Access Restriction

Author Hussain, O.K. ♦ Chang, E. ♦ Hussain, F.K. ♦ Dillon, T.S. ♦ Soh, B.
Source IEEE Xplore Digital Library
Content type Text
Publisher Institute of Electrical and Electronics Engineers, Inc. (IEEE)
File Format PDF
Copyright Year ©2005
Language English
Subject Domain (in DDC) Technology ♦ Engineering & allied operations ♦ Applied physics
Subject Keyword Computer science ♦ Uncertainty ♦ Peer to peer computing ♦ Internet ♦ Australia ♦ Risk analysis ♦ Cost benefit analysis ♦ Information technology ♦ Environmental economics ♦ Information systems
Abstract Every activity has some risk involved in it. Analyzing the risk involved in a transaction is important to decide whether to proceed with the transaction or not. Similarly in peer-to-peer communication analyzing the risk involved in undertaking a transaction with another peer too is important. It would be much easier for the trusting peer to make a decision of proceeding a transaction with the trusted peer if he knows the risk that the trusted peer is worthy of. In this paper we develop and propose such a methodology which allows the trusting peer to rate the trusted peer in terms of risk that he deserves after the transaction is over.
Description Author affiliation: Sch. of Inf. Syst., Curtin Univ. of Technol., Perth, WA, Australia (Hussain, O.K.; Chang, E.; Hussain, F.K.)
ISBN 0780390946
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research ♦ Reading
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-10
Publisher Place Australia
Rights Holder Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Size (in Bytes) 2.49 MB
Page Count 12
Starting Page 655
Ending Page 666

Source: IEEE Xplore Digital Library