Filters








208,378 Hits in 6.8 sec

A trust-based context-aware access control model for Web-services

R. Bhatti, E. Bertino, A. Ghafoor
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
A key challenge in Web services security is the design of effective access control schemes that can adequately meet the unique security challenges posed by the Web services paradigm.  ...  In this paper, we motivate the design of an access control scheme that addresses these issues, and propose an extended, trust-enhanced version of our XML-based Role Based Access Control (X-RBAC) framework  ...  Acknowledgements Portions of this work have been supported by the sponsors of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, and the National  ... 
doi:10.1109/icws.2004.1314738 dblp:conf/icws/BhattiBG04 fatcat:wxzpemmf5nhudmxxmfrcvffcai

A Trust-Based Context-Aware Access Control Model for Web-Services

Rafae Bhatti, Elisa Bertino, Arif Ghafoor
2005 Distributed and parallel databases  
A key challenge in Web services security is the design of effective access control schemes that can adequately meet the unique security challenges posed by the Web services paradigm.  ...  In this paper, we motivate the design of an access control scheme that addresses these issues, and propose an extended, trust-enhanced version of our XML-based Role Based Access Control (X-RBAC) framework  ...  Formally, a service is a subset of the data set RO, and is designated by the service name srv that is defined per the wsdl:service element of the Web Services Description Language (WSDL) document Services  ... 
doi:10.1007/s10619-005-1075-7 fatcat:nrqnmezalvgj7mz3skakmewbki

ENHANCED CLOUDARMOR:USING INTRUSION DETECTION SYSTEM AND TRUST ROUTING FRAMEWORK

2017 International Journal of Recent Trends in Engineering and Research  
Trust management is one of the most challenging issues in the adoption and growth of cloud computing environment.  ...  There are various services available in the cloud server like IaaS, PaaS, SaaS. From these services for security purpose TaaS -Trust as a service has been implemented.  ...  Here SMTP server has been enhanced as ESMTP for implement Trust as a service and IDS has been implemented for Aware as a service.  ... 
doi:10.23883/ijrter.2017.3071.hzlvv fatcat:k6xtbui6erbu5bfcr6ja5pyfki

Trust as Differentiator for Value-Adding Home Service Providers

W. Haerick, J. Nelis, D. Verslype, C. Develder, F. De Turck, B. Dhoedt
2009 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns  
In a proof-of-concept implementation, we evaluate the performance overhead of transparent service authentication and three policy administration approaches.  ...  The results illustrate a minimal overhead to add trust-based service collaboration to any (legacy) service.  ...  Three architecture to realize trusted service environment to realize trusted service environments, and specifying the design of an user-and context-aware residential gateway.  ... 
doi:10.1109/computationworld.2009.108 fatcat:pnhx66dyvrfzxdediwtyhl72cu

Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm

Wenjuan Li, Shihua Cao, Keyong Hu, Jian Cao, Rajkumar Buyya, Honghao Gao
2021 Security and Communication Networks  
We have developed a trust-based cloud-fog-edge service simulation system based on iFogsim, and through a large number of experiments, the performance of the proposed model is verified in terms of makespan  ...  Therefore, this paper introduces blockchain technology to construct a trust-enabled interaction framework in a cloud-fog-edge environment, and through a double-chain structure, it improves the reliability  ...  Li put forward an online learning aided service offloading model for mobile edge computing [41] . H. Yang et al. designed a context-aware trust prediction model for vehicle edge computing [42] . S.  ... 
doi:10.1155/2021/5563312 fatcat:h4t5wzxfibcorknahfm2utxq5u

Trust Management Model and Architecture for Context-Aware Service Platforms [chapter]

Ricardo Neisse, Maarten Wegdam, Marten van Sinderen, Gabriele Lenzini
2007 Lecture Notes in Computer Science  
Based on our trust model we have designed a distributed trust management architecture and implemented a proof of concept prototype.  ...  Our model addresses a set of trust aspects that is relevant for our target context-aware service platform and is extensible with other trust aspects.  ...  Lenzini has been partially supported by both the Freeband AWARENESS project and the ITEA project Trust4All.  ... 
doi:10.1007/978-3-540-76843-2_47 fatcat:mpuhq52qxvad5mjhzp5y2ywfdu

Branding Services in Mature Markets: Evidence from Egypt

Rasha Abdel Aziz El Naggar, Noha Bendary
2019 International Journal of Marketing Studies  
Branding of services is a challange due to services characteristics. It is even more challanging in mature markets.  ...  Confirmatory factor analysis and path analysis were used to test hypotheses of direct and indirect relationships among Aaker’s (1991) model of branding, and variables derived from services marketing  ...  Literature Review and Hypotheses A brand can be defined as: "a name, term, sign symbol or design or combination of them which is intended to identify a good or a service of one seller and to differentiate  ... 
doi:10.5539/ijms.v11n1p52 fatcat:bw3u5ynavjfmvdewfc63tv3hge

A Framework for Exploiting Internet of Things for Context-Aware Trust-Based Personalized Services

Abayomi Otebolaku, Gyu Myoung Lee
2018 Mobile Information Systems  
The core of the framework consists of a context classification and reasoning management and a dynamic user profile model, incorporating trust to improve the accuracy of context-aware personalized recommendations  ...  Experimental evaluations show that incorporating context and trust into personalized recommendation process can improve accuracy.  ...  First, the design addresses four-fold requirements, namely: 1) It proposes a context-aware framework that can collect, analyse, and infer high-level context information from IoT objects. 2)It can provide  ... 
doi:10.1155/2018/6138418 fatcat:oncyt4ko7vdplmufadbj3xojsu

MobilityFirst

Arun Venkataramani, James F. Kurose, Dipankar Raychaudhuri, Kiran Nagaraja, Morley Mao, Suman Banerjee
2014 Computer communication review  
upon a massively scalable, distributed, global name service to bind names and addresses, and to facilitate services including device-to-service, multicast, anycast, and context-aware communication, content  ...  MobilityFirst is a future Internet architecture with mobility and trustworthiness as central design goals.  ...  We thank the rest of the MobilityFirst team and participants at NSF-FIA meetings for shaping the ideas in this paper.  ... 
doi:10.1145/2656877.2656888 fatcat:irlmjf5amjbgfh6cp4dtaxyooe

A trusted decentralized access control framework for the client/server architecture

Weili Han, Min Xu, Weidong Zhao, Guofu Li
2010 Journal of Network and Computer Applications  
To implement TDAC, we design a private trusted reference monitor that runs at the client side, evaluates an access control request, and signs a temporary access control credential for a client application  ...  Compared with the previous work of Sandhu and Zhang (2005) , TDAC uses fewer requirements for trusted components.  ...  In subject-context aware access control, the trust of context data should be assured by trusted services to implement TDAC for subject-context aware access control.  ... 
doi:10.1016/j.jnca.2009.12.012 fatcat:nmowhswmyrc5rgaf7v4yewkrlq

An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control [chapter]

Michael Netter, Sabri Hassan, Günther Pernul
2012 Lecture Notes in Computer Science  
We have implemented a prototype to evaluate the feasibility of the proposed approach.  ...  In this paper, we argue in favor of a new paradigm, decoupling the management of social identities in OSNs from other social network services and providing access controls that take social contexts into  ...  Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the European Union.  ... 
doi:10.1007/978-3-642-32287-7_6 fatcat:lmqri3jxbfbwjm5g4bxdd3oqpq

Awareness of the cost of psychotropic medication among doctors: a service evaluation

Dhananjay Kumar Singh, Shakil Khawaja, Ishaq Pala, Jaleel Khaja, Ray Krishnanu, Heather Walker, Julian Bustin
2010 The Psychiatrist  
A service evaluation was carried out to assess the level of awareness and knowledge of different aspects of cost-effective prescribing among doctors working in the North East London Foundation Trust.  ...  Clinical implications Strategies to improve the poor level of knowledge and awareness in this area of clinical practice would be of benefit in making the best use of limited financial resources without  ...  A service evaluation was carried out to assess the level of awareness and knowledge of different aspects of cost-effective prescribing among doctors working in the North East London Foundation Trust.  ... 
doi:10.1192/pb.bp.109.026914 fatcat:dop4bsj3hffu3emqxxxvyueeeq

Mobile Identity Management Revisited

Emin Islam Tatli, Stefan Lucks
2009 Electronical Notes in Theoretical Computer Science  
, etc.) of mobile identity management systems from the perspective of a push context-aware application, i.e. the Friend Finder application.  ...  In this paper, we evaluate certain required aspects and features (e.g. context-to-context dependence and relation, blurring in levels, trust management with p3p integration, extended privacy preferences  ...  In this paper, we focus on a specific push context-aware application (i.e. the Friend Finder) and evaluate the important privacy aspects from the perspective of mobile identity management.  ... 
doi:10.1016/j.entcs.2009.07.044 fatcat:3tvumrby2zesrjihr5srkbnmxe

Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications

Xuyun Zhang, Julian Jang-Jaccard, Lianyong Qi, Md Z. A. Bhuiyan, Chang Liu
2018 Security and Communication Networks  
Acknowledgments We would also like to thank all the reviewers who have participated in the review process of the articles submitted to this special issue and the special issue coordinators and acknowledge  ...  A. Bhuiyan Chang Liu  ...  In the paper entitled "Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation," X.  ... 
doi:10.1155/2018/6238607 fatcat:d3pucb27yvcy5hppgw2j6757lm

Information Presentation: Considering On-line User Confidence for Effective Engagement [chapter]

Elahe Kani-Zabihi, Lizzie Coles-Kemp, Martin Helmhout
2015 Lecture Notes in Computer Science  
In order to design on-line services that are able to support the end-user in making informed choices about when and how to disclose personal information, a close understanding of the relationship between  ...  A close understanding of the relationship between user confidence and information presentation can suggest new design principles to support them in making informed choices about when and how to disclose  ...  This work as supported by the TSB; EPSRC and ESRC [grant number EP/G00255/X].  ... 
doi:10.1007/978-3-319-20376-8_46 fatcat:vlwfqpn2y5gqvevux5wj3rtme4
« Previous Showing results 1 — 15 out of 208,378 results