The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
Along with the thorough development and application for Web services, the security of it has taken people??s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services...
Peer-to-peer (P2P) eCommerce are commonly perceived as an environment offering both opportunities and threats. For peers to be effective they need some mechanism for managing this risk of failure. One way to minimize threats in such an open environment is to exploit reputation to help evaluate the trustworthiness of what and predict the future behaviors of peers. In this study, a set of parameters...
Government information resource catalog and interchange is becoming a very important domain in IT construction these years. Chinese government has put great attention to this area. This paper outlines specific features and issues of China??s government information resource catalog and exchange. A government information resource and service registry model is presented accordingly, and considerations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.