. "Data security and risk assessment in cloud computing." ITM Web of Conferences 17 (2018): 03028. http://dx.doi.org/10.1051/itmconf/20181703028.
Wang, Zhiqiang, Xinyue Yu, Peiyang Xue, Yunhan Qu, and Lei Ju. "Research on Medical Security System Based on Zero Trust." Sensors 23, no. 7 (April 6, 2023): 3774. http://dx.doi.org/10.3390/s23073774.
Bingzhang, Lee, and Anton Mamoiko. "DEVELOPING SELF-EXECUTING SMART CONTRACTS ON ETHEREUM FOR CONTAINER SHIPPING IN CHINA." T-Comm 16, no. 8 (2022): 38–45. http://dx.doi.org/10.36724/2072-8735-2022-16-8-38-45.
Nabilah, Yasmin Rajaa, and Andri Nurtantiono. "PENGARUH WORD OF MOUTH (WOM), KUALITAS PELAYANAN, KEAMANAN DAN KEPERCAYAAN TERHADAP KEPUTUSAN KONSUMEN MENGGUNAKAN JASA TRANSPORTASI ONLINE GRABBIKE DI KOTA SURAKARTA." JURNAL ILMIAH EDUNOMIKA 5, no. 1 (February 12, 2021): 61. http://dx.doi.org/10.29040/jie.v5i1.1381.
Ali Azmi, Muhammad, Sulhaini Sulhaini, and Dwi Putra Buana Sakti. "The Influence Of Privacy, Security, And Trust On Costumer Loyalty Lazada Applications In Lombok Island." PROCEEDING INTERNATIONAL CONFERENCE ON ECONOMICS, BUSINESS AND INFORMATION TECHNOLOGY (ICEBIT) 4 (July 14, 2023): 247–55. http://dx.doi.org/10.31967/prmandala.v4i0.754.
Habibur Rahman, Md, Md Al-Amin, and Nusrat Sharmin Lipy. "An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh." Risk and Financial Management 2, no. 2 (December 15, 2020): p47. http://dx.doi.org/10.30560/rfm.v2n2p47.
Kydd, Andrew. "Trust Building, Trust Breaking: The Dilemma of NATO Enlargement." International Organization 55, no. 4 (2001): 801–28. http://dx.doi.org/10.1162/002081801317193600.