. Authentication in open networks usually requires participation oftrusted entities. Many protocols allow trust to be obtained by recommendationof other entities whose recommendations are known to be reliable.To consider an entity as being trustworthy, especially if there havebeen several mediators or contradicting recommendations, it is necessaryto have a means of estimating its trustworthiness. In this paperwe present a method for the valuation of trustworthiness which canbe used to...
CITATION STYLE
Beth, T., Borcherding, M., & Klein, B. (1994). Valuation of trust in open networks (pp. 1–18). https://doi.org/10.1007/3-540-58618-0_53
Mendeley helps you to discover research relevant for your work.