The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Being able to make objective Quality of Service (QoS) judgments or assessments is a challenging and crucial activity. The process of making these assessments is compounded when the environment in which the assessments have to be made are virtual; in the sense the interacting parties might not have necessarily met with each other physically. In a broad sense Quality of Service assessments could be...
In the literature, the notion of trust has been widely discussed and various approaches have been proposed to assess and quantify it, in order to take it into consideration when making an interaction-based decision in industrial ecosystems. At the same time, the notion and importance of risk have been widely ignored and not been acknowledged as an important factor to consider, along with trust; while...
Three-party key establishment protocol can help three participants to establish a shared secret key through interactions via public channels. In this paper, a novel three-party key agreement protocol is proposed. The protocol is based on non-commutative monoids in mathematics. It is a generic construction and one-time protocol per key establishment.
In this paper we make use of a case study, involving the use of a product by a given user, to determine the quality of product (QoP). The trustworthiness measurement methodology is made use of to carry out the QoP assessment. The steps involved are discussed and illustrated by the trustworthiness measurement methodology software that we have engineered.
In this paper we present a state of the art review of PageRanktrade based approaches for trust and reputation computation. We divide the approaches that make use of PageRanktrade method for trust and reputation computation, into six different classes. Each of the six classes is discussed in this paper.
In a financial digital business ecosystem, the trusting agent by analyzing beforehand the possible risk in interacting with a probable trusted agent can make a better decision of its future course of interaction with it. Another factor that would help the trusting agent in deciding whether to interact or not with a probable trusted agent, is to determine the probability of it not achieving the full...
Due to technological advancement of the Internet, conducting e-commerce transactions have become a part of our daily lives. In a financial interaction to be carried over the digital business ecosystem domain, it is rational for an agent instigating the interaction to analyse beforehand the possible risk in interacting with any other agent. Doing so would give the instigating agent an idea of direction...
In this paper we present an overview of the definitions of the terms of trust and reputation from the literature. Trust and reputation have been defined in different ways by the various researchers. As a result of these various definitions of trust and reputation there is a lot of confusion regarding what these terms actually mean. Additionally in the literature there is no work towards collecting...
It is widely acknowledged that information privacy is subjective in nature and contextually influenced. Individuals value their personal privacy differently with many willing to trade-off of privacy for some form of reward or personal gain. Many of the proposed privacy protection schemes do not give due consideration to the contextual, and more importantly situational influence on privacy. Rather...
Security and privacy are one of the two primary concerns with RFID (radio frequency identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security issues in general and data tampering in particular. We specifically consider the issue of detecting data tampering on the RFID tags for applications such as data integrity management...
Service oriented environment (SOE) is new paradigm for carrying out business activities on the Internet. In this paper the author gives an introduction to the concept of service oriented environment and discusses the different activities carried out in the SOE and different entities involved in SOE. The issues related to trust in service oriented environment are proposed and explained
In the literature, there is a lot of confusion regarding the relationship between the 'trust' and 'security'. Most of the times, these terms are regarded as being synonymous with each other. The existing literature does not draw a clear line how and when the terms of 'trust' and 'security' are synonymous and when they are not synonymous. In this paper we address this issue and discuss when the distinct...
In almost every interaction the trusting peer might fear about the likelihood of the loss in the resources involved during the transaction. This likelihood of the loss in the resources is termed as risk in the transaction. Hence analyzing the risk involved in a transaction is important to decide whether to proceed with the transaction or not. If a trusting peer is unfamiliar with a trusted peer and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.