A methodology for determining riskiness in peer-to-peer communication
dc.contributor.author | Hussain, Omar | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Hussain, Farookh | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.author | Soh, B. | |
dc.date.accessioned | 2017-01-30T11:49:09Z | |
dc.date.available | 2017-01-30T11:49:09Z | |
dc.date.created | 2008-11-12T23:25:03Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Hussain, Omar Khadeer and Chang, Elizabeth and Hussain, Farookh Khadeer and Dillon, Tharam S. and Soh, Ben. 2005. : A methodology for determining riskiness in peer-to-peer communication, in Dillon, Tharam S. and Yu, X. and Chang, E. (ed), INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Aug 10 2005, pp. 655-666. Perth, WA: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/15319 | |
dc.identifier.doi | 10.1109/INDIN.2005.1560454 | |
dc.description.abstract |
Every activity has some Risk involved in it. Analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. Similarly in Peer-to-Peer communication analyzing the Risk involved in undertaking a transaction with another peer too is important. It would be much easier for the trusting peer to make a decision of proceeding a transaction with the trusted peer if he knows the Risk that the trusted peer is worthy of. In this paper develop and propose such a methodology which allows the trusting peer to rate the trusted peer in terns of Risk that he deserves after the transaction is over. | |
dc.publisher | IEEE | |
dc.subject | Trusted peer | |
dc.subject | Interaction | |
dc.subject | Criterion | |
dc.subject | Riskiness | |
dc.subject | Trusting peer | |
dc.title | A methodology for determining riskiness in peer-to-peer communication | |
dc.type | Conference Paper | |
dcterms.source.startPage | 655 | |
dcterms.source.endPage | 666 | |
dcterms.source.title | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.series | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.conference | INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business | |
dcterms.source.conference-start-date | Aug 10 2005 | |
dcterms.source.conferencelocation | Perth, WA | |
dcterms.source.place | Perth, WA | |
curtin.note |
Copyright 2005 IEEE | |
curtin.note |
Reprinted from: | |
curtin.note |
2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005 | |
curtin.note |
IEEE Catalog Number ISBN 05EX1057 | |
curtin.note |
ISBN 0-7803-9094-6 | |
curtin.note |
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. | |
curtin.note |
By choosing to view this document, you agree to all provisions of the copyright laws protecting it. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-550 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |