559,316 Hits in 5.7 sec

Survey on Users Ranking Pattern based Trust Model Regularization in Product Recommendation

Sneha U, Liji Samuel
2018 International Journal of Trend in Scientific Research and Development  
Trust SVD extends to SVD ++, using the explicit and implicit impact of rated projects by further combining the explicit and implicit impact of trust and trust users on active user project predictions.  ...  Trust SVD is integrated into the recommendation model to reduce data sparsity and cold start issues and their recommended performance degradation.  ...  These observations motivate us to consider the explicit and implicit effects of project ratings and user trust in a unified trust-based model.  ... 
doi:10.31142/ijtsrd11302 fatcat:7rkgttt4lndgze4ygnegom3ls4

A model-based repository of security and dependability patterns for trusted RCES

Adel Ziani, Brahim Hamid, Jacob Geisel, Jean-Michel Bruel
2013 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)  
The implementation of a repository of S&D patterns and their complementary property models is discussed in detail.  ...  In this work, we present a framework for trusted Resource Constrained Embedded Systems (RCES) development by design, by defining both a model to represent S&D pattern language and an architecture for development  ...  specific trust models.  ... 
doi:10.1109/iri.2013.6642505 dblp:conf/iri/ZianiHGB13 fatcat:o4wrogl6ljddhcewdp2bi7dg6i

Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based Development

Brahim Hamid
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
In this work, we propose a modeling environment which associates model-driven paradigms with security and dependability patterns to ensure that the combination of security and dependability solutions fit  ...  In addition, we provide an architecture for development tools to support the design and the analysis of pattern-based secure and dependable applications.  ...  At the core of the framework is a set of Domain-Specific Modeling Languages (DSML) [6] and model transformations that allow modeling a set of modeling artifacts, including pattern, resource and property  ... 
doi:10.1109/trustcom.2015.382 dblp:conf/trustcom/Hamid15 fatcat:pwqpvz5pxfdslkthfgtoq4iolu

A knowledge discovery method based on genetic-fuzzy systems for obtaining consumer behaviour patterns. An empirical application to a Web-based trust model

Jorge Casillas, Francisco J. Martinez Lopez
2009 International Journal of Management and Decision Making  
An empirical application to a web-based trust model', Int.  ...  In particular, here it is presented and tested a knowledge discovery methodology based on genetic-fuzzy systems -a Soft Computing (SC) method that jointly makes use of fuzzy logic and genetic algorithms  ...  Acknowledgement Research supported in part by the Spanish Ministry of Education and Science, under project No. TIN2005-08386-C05-01.  ... 
doi:10.1504/ijmdm.2009.026685 fatcat:573wgjcsajfzlm23wp5szos4yq

Modeling Location-Based Profiles of Social Image Media Using Explorative Pattern Mining

Florian Lemmerich, Martin Atzmueller
2011 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing  
This paper presents an approach for modeling location-based profiles of social image media based on tagging information and collaborative geo-reference annotations.  ...  Next, we show how these candidate patterns can be presented and visualized for interactive exploration using a combination of general pattern mining visualizations and views specialized on geo-referenced  ...  ACKNOWLEDGMENT This work has partially been supported by the VENUS research cluster at the interdisciplinary Research Center for Information System Design (ITeG) at Kassel University, and by the EU project  ... 
doi:10.1109/passat/socialcom.2011.186 dblp:conf/socialcom/LemmerichA11 fatcat:zmm6g4nadffvbakc53iekj4ahq

Privacy Preserving Secure Communication Pattern using Cryptographic Technique via Trusted Third Party (TTP) Model in Distributed Data Mining

N Kamila, L Jena
International Journal of Advanced Computer Engineering and Communication Technology   unpublished
We focus on privately Secure Communication Patterns (SCP) that refers to a contributively relation of participants in computations of data mining under Trusted Third Party model.  ...  Though our model consumes more CPU utilisation and execution time but it provides more security than the other cryptographic techniques.  ...  The perturbed data version is then used to mine patterns and models.  ... 

Open Archive TOULOUSE Archive Ouverte (OATAO) Interplay of Security&Dependability and Resource using Model-driven and Pattern-based Development

Brahim Hamid
2015 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications   unpublished
Security&Dependability and Resource using Model-driven and Pattern-based Development.  ...  In this work, we propose a modeling environment which associates model-driven paradigms with security and dependability patterns to ensure that the combination of security and dependability solutions fit  ...  At the core of the framework is a set of Domain-Specific Modeling Languages (DSML) [6] and model transformations that allow modeling a set of modeling artifacts, including pattern, resource and property  ... 

Schematizing Trust in Named Data Networking

Yingdi Yu, Alexander Afanasyev, David Clark, kc claffy, Van Jacobson, Lixia Zhang
2015 Proceedings of the 2nd International Conference on Information-Centric Networking - ICN '15  
We have developed a set of trust schemas for several prototype NDN applications with different trust models of varying complexity.  ...  This paper explores the ability of NDN to enable such automation through the use of trust schemas.  ...  model, e.g., web-of-trust.  ... 
doi:10.1145/2810156.2810170 dblp:conf/acmicn/YuACcJ015 fatcat:5wcvrx6qbrebbah6qtwwzvgohi

Security Requirements Specification in Service-Oriented Business Process Management

Michael Menzel, Ivonne Thomas, Christoph Meinel
2009 2009 International Conference on Availability, Reliability and Security  
Concrete protocols and security mechanisms are resolved based on a security pattern system that is introduced in the course of this paper.  ...  We introduce security elements for business process modelling which allow to evaluate the trustworthiness of participants based on a rating of enterprise assets and to express security intentions such  ...  Figure 3 illustrates the structure of a pattern and its relationship to our security model.  ... 
doi:10.1109/ares.2009.90 dblp:conf/IEEEares/MenzelTM09 fatcat:dnkntgycznbpjgfmq4kzqody6i

Patterns of trust in ubiquitous environments

Bettina Biel, Thomas Grill, Volker Gruhn
2008 Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia - MoMM '08  
We focus on regarding trust in early phases and provide tools for designers by describing trust issues through patterns which are made available through design repositories.  ...  In order to enhance user acceptance of such ubiquitous appliances they have to be designed to consider trust and trustworthiness already in the design phase.  ...  In order to properly describe patterns of trust we follow the basic model defined by [21] and propose the following steps to describe the solution of a pattern of trust.  ... 
doi:10.1145/1497185.1497269 dblp:conf/momm/BielGG08 fatcat:moigo5wgjjhzflkk4j4gl75vey

A Survey of Patterns for Web Services Security and Reliability Standards

Eduardo B. Fernandez, Ola Ajaj, Ingrid Buckley, Nelly Delessy-Gassant, Keiko Hashizume, Maria M. Larrondo-Petrie
2012 Future Internet  
Security patterns abstract the key aspects of a security mechanism and can thus be applied by non-experts.  ...  All the patterns described here have been previously published, we only show here one of them in detail as an illustration of our style for writing patterns.  ...  The objective of this pattern is to provide a conceptual model that embodies the abstract aspects of trust to make it applicable to different domains and applications.  The Credential Pattern [39] .  ... 
doi:10.3390/fi4020430 fatcat:5ko3qj4jpjhgbduliju3o4yvoq

An Architectural Approach for Cost Effective Trustworthy Systems

Ihor Kuz, Liming Zhu, Len Bass, Mark Staples, Xiwei Xu
2012 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture  
The research program envisions methods, models, analyses, and patterns to create and formally analyse such architectures.  ...  Such systems are designed as compositions of small trusted components and large untrusted components whose behaviour is constrained by an underlying formally verified OS kernel.  ...  AADL AND PROMELA/SPIN In our initial exploration of appropriate languages and tools for modelling and analysis of trusted patterns we have used AADL (Architecture Analysis and Design Language) [6] and  ... 
doi:10.1109/wicsa-ecsa.212.54 dblp:conf/wicsa/KuzZBSX12 fatcat:z7tovmnryjbhrjtc7sxp6pahmu

Trust modeling based on Capra cognitive framework

Kamal Mirzaie, Mehdi N. Fesharaki, Amir Daneshgar
2012 Procedia - Social and Behavioral Sciences  
This framework explains social phenomena from the four perspectives of structure (agent), pattern (network), process, and meaning. We assume trust as "meaning" in the proposed model.  ...  Trust is needed to facilitate cooperation and delegation among agents in a multi-agent system. This paper proposes a trust model based on Capra cognitive framework.  ...  In order to close these four perspectives to the terminology of trust modeling, we replace "pattern" with "network" and "structure" with "agent".  ... 
doi:10.1016/j.sbspro.2012.01.030 fatcat:k7ntxdingjcjpjp6vyir7nxfva

Automated Security Service Orchestration for the Identity Management in Web Service Based Systems

Robert Warschofsky, Michael Menzel, Christoph Meinel
2011 2011 IEEE International Conference on Web Services  
Therefore, we evaluate the UML use case model of the system and apply service security pattern derived during the analysis of the identity management implementations.  ...  However, the deployment and configuration of these security services usually requires expert knowledge about the systems and expert knowledge about security requirements and implementations which a person  ...  [7] defines different Identity Management Models and additional trust requirements for each of these models. The support for an automation of the model selection is also not provided. N.  ... 
doi:10.1109/icws.2011.41 dblp:conf/icws/WarschofskyMM11 fatcat:w6bmgi27pvg3zduajllxu3qa4m

Reusable Formal Models for Secure Software Architectures

Thomas Heyman, Riccardo Scandariato, Wouter Joosen
2012 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture  
and patterns.  ...  Formal modelling techniques are often disregarded as their semantics are too distant from the mainstream practice of software architecture design, which is dominated by the use of component based modelling  ...  ACKNOWLEDGMENT This research is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, and by the Research Fund KU Leuven.  ... 
doi:10.1109/wicsa-ecsa.212.12 dblp:conf/wicsa/HeymanSJ12 fatcat:cy6kvd7lwvc6fck3ywfgxcd2vu
« Previous Showing results 1 — 15 out of 559,316 results