Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Trust bases

Mentoring relationships are of a voluntary, trust-based nature. Both parties often share very personal thoughts and experiences with each other. Mentor and mentee should therefore protect one another s reputation by respecting the confidentiality and privacy of the meetings. [Pg.184]

Trust-based relationships are still very important for doing business in China. They open doors and influence decisions a contract may be worth only as much as the relationship behind it. [Pg.427]

Boukerche A. and Ren Y, "A secure mobile healthcare system using trust-based multicast scheme," IEEE Journal on Selected Areas in Communications 27(4), pp. 387-399,2009. [Pg.509]

I get a set of people excited and positive about what the job is. So I m not a detail person actually. I m bad at that. But I m a good judge of other people. My management style is a trust-based system. I mean if I have someone working for me, I have a high trust level. Basically I just convey the big picture and stay... [Pg.117]

The analysis has determined that the company has to focus on long-term trust-based supplier relationships, since the supply of modules such as the chipset are highly dependent on a long-term relationship between supplier and buyer. The... [Pg.121]

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks... [Pg.214]

Abstract. Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their advantages with respect to classic sensor networks. However, nodes in a WSN cooperate and this exposes them to several security threats. Trust-based systems constitute an established solution to ensrrre security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer. We show how such attacks are tolerated with low overhead in comparison to unprotected systems. Preliminary experimental results are presented confirming the validity of the proposed approach. [Pg.214]

Keywords Trust-based systems, trust, reputation, intrusion prevention, Wireless Sensor Network, Ad hoc On-Demand Distance Vector. [Pg.214]

To the best of our knowledge, trust-based models currently proposed on WSNs use passive approaches, i.e. they only make use of information provided by the routing protocol in use. This implies that the features of the routing protocol in use pose limitations to the trust-based architecture. Our work instead proposes a proactive, event-driven approach, so that relevant information can be collected by the trust-based architecture independently of the specific features of the considered routing protocol. Also, the choice of an event-driven approach allows a significant reduction of the introduced overhead, with respect to the one obtained by periodically exchanging collected measurements. [Pg.217]

Fig. 3. An example of WSN topology where a route update is requested and the trust-based architecture estimates the most dependable source to be chosen. (Solid line = route established and saved in the corresponding routing tables dashed line = candidate route to replace the established route)... Fig. 3. An example of WSN topology where a route update is requested and the trust-based architecture estimates the most dependable source to be chosen. (Solid line = route established and saved in the corresponding routing tables dashed line = candidate route to replace the established route)...
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 225 Table 1. AODV extensions implemented (for IPv4)... [Pg.225]

Table 2. Testbed configuration for simulation of the trust-based architecture... Table 2. Testbed configuration for simulation of the trust-based architecture...
In this work, a trust-based approach was proposed to ensure intrusion tolerant routing in WSNs. For this purpose, an additional layer was introduced in the WSN protocol stack such layer performs intrusion tolerance activities and masks information to routing layer when more dependable information are estimated to be already available. The layered approach proposed allows us to provide tolerance capabilities to existing protocols. This cannot be ensured when instead... [Pg.227]

In anticipation of the introduction of risk management requirements under 1EC80001 (or in case of expansion of the scope of the Medical Devices Directive), the NHS Connecting for Health (CfH) Chnical Safety Group commenced creating and training a network of Trust based Clinical Safety Officers to assist in the safety management tasks associated with new systems deployment. [Pg.163]

The theoretical literature on supply chain collaboration is diversified representing multiple perspectives. The diverse literature reflects the versatile nature of supply chain collaboration involving a variety of motives and objectives (Barringer and Harrison 2000 Hitt 2011 Verdecho et al. 2012 Fawcett et al. 2012). This study examines supply chain collaboration from multiple perspectives (1) technical-economic perspective, e.g. uncertainty reduction, transaction cost economics, resource based view, relational view, and extended resource based view (2) sociopolitical perspective, e.g. resource dependence theory, social exchange theory, and social dilemma theory (3) trust based rationalism and (4) learning and knowledge perspective. These multiple perspectives provide us with insights into the nature, forms, contents, and forces of supply chain collaboration. [Pg.18]

Trust based rationalism (TBR) employs a behavioral assumption of trustworthiness, fair play, responsibility, and altruism instead of betrayal, self-interest, and opportunism. It focuses on collaboration and cooperation rather than politics and conflicts as the primary interaction modes. Trust, relationship, and social capital are the key concepts in TBR. Trust is viewed as a critical determinant in establishing a relational mode of governance structure (Kumar et al. 1998). Continuing supply chain collaboration is based more on tmst and equity than on monitoring and control capabilities (Kim et al. 2005). [Pg.23]

Collaborative culture is considered as another important antecedent variable with four subcomponents collectivism, long term orientation, power symmetry, and uncertainty avoidance. Collectivism and long term orientation are identified based on trust based rationalism. Power symmetry is viewed from resource dependence theory and social exchange theory. Uncertainty avoidance is evaluated based on transaction cost economics. [Pg.26]


See other pages where Trust bases is mentioned: [Pg.58]    [Pg.32]    [Pg.76]    [Pg.103]    [Pg.274]    [Pg.303]    [Pg.228]    [Pg.197]    [Pg.117]    [Pg.319]    [Pg.387]    [Pg.117]    [Pg.208]    [Pg.209]    [Pg.209]    [Pg.382]    [Pg.215]    [Pg.215]    [Pg.217]    [Pg.217]    [Pg.10]    [Pg.12]    [Pg.18]    [Pg.23]    [Pg.24]   


SEARCH



Trust

Trust based rationalism

© 2024 chempedia.info