58,310 Hits in 5.6 sec

Preservation as a Service for Trust: An InterPARES Trust Specification for Preserving Authentic Records in the Cloud

Adam Jansen
2017 International Conference on Digital Preservation  
Questions regarding trust and authenticity of records stored in the Cloud, as well as the custodial obligations and storage management provided by the service provider of Internet-based records have yet  ...  To address this need, Preservation as a Service for Trust (PaaST), part of the InterPARES Trust research project, is modelling a suite of preservation services that detail specific actions and attributes  ...  The Receive Submission Service ensures that a set of records transferred to an Internet-based environment is complete and intact, and is in compliance with any agreements that are in force between the  ... 
dblp:conf/ipres/Jansen17 fatcat:qrwo5ky5ffch5e4gvgf4ct5t5a

Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

Zhiliang Deng, Yongjun Ren, Yepeng Liu, Xiang Yin, Zixuan Shen, Hye-Jin Kim
2019 Computers Materials & Continua  
Moreover, this paper proposes the technology framework of preservation for trusted electronic records.  ...  to the information security theory and subdivides the trustworthiness into the authenticity, integrity, usability, and reliability of electronic records in cloud storage.  ...  According to ISO 14721, the organization and level of investment in retaining originals should not be overlooked.  ... 
doi:10.32604/cmc.2019.02967 fatcat:7s7njj2p4nhvbmbdngkt5x765e

Distributed Trust [chapter]

John Ioannidis, Angelos Keromytis
2004 The Practical Handbook of Internet Computing  
The implication is that high-level administrative authorities cannot directly specify overall security policy; rather, all they can do is "certify" lower-level authorities.  ...  At a high level of abstraction, trust-management systems have five components: • A language for describing actions, which are operations with security consequences that are to be controlled by the system  ... 
doi:10.1201/9780203507223.ch47 fatcat:qwgaumynmvfwnk4zl2xapmz6r4

Dynamic Trust Management

Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee
2009 Computer  
It couples a common network architecture to advanced information assurance techniques and, as GIG's name implies, focuses on the information the network carries and the services it provides, rather than  ...  Therefore, we believe that the GIG architecture is a useful platform and opportunity for studying trust in large-scale computing in general, not just in the military and government.  ...  In our past work, we defined and formalized trust management as an explicit policy compliance layer for decentralized systems 1,2 and developed practical trust management languages and systems for small-and  ... 
doi:10.1109/mc.2009.51 fatcat:po2ntel4nngnlc2rtzuxrszja4

Online trust forming mechanism

Xianfeng Zhang, Qin Zhang
2005 Proceedings of the 7th international conference on Electronic commerce - ICEC '05  
, benevolence, integrity), system trust belief, and situational decision to trust as the core, and five influencing factors (trustor factors, trustee factors, system trust factors, interaction factors,  ...  Based on theories of SET, ECT, TRA, TPB, TAM, and abundant review of literature regarding online trust, the paper discusses online trust forming mechanism: the varied approaches and an integrated model  ...  If the risk is not too high, the trustor trusts the trustee. Due to Deelmann and Loos (2002) , All the parameters will be checked and verified permanently under low trust level.  ... 
doi:10.1145/1089551.1089591 dblp:conf/ACMicec/ZhangZ05 fatcat:jtbw4xjfijh6zkpg4kmhuxkgse

Trusted Product Lines

Stuart Hutchesson, John McDermid
2013 Information and Software Technology  
The "Trusted Product Lines" approach, as described within the thesis, shows how product line approaches can be applied to high-integrity software development, and how certification evidence created and  ...  The approach has been evaluated and validated by deployment on a real aerospace project; the approach has been used to produce DO-178B/ED-12B Level A applications of over 300 KSLOC in size.  ...  Specifically the development needs to provide assurance evidence that is sufficient to demonstrate compliance of a product to Level A (the highest development assurance level recognised in DO-178B/ED-12B  ... 
doi:10.1016/j.infsof.2012.06.005 fatcat:6amzpscfkzacphzgxz6xboudea

Public Trust and Policy Compliance during the COVID-19 Pandemic: The Role of Professional Trust

Orachorn Saechang, Jianxing Yu, Yong Li
2021 Healthcare  
In conclusion, the finding sheds light on the dynamic relationship between public trust and policy compliance and offers some implications in times of a global health crisis.  ...  To address this topic, we conducted a cross-sectional study between February and March of 2020 to examine the relationship between public trust and the compliance of the general public in adopting personal  ...  Traditionally, a high level of public trust in the government has significantly influenced citizens to comply with policy intervention.  ... 
doi:10.3390/healthcare9020151 pmid:33540762 fatcat:djjbak5glrhgdd3bjwotasqtl4

Inferring Accountability from Trust Perceptions [chapter]

Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens
2014 Lecture Notes in Computer Science  
We introduce an inference model providing individuals with global (organization-wide) accountability guarantees which take into account user expectations and varying levels of usage evidence, such as data  ...  Via auditors acting for them, individuals can obtain global accountability guarantees, providing them with a trust-dependent synthesis of declared and proven data handling practices for an entire organization  ...  Furthermore, the user model includes UserTrust(Organization), the user's high-level trust perception towards organizations.  ... 
doi:10.1007/978-3-319-13841-1_5 fatcat:43om5lpzurbfbkrwvnora4sviq

Professionalism and Trust

C. D. Daykin
2003 British Actuarial Journal  
be done and in ever greater levels of disclosure.  ...  compliance with regulations and rules, and caveat emptor with a culture of blame and compensation.  ... 
doi:10.1017/s1357321700004438 fatcat:yrzogezx3zej7eqn52nmkmqy7m

Trust but verify

Aydan R. Yumerefendi, Jeffrey S. Chase
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
The foundation of our approach is to preserve digitally signed records of actions and/or internal state snapshots of each service, and use them to detect tampering, verify the consistency of actions and  ...  We propose a framework for accountable network services, and explore its applicability and limitations.  ...  The only obvious way to certify compliance is to use some form of monitoring by a trusted third-party auditor (such as Keynote).  ... 
doi:10.1145/1133572.1133585 dblp:conf/sigopsE/YumerefendiC04 fatcat:5m5lfyslwndrro4ja2cjoajdsq

Dissecting trust and the assurance-violation dynamic

S.T. Redwine
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
The nature of trust a party extends is first subdivided into the areas of level of trust, scopes of applicability, and definiteness.  ...  Complications that arise when considering assurance and violations of trust are covered. A framework is provided for the dynamics of trust assurance opposed by potential or actual violations.  ...  The level of reliance can be thought of in terms of the dependence on the potential positive impact from compliance and the potential negative impact a from trust violation.  ... 
doi:10.1109/hicss.2003.1174903 dblp:conf/hicss/Redwine03 fatcat:cdrvkn55cjetlcjwhuwlbtkbsu

TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules

R.A. Fink, A.T. Sherman, R. Carback
2009 IEEE Transactions on Information Forensics and Security  
Index Terms-Applications, direct recording electronic (DRE), electronic voting, protocols, security and privacy analysis, system design and implementation, trusted platform modules (TPMs).  ...  We reduce the required trusted computing base for direct recording electronic (DRE) voting machines with a design based on trusted platform modules (TPMs).  ...  Sarmenta, and J. Osborn for sharing their knowledge of the TPM; reviewers G. Walker, D. Heine, J. Land, D. Paulhamus, and the CSRG group of APL; and J. Pinkston of UMBC.  ... 
doi:10.1109/tifs.2009.2034900 fatcat:2v2v6cxrgbgprb3zccorvj2l7y

The Trusted Cloud: Addressing Security and Compliance [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
These terms lay the foundation for what visibility, compliance, and monitoring entail, and we start with baseline definitions for trust and assurance. • Trust.  ...  IT managers would like to see higher levels of assurance before they can declare their cloud-based services and data ready for prime time, similar to the level of trust they have in corporate-owned infrastructure  ... 
doi:10.1007/978-1-4302-6146-9_2 fatcat:k2wmlqogxzfbvhr6mle2wuwgze

Towards Trusted Trade-Lanes [chapter]

Joris Hulstijn, Wout Hofman, Gerwin Zomer, Yao-Hua Tan
2016 Lecture Notes in Computer Science  
We identify essential characteristics of a trusted trade-lane, and develop various scenarios in which trade lanes may develop and find ways to demonstrate to the authorities and commercial partners that  ...  In this paper we explore the concept of a trusted trade lane.  ...  In the yellow lane the compliance is assured at point of loading. Trusted Trader A trusted trader is a trading company that is officially recognized by the authorities to be trustworthy.  ... 
doi:10.1007/978-3-319-44421-5_24 fatcat:lrml4yfkibelvjqdy3acio5dpa

Challenges for Trusted Computing

Shane Balfe, Eimear Gallery, Chris J. Mitchell, Kenneth G. Paterson
2008 IEEE Security and Privacy  
and backwards compatibility, usability and compliance issues.  ...  This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality.  ...  In particular, the absence of these credentials will make it difficult, if not impossible, for a platform to later acquire AIK credentials without operating at reduced assurance levels.  ... 
doi:10.1109/msp.2008.138 fatcat:zzguhkd5tzaedouhxyrkeygw2y
« Previous Showing results 1 — 15 out of 58,310 results