An Effective Model for Indirect Trust Computation in Pervasive Computing Environment