首页    期刊浏览 2024年09月16日 星期一
登录注册

文章基本信息

  • 标题:A Comparitive study of trust management models in E-Business environment
  • 本地全文:下载
  • 作者:BheemarasettyB.Shankar ; NagiReddy Gari Dileep ; Sai Shahank.G
  • 期刊名称:International Journal of Computer Technology and Applications
  • 电子版ISSN:2229-6093
  • 出版年度:2010
  • 卷号:1
  • 期号:1
  • 页码:38-42
  • 出版社:Technopark Publications
  • 摘要:Trust is one of the bastions of both business and personal life, an inherent characteristic that must be present in every relationship. It is a bidirectional process, which must be mutual at different levels in either direction among the relying party and trusted party. This becomes more of a psychological requirement as the bond generally involves people, directly or indirectly. In an ideal situation where each is in place, and the human beings involved are completely satisfied in all ways, the concept of trust seems to become diluted. However in the present society, this “ideal situation” by and large doesn’t exist. Thus securing trust is a challenge which is much simpler in traditional environment than in an electronic environment. In electronic environment there is no physical contact between the buyer and seller hence over here trust becomes an important ingredient as, e business will be successful only if the buyer trusts the person and place involved in online business and feels secure in transacting over the internet. Various trust models aid the process of enhancing security, specifying the hybrid trust relationship and associated operations. Each model presents specific ideas related to certain trust issues. These different trust models are studied and hence subjected to comparison. The pros and cons of each are understood and thus the advantage of one over the other is stated. Application of the trust models in an effective manner is extremely necessary hence the different ways in which these are applied is elaborately explained. Accordingly a detailed comparison no feach model with the other pinpoints its diversity and usefulness thus leading to a through analysis of the different trust models.a
国家哲学社会科学文献中心版权所有