Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. A collusion mitigation scheme for reputation systems

M. Niknafs; S. Dorri Nogoorani; R. Jalili

Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 151-166

http://dx.doi.org/10.22042/isecure.2016.7.2.7

Abstract
  Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, ...  Read More

2. GTrust: a group based trust model

M. Ezhei; B. Tork Ladani

Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 155-170

http://dx.doi.org/10.22042/isecure.2014.5.2.4

Abstract
  Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this ...  Read More

3. Prediction of user's trustworthiness in web-based social networks via text mining

H. Mohammadhassanzadeh; H. R. Shahriari

Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 171-187

http://dx.doi.org/10.22042/isecure.2014.5.2.5

Abstract
  In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have ...  Read More

4. A confidence-aware interval-based trust model

H. Shakeri; A. Ghaemi Bafghi

Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 151-165

http://dx.doi.org/10.22042/isecure.2013.4.2.6

Abstract
  It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used ...  Read More