Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Trust model"

ADD TO MY LIST
 
A Reputation-Based Trust Evaluation Model for P2P E-Commerce

Author(s): Wang Liang | Guo Yajun | Qi Mei
Determinants of consumer intention to go to a tourist destination. The case of

Author(s): Sonia San Martín Gutiérrez | Rafael Fabricio Matos Cámara
A Model for E-banking Trust In Iran’s Banking Industry

Author(s): Kamran Feizi, | Mohammad Hossein Ronaghi,
RS-SNP: a random-set method for genome-wide association studies

Author(s): D'Addabbo Annarita | Palmieri Orazio | Latiano Anna | Annese Vito | Mukherjee Sayan | Ancona Nicola
Multilevel latent class casemix modelling: a novel approach to accommodate patient casemix

Author(s): Gilthorpe Mark | Harrison Wendy | Downing Amy | Forman David | West Robert
A Model for Using Reflection to Enhance Interprofessional Education

Author(s): Yadolah Zarezadeh | Pauline Pearson | Clair Dickinson
HYBRID TRUST MODEL FOR INTERNET ROUTING

Author(s): Pekka Rantala | Seppo Virtanen | Jouni Isoaho
Extending Resource Access in Multi-Provider Networks Using Trust Management

Author(s): Maurizio Colombo | Fabio Martinelli | Paolo Mori | Barbara Martini | Molka Gharbaoui | Piero Castoldi
Internet Banking Security Guideline Model for Banking in Thailand

Author(s): M.L.Kulthon Kasemsan | Nantana Hunngam
Social Organization of Crop Genetic Diversity. The G × E × S Interaction Model

Author(s): Christian Leclerc | Geo Coppens d’Eeckenbrugge
Optimum Plan to Improve the Economic Relation between China and Arab World

Author(s): Faisal Ibrahim Elmagherbi | Rong Wang
A Model for Providing List of Reliable Providers for Grid Computing

Author(s): Srivaramangai.P | Rengaramanujam Srinivasan
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing

Author(s): Priyank Singh Hada | Ranjita Singh | Mukul Manmohan
The effect of music background on the emotional appraisal of film sequences

Author(s): Pavlović Ivanka | Marković Slobodan
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID

Author(s): P. Suresh Kumar | P. Sateesh Kumar | S. Ramachandram
Rethinking trust as a critic factor in the organizational behaviour

Author(s): Manuel Guillén Parra | Álvaro Lleó de Nalda | Gines Santiago Marco Perles
Partner Trust Evaluation Method of Virtual Enterprise

Author(s): Zheng Leina | Pan Tiejun
The Importance of Social Media for Commerce. A Case Study in Madeira (Portugal)

Author(s): Irene Garcia Medina | Pedro Alvaro Correia Pereira
Approach focused on people Abordagem centrada nas pessoas

Author(s): Roa Ruben | Ana Carolina Diniz Oliveira | Leonardo Cançado Monteiro Savassi | Lecticia Cabral de Souza | Ruth Borges Dias
In vitro placental model optimization for nanoparticle transport studies

Author(s): Cartwright L | Poulsen MS | Nielsen HM | Pojana G | Knudsen LE | Saunders M | Rytting E
Formal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z

Author(s): Amandeep Verma | Manpreet Singh Gujral
KEY SUCCESS FACTORS FOR ACHIEVING CUSTOMER’S LOYALTY IN E-SMES: A STUDY ON IMPACT OF CUSTOMER AND E-BUSINESS CHARACTERISTICS ON E-LOYALTY IN IRAN

Author(s): Hengameh Rabiei | Mohammad Reza Meigounpoory | Pedram Yazdani | Mostafa Maleki Someah lu
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Development of E-government Services in Iran: A Comparison of Adoption Constructs

Author(s): Lotfollah Forozandeh Dehkordi | Reza Rasouli | Zahra Zebardast
A New Approach to Electronic Shopping in Insurance Industry

Author(s): Kambiz Heidarzadeh Hanzaee | Leila Karimian
TRUST AND ITS IMPACT ON THE ECONOMIC GROWTH

Author(s): Cristian C. POPESCU
Review of Cloud Computing Architecture for Social Computing

Author(s): Vaishali D. Dhale | A. R. Mahajan
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
ANTECEDENTS OF DONOR TRUST IN AN EMERGING CHARITY SECTOR: THE ROLE OF REPUTATION, FAMILIARITY, OPPORTUNISM AND COMMUNICATION

Author(s): Eduardo TORRES-MORAGA (corresponding author) | Arturo Z. VÁSQUEZ-PARRAGA | Cristóbal BARRA
Relacionamentos interorganizacionais horizontais e formação de valor em redes de agronegócios: o caso de uma rede de floriculturas

Author(s): Heron Sergio Moreira Begnis | Rejane Maria Alievi | Vania de Fátima Barros Estivalete
SATISFACTIA CLIENTILOR ADMINISTRATIEI PUBLICE

Author(s): Sorin Dan ŞANDOR | Horea RABOCA
Organizational approaches to collaboration in vocational rehabilitation − An international literature review

Author(s): Johanna Andersson | Bengt Ahgren | Susanna Bihari Axelsson | Andrea Eriksson | Runo Axelsson
Securing Mobile Agents in MANET against Attacks using Trust

Author(s): Chandreyee Chowdhury | Sarmistha Neogy
An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce

Author(s): Mehrbakhsh Nilashi | Karamollah Bagherifard | Othman Ibrahim | Nasim Janahmadi | Mousa Barisami
FUNCIONAMIENTO Y TRANSPARENCIA EN LA CADENA DE VALOR: APLICACIÓN AL CASO DEL ACEITE DE OLIVA EN ESPAÑA

Author(s): Julián Briz Escribano | Isabel De Felipe Boente | Teresa Briz de Felipe
Why do GPs hesitate to refer diabetes patients to a self-management education program: a qualitative study

Author(s): Sunaert Patricia | Vandekerckhove Marie | Bastiaens Hilde | Feyen Luc | Vanden Bussche Piet | De Maeseneer Jan | De Sutter An | Willems Sara
Efficient Certification Path Discovery for MANET

Author(s): Kambourakis Georgios | Konstantinou Elisavet | Douma Anastasia | Anagnostopoulos Marios | Fotiadis Georgios
Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

Author(s): García-Otero Mariano | Zahariadis Theodore | Álvarez Federico | Leligou HelenC | Población-Hernández Adrián | Karkazis Panagiotis | Casajús-Quirós FranciscoJ
Cautious Rating for Trust-Enabled Routing in Wireless Sensor Networks

Author(s): Maarouf Ismat | Baroudi Uthman | Naseer AR
Measuring Feedback Credibility by Customer Value in C2C Trust Model

Author(s): Yuansheng Zhong | Jianying Xiong | Leiyue Yao
Trust Levels Definition On Virtual Learning Platforms Through Semantic Languages

Author(s): Paulo A. Gaona-Garcia | Jesús Soto-Carrión | Carlos E. Montenegro-Marin
Research on Trusted Industrial Control Ethernet Network

Author(s): ZHOU Sen-xin | HAN Jiang-hong | TANG Hao
Guest Editorial

Author(s): Richard Chbeir | Youakim Badr
A System for Centralizing Online Reputation

Author(s): Morad Benyoucef | Hui Li | Gregor v. Bochmann
A Trust Model for Multiagent Recommendations

Author(s): Fabiana Lorenzi | Gabriel Baldo | Rafael Costa | Mara Abel | Ana Bazzan | Francesco Ricci
Guest Editorial

Author(s): Qihai Zhou | Yan Li
Trust Evaluation Model based on Multiple Service Attributes

Author(s): Xiaoxue Ma | Zixian Wang | Ruizhong Du
Automated Trust Negotiation with Time Behavior

Author(s): Zuo Chen | Qiuwei Yang | Xin Wan | Yuanyan Tu | Fei Yu | Chen Xu
A Fuzzy Reputation Management System with Punishment Mechanism for P2P Network

Author(s): Zhengbing Hu | Huaiqing Lin | Yonghong Zhou
Guest Editorial

Author(s): Mohammad M. Banat
Guest Editorial

Author(s): Dongfeng Yuan | Chin-Chen Chang | Fei Yu | Guozhu Liu | Jun Zhang
A Trust Transitivity Model Based-on Dempster-Shafer Theory

Author(s): Xiang Qiu | Li Zhang | Shouxin Wang | Guanqun Qian
Guest Editorial

Author(s): Zhihua Cui | Zhongzhi Shi
A Trust Evaluation Model based on Fuzzy Theory in P2P Networks

Author(s): Zhengzhen Zhou | Yongluo Luo | Liangmin Guo | Meijing Ji
Modeling and Simulation on Dynamic Allocation and Scheduling of Multi-resource problem

Author(s): Wenbin Hu | Zhengbing Hu | Yuheng Cheng | Hai Zhang | Wei Song
Guest Editorial

Author(s): Qihai Zhou | Min-bo Li | Zhongjun Li
Guest Editorial

Author(s): Syed Mahfuzul Aziz | Vijayan K. Asari | M. Alamgir Hossain | Mohammad Ataul Karim | Mariofanna Milanova
Sociality brings Security in Content Sharing

Author(s): Mohammad Mushfiqur Rahman Chowdhury | Sarfraz Alam | Zahid Iqbal | Josef Noll
Towards Topology-and-Trust-Aware P2P Grid

Author(s): Yingjie Xia | Mingzhe Zhu | Yang Li
Study of Automated Trust Negotiation Mechanism Based on Cache Sequence Game in P2P Environment

Author(s): Chunzhi Wang | Ruoxi Wang | Hongwei Chen | Ya Huang
Does Religious Involvement Generate or Inhibit Fear of Crime?

Author(s): Todd Matthews | Lee Michael Johnson | Catherine Jenks
A Model for Explanation of Customer Satisfaction Consequences in Banking Industry: Evidence from Iran

Author(s): Mohammad Reza Hamidizadeh | Nasrin Jazani | Abbasali Hajikarimi | Abolghasem Ebrahimi
The Identification Level of Security, usability and Transparency Effects on Trust in B2C Commercial Websites Using Adaptive Neuro Fuzzy Inference System (ANFIS)

Author(s): Mehrbakhsh Nilashi, Mohammad Fathian, Mohammad Reza Gholamian, Othman Bin Ibrahim, Alireza Khoshraftar
Analytical Model and Performance Evaluation for the TRIDNT protocol

Author(s): Ahmed M Abd El-Haleem | Ihab A Ali | Ibrahim Ismail Ibrahim
Effective Ways of Secure Private and Trusted Cloud Computing

Author(s): Pardeep Kumar | Vivek Kumar Sehgal | Durg Singh Chauhan | P K Gupta | Manoj Diwakar
A Trust Model for Secure and QoS Routing in MANETS

Author(s): Shilpa S G | Mrs. N.R. Sunitha | B.B. Amberker
Cohesión, Vinculación e Integración sociales en el marco del Capital Social.

Author(s): Lozares, Carlos | López Roldán, Pedro | Verd, Joan Miquel | Martí, Joel | Molina, José Luis
What could infant and young child nutrition learn from sweatshops?

Author(s): Singer Peter | Ansett Sean | Sagoe-Moses Isabella
Practicing provider-initiated HIV testing in high prevalence settings: consent concerns and missed preventive opportunities

Author(s): Njeru Mercy | Blystad Astrid | Shayo Elizabeth | Nyamongo Isaac | Fylkesnes Knut
Near-Duplicates Detection and Elimination Based on Web Provenance for Effective Web Search

Author(s): Y. Syed Mudhasir | J. Deepika | S. Sendhilkumar | G.S. Mahalakshmi
Research on Knowledge Transfer Influencing Factors in Software Process Improvement

Author(s): Jiangping Wan | Qingjing Liu | Dejie Li | Hongbo Xu
An Evaluation Approach of Subjective Trust Based on Cloud Model

Author(s): Shouxin Wang | Li Zhang | Na Ma | Shuai Wang
A Reputation-Based Multi-Agent Model for Network Resource Selection

Author(s): Junfeng TIAN | Juan LI | Lidan YANG
A Novel Approach to Improve the Security of P2P File-Sharing Systems

Author(s): Cuihua ZUO | Ruixuan LI | Zhengding LU
A Trust Model Based on the Multinomial Subjective Logic for P2P Network

Author(s): Junfeng TIAN | Chao Li | Xuemin HE | Rui TIAN
Applying RFM Model to Evaluate the E-loyalty for Information-based Website

Author(s): Chui-Yu Chiu | Zhi-Ping Lin | Po-Chia Chen | I-Ting Kuo
Trust Index Based Fault Tolerant Multiple Event Localization Algorithm for WSNs

Author(s): Xianghua Xu | Xueyong Gao | Jian Wan | Naixue Xiong
Mental health network governance and coordination: comparative analysis across Canadian regions

Author(s): Mary E. Wiktorowicz | Marie-Josée Fleury | Carol E. Adair | Alain Lesage | Elliot Goldner | Suzanne Peters
A Hybrid Model for Load Aware Trust Management in Grid

Author(s): K. Selvi | R. S.D. Wahida Banu

Tango Jona
Tangokurs Rapperswil-Jona

     Affiliate Program