{"id":"https://openalex.org/W2000797806","doi":"https://doi.org/10.1109/infrkm.2012.6205031","title":"Hybrid scheme for trust management in pervasive computing","display_name":"Hybrid scheme for trust management in pervasive computing","publication_year":2012,"publication_date":"2012-03-01","ids":{"openalex":"https://openalex.org/W2000797806","doi":"https://doi.org/10.1109/infrkm.2012.6205031","mag":"2000797806"},"language":"en","primary_location":{"id":"doi:10.1109/infrkm.2012.6205031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infrkm.2012.6205031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on Information Retrieval &amp; Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032999664","display_name":"Abubakr Sirageldin","orcid":null},"institutions":[{"id":"https://openalex.org/I182023848","display_name":"Petronas (Malaysia)","ror":"https://ror.org/02tc7rm90","country_code":"MY","type":"company","lineage":["https://openalex.org/I182023848"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Abubakr Sirageldin","raw_affiliation_strings":["Computer and Information Science Department, University Technology Petronas, Tronoh, Perak, Malaysia","Computer and Information Science Department, University Technology Petronas, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science Department, University Technology Petronas, Tronoh, Perak, Malaysia","institution_ids":["https://openalex.org/I182023848"]},{"raw_affiliation_string":"Computer and Information Science Department, University Technology Petronas, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia","institution_ids":["https://openalex.org/I182023848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039227039","display_name":"Baharum Baharudin","orcid":null},"institutions":[{"id":"https://openalex.org/I182023848","display_name":"Petronas (Malaysia)","ror":"https://ror.org/02tc7rm90","country_code":"MY","type":"company","lineage":["https://openalex.org/I182023848"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Baharum Baharudin","raw_affiliation_strings":["Computer and Information Science Department, University Technology Petronas, Tronoh, Perak, Malaysia","Computer and Information Science Department, University Technology Petronas, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science Department, University Technology Petronas, Tronoh, Perak, Malaysia","institution_ids":["https://openalex.org/I182023848"]},{"raw_affiliation_string":"Computer and Information Science Department, University Technology Petronas, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia","institution_ids":["https://openalex.org/I182023848"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058893452","display_name":"Low Tang Jung","orcid":"https://orcid.org/0000-0002-2059-5107"},"institutions":[{"id":"https://openalex.org/I182023848","display_name":"Petronas (Malaysia)","ror":"https://ror.org/02tc7rm90","country_code":"MY","type":"company","lineage":["https://openalex.org/I182023848"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Low Tang Jung","raw_affiliation_strings":["Computer and Information Science Department, University Technology Petronas, Tronoh, Perak, Malaysia","Computer and Information Science Department, University Technology Petronas, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Computer and Information Science Department, University Technology Petronas, Tronoh, Perak, Malaysia","institution_ids":["https://openalex.org/I182023848"]},{"raw_affiliation_string":"Computer and Information Science Department, University Technology Petronas, Bandar Seri Iskandar, 31750 Tronoh, Perak, Malaysia","institution_ids":["https://openalex.org/I182023848"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032999664"],"corresponding_institution_ids":["https://openalex.org/I182023848"],"apc_list":null,"apc_paid":null,"fwci":2.7677,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.91736423,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"45","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.7638130187988281},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7068297266960144},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.623198390007019},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6160433888435364},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.5879830718040466},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5545286536216736},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5279820561408997},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39449822902679443},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35679566860198975},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34174078702926636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23749783635139465},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17483419179916382}],"concepts":[{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.7638130187988281},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7068297266960144},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.623198390007019},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6160433888435364},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.5879830718040466},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5545286536216736},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5279820561408997},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39449822902679443},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35679566860198975},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34174078702926636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23749783635139465},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17483419179916382},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infrkm.2012.6205031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infrkm.2012.6205031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on Information Retrieval &amp; Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W169137397","https://openalex.org/W171660804","https://openalex.org/W1745337068","https://openalex.org/W1969092195","https://openalex.org/W1972199457","https://openalex.org/W1991163761","https://openalex.org/W2053034494","https://openalex.org/W2076805781","https://openalex.org/W2098651816","https://openalex.org/W2118880426","https://openalex.org/W2119117803","https://openalex.org/W2122516858","https://openalex.org/W2130719936","https://openalex.org/W2324280618","https://openalex.org/W6606893604","https://openalex.org/W6663880050"],"related_works":["https://openalex.org/W2090763504","https://openalex.org/W148178222","https://openalex.org/W2104657898","https://openalex.org/W1948992892","https://openalex.org/W1886884218","https://openalex.org/W1910826599","https://openalex.org/W1980100242","https://openalex.org/W2530420969","https://openalex.org/W2051187167","https://openalex.org/W2039842676"],"abstract_inverted_index":{"Trust":[0],"management":[1,83,122],"in":[2,73,92,145],"pervasive":[3],"computing":[4],"becomes":[5],"increasingly":[6],"important":[7],"and":[8,41,56,66,99,134,161],"obtained":[9],"high":[10],"attention":[11],"a":[12,76,96,120,126],"few":[13],"years":[14],"ago.":[15],"Different":[16],"methodologies":[17],"have":[18],"been":[19,86],"proposed":[20,143],"to":[21,80,108,152],"improve":[22],"trust":[23,82,98,121,156],"management.":[24],"These":[25],"approaches":[26],"can":[27],"be":[28],"classified":[29],"into":[30],"three":[31],"groups":[32],"as":[33,45],"follows:":[34],"the":[35,57,70,111,129,142,147,154,167],"first":[36],"group":[37,52,59],"used":[38,53],"Bayesian":[39],"statistics":[40],"its":[42],"derivation":[43],"such":[44],"Dempster-Shaffer":[46],"theory":[47],"of":[48,105,113,128,141],"evidence.":[49],"The":[50,88,138],"second":[51],"game":[54],"theory,":[55],"third":[58],"depends":[60],"on":[61],"algebraic":[62],"ordinary":[63],"set":[64],"operation":[65],"fuzzy":[67,135,168],"logic.":[68],"Despite":[69],"previous":[71],"work":[72],"this":[74,93,116],"area,":[75],"comprehensive":[77,97],"security":[78,90],"model":[79],"support":[81,130,148],"has":[84],"yet":[85],"accomplished.":[87],"critical":[89],"threats":[91],"environment":[94],"necessitate":[95],"privacy":[100],"models":[101],"which":[102],"require":[103],"integration":[104],"different":[106],"concepts":[107],"evaluate":[109],"precisely":[110],"trustworthiness":[112],"entities.":[114],"In":[115],"paper,":[117],"we":[118],"propose":[119],"scheme":[123,144],"by":[124],"implementing":[125],"fusion":[127],"vector":[131,149],"machine":[132,150],"(SVM)":[133],"logic":[136],"system.":[137],"main":[139],"motivation":[140],"using":[146],"is":[151],"predict":[153],"optimal":[155],"values":[157,165],"for":[158],"approximation":[159],"purpose,":[160],"then":[162],"those":[163],"approximated":[164],"relate":[166],"basis":[169],"functions.":[170]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
