Skip to main content
Fig. 5 | EURASIP Journal on Wireless Communications and Networking

Fig. 5

From: A collaborative service resource evaluation model based on trust network

Fig. 5

Security protocol of evaluation feedback process. Node V carries the proof feedback source's evaluation ticket to service F, and the proof transaction certificate of node U and node V. When node U continues to feedback to node W, the steps are similar to the evaluation collection, but this time it carries the evaluation ticket from V. The protocol guarantees that the identity of any process node will not be counterfeited and that no node will deny its own behavior

Back to article page