81,272 Hits in 4.7 sec

System and network trustworthiness in perspective

Peter G. Neumann
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
networks and in the overall environments in which they must operate.  ...  Characteristic problem areas experienced in the past are considered here, as well as some of the challenges that must be confronted in trying to achieve greater trustworthiness in computer systems and  ...  The result is fundamentally unconvincing from the perspective of trustworthiness.  ... 
doi:10.1145/1180405.1180406 dblp:conf/ccs/Neumann06 fatcat:lwcgqle3qrc5hav24krytkqgey

Edge Computing through Virtual Force for Detecting Trustworthy Values

Dr. Dhaya R., Dr. Kanthavel R.
2020 IRO Journal on Sustainable Wireless Systems  
This analysis shows that for a trustworthy data collection model of IoT, there is noticeable improvement in terms of energy conservation and system security, thereby improving the performance of the system  ...  Moreover, it is a fact that the data collected by the sensor networks serves as the base for the IoT applications as well as the systems.  ...  Moreover, in the edge network system, there are two basic types of nodes used namely malicious nodes and trustworthy nodes.  ... 
doi:10.36548/jsws.2020.2.004 fatcat:4r2w4qraljg3ppopmeffxflal4

Multi-Perspective Trust Management Framework for Crowdsourced IoT Services [article]

Mohammed Bahutair, Athman Bouguettaya, Azadeh Ghari Neiat
2021 arXiv   pre-print
The attributes are fed into a machine-learning-based algorithm to generate a trust model for crowdsourced services in IoT environments.  ...  Each perspective is defined by a set of attributes that contribute to the perspective's influence on trust.  ...  ACKNOWLEDGMENT This research was partly made possible by DP160103595 and LE180100158 grants from the Australian Research Council.  ... 
arXiv:2101.04244v1 fatcat:fdhc5xva3bczpj6ypk3ro7pt4q

Multi-Perspective Optimization of GEANTInter-domain Traffic

Manuel Pedro, Edmundo Monteiro, Fernando Boavida
2007 Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)  
The paper presents optimization solutions from various perspectives, namely bandwidth, monetary cost and routing trustworthiness.  ...  This optimization approach was applied to GÉANT, the European Research and Educational Network.  ...  This work was partially supported by the Portuguese Ministry of Science and High Education (MCES) and by European Union FEDER under programs POSC and PRODEP.  ... 
doi:10.1109/cnsr.2007.44 dblp:conf/cnsr/PedroMB07 fatcat:4jirayavljfwrm45mh6af226o4

Optimizing Advisor Network Size in a Personalized Trust-Modelling Framework for Multi-agent Systems [chapter]

Joshua Gorner
2010 Lecture Notes in Computer Science  
Users create a social network of trusted advisors, and sellers will offer better rewards in order to satisfy trusted advisors and thus build their own reputations.  ...  However, we believe that an overly large network of advisors could result in reduced inaccuracy in predicting the trustworthiness of a given seller, due to the inclusion of outlier data, even if these  ...  If a j is not an acceptable advisor (that is, if N a j all < N min ), the algorithm will query a j 's advisor network, sorted from most trustworthy to least trustworthy from the perspective of a j , in  ... 
doi:10.1007/978-3-642-13059-5_62 fatcat:qdn6dkrsand73jk5fjh2hlybou

Trustworthy Information: Concepts and Mechanisms [chapter]

Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi Sandhu
2010 Lecture Notes in Computer Science  
In this paper we initiate a study in this direction by proposing an abstraction called information networks as well as two supporting mechanisms called provenance digital signatures and optimal security  ...  management in distributed and decentralized environment.  ...  This work was partially supported by AFOSR MURI and State of Texas Emerging Technology Fund.  ... 
doi:10.1007/978-3-642-14246-8_39 fatcat:y3gnndwvu5av5nuy2wkqvhhiuu

An Approach to Off-Line Inter-domain QoS-Aware Resource Optimization [chapter]

Manuel Pedro, Edmundo Monteiro, Fernando Boavida
2006 Lecture Notes in Computer Science  
Results show trade-off solutions and "optimal" solutions for each perspective. The proposal is a useful tool in inter-domain management because it can assist and simplify the decision process.  ...  trustworthiness.  ...  Acknowledgement This work was partially supported by the Portuguese Ministry of Science and High Education (MCES) and by European Union FEDER under programs POSC and PRODEP.  ... 
doi:10.1007/11753810_21 fatcat:52smvnrao5ar5h4qrrmazfh4ki

Trustworthy and sustainable operations in marine environments

M. Fredriksson, R. Gustavsson
2003 25th International Conference on Software Engineering, 2003. Proceedings.  
In order to address challenges and opportunities of engineering information systems for network-centric warfare, we have developed a prototype for trustworthy and sustainable operations in marine environments  ...  The system developed addressed qualities such as information fusion, target acquisition, and selforganization in open computational systems; comprised of distributed services.  ...  In order to make explicit a separation of concerns in engineering and sustaining qualities in such systems, we introduce a layered perspective involving the dimensions of environment, fabric, system, and  ... 
doi:10.1109/icse.2003.1201296 dblp:conf/icse/FredrikssonG03 fatcat:drgppncflfahbckrwdwnsevugm

Intensity and Trustworthiness Awake Delay Perceptive Routing for Submarine WSNs

Devakumar Devakumar, V. Balamurugan
2018 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we introduce intensity and trustworthiness awake delay perspective (ITADP) routing protocol for submarine WSNs.  ...  <p>Submarine Wireless Sensor Networks (SWSNs) have earned important concentration of both university and manufacturing in current years.  ...  The introduction and design of the system is portrayed in course setup stage. In last subsection, information sending system is talked about.  ... 
doi:10.11591/ijeecs.v9.i3.pp546-548 fatcat:sm5foqwznnfb3klsski43snd2m

Une vision de la recherche sur la confiance et la sûreté des systèmes d'information dans le cadre de la protection des infrastructures critiques

Bako Rajaonah
2017 Ingénierie des Systèmes d'Information  
Acknowledgements: The author warmly thanks Kathia Oliveira and Pierre-Emmanuel Arduin to have offered her the opportunity to write on the topic of trust in the field of computer science.  ...  She also thanks the three anonymous reviewers for their precious comments and suggestions.  ...  It echoes the definition of Bouwmans et al. (2006) who consider infrastructures as socio-technical networks combining physical networks (man-made systems and processes) and actor networks (people, institutions  ... 
doi:10.3166/isi.22.1.109-133 fatcat:eceaqnipmjd65awdm63cuoc2sq

Strengthening trust in the future ICT infrastructure

Tai-Won Um, Gyu Myoung Lee, Jun Kyun Choi
2015 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015)  
In this paper, we introduce the concept of a social-cyber-physical infrastructure from the social Internet of Things paradigm and present different meanings from various perspectives for a clear understanding  ...  Moving towards a hyperconnected society in the forthcoming "zettabyte" era requires a trusted ICT infrastructure for sharing information and creating knowledge.  ...  In particular, the trustworthy networking and communication protocols can support heterogeneous and specific networking contexts.  ... 
doi:10.1109/kaleidoscope.2015.7383628 dblp:conf/kaleidoscope/UmLC15 fatcat:rpkgwyxpkzbtzcewbsi5au4esm

Business model innovation from an open systems perspective: structural challenges and managerial solutions

Henrik Berglund, Christian Sandström
2013 International Journal of Product Development  
In particular, we argue that the systemic and boundary-spanning nature of business models imply that firms are forced to acted under conditions of interdependence and restricted freedom, as they do not  ...  Therefore, suitable managerial solutions should include the development of shared knowledge, trustworthy appropriability regimes, stabile actor networks and the alignment of heterogeneous interests.  ...  Therefore, suitable managerial solutions should include the development of shared knowledge, trustworthy appropriability regimes, stabile actor networks and the alignment of heterogeneous interests.  ... 
doi:10.1504/ijpd.2013.055011 fatcat:kfzgkpt3tfgvrmyqxx6ax76dpa

Administrative Coordination in Nonprofit Human Service Delivery Networks

Alicia C. Bunger
2012 Nonprofit and Voluntary Sector Quarterly  
Drawing on quantitative data collected from a network of 36 non-profit children's behavioral health organizations, this paper empirically tests how competition and perceived trustworthiness interact to  ...  Results support the hypothesis that trustworthiness moderates the influence of competition on administrative coordination.  ...  Her research interests include non-profit administration, organizations and systems, mental health services, social networks, and implementation of new practices.  ... 
doi:10.1177/0899764012451369 pmid:25349468 pmcid:PMC4208069 fatcat:imheeyzbsjczliwrt4qctefxzq

Thou Shalt Not Trust non-Trustworthy Systems

P.E. Verissimo
2006 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06)  
Not surprisingly: • Simultaneously under a security and a dependability viewpoint, a trustworthiness perspective; • Achieving predictability in uncertain conditions, a dependable adaptability perspective  ...  (response, determinism, robustness, security); on the other hand, improvements in infrastructure technology peer with asymmetry and instability (access networks, mobility, de-regulation, and so forth)  ... 
doi:10.1109/icdcsw.2006.108 dblp:conf/icdcsw/Verissimo06 fatcat:ltkhuyfk6rfxxno7bmykmgglte

How Privacy Flaws Affect Consumer Perception

Sadia Afroz, Aylin Caliskan Islam, Jordan Santell, Aaron Chapin, Rachel Greenstadt
2013 2013 Third Workshop on Socio-Technical Aspects in Security and Trust  
Using three real-world privacy breach incidents, we study how these flaws affected consumers' future purchasing behavior and perspective on a company's trustworthiness.  ...  Our results show that, in general, consumers are less likely to purchase products that had experienced some form of privacy breach.  ...  We are grateful to the Intel Science and Technology Center (ISTC) for Secure Computing for supporting this work.  ... 
doi:10.1109/stast.2013.13 dblp:conf/stast/AfrozISCG13 fatcat:5bfsfblkhneepfqniw5iv4mdc4
« Previous Showing results 1 — 15 out of 81,272 results