The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an important component of online privacy, anonymity is concerned by all users of P2P system. Many methods are proposed to provide mutual anonymity and most of them are path-based: an anonymous path should be constructed by source peer before transmission. Although those proposals perform well in providing mutual anonymity, the pre-constructed paths suffer from node churn and make anonymous transmission...
One of the fundamental challenges for Peer to Peer (P2P) systems is the ability to manage risks involved in interacting and collaborating with prior unknown and potentially malicious parties. Reputation-based trust management systems have proven to be essential to enforcing cooperative behavior in P2P networks. However, in many existing reputation-based trust models, the validity of peers' trust valuation...
Even though trust plays a significant role during decision-making in open collaborative environments, still end-user trust mechanisms have not be deployed in the EGEE grid computing setting. In this paper, we conduct a preliminary investigation on the integration of the trust paradigm in that environment, with a special focus on achieving end-user trust in an intuitive and practical manner.
Virtual Community and E-commerce are both new research area which is becoming popular in IS academia. In most of research papers, virtual community and e-commerce are talked separately in different stream. Since many e-commerce websites contain a virtual community, we combine these two together to consider whether discussions in virtual communities can influence people's online shopping behaviors...
To evaluate security in the context of software reliability engineering, it is necessary to analyse security problems, actual exploits, and their relationship with an understanding of the operational behaviour of the system. That can be done in terms of the effort involved in security exploits, through classic reliability factors such as calendar and inservice time, etc. Existing studies focus primarily...
Network security situational awareness(NSSA) has been a hot research spot in the network security domain. In this paper, a quantification method for NSSA based on conditional random fields(CRFs) was proposed. The data of network attacks from intrusion detection system (IDS), the hosts' vulnerabilities and the hosts' states were firstly combined as the network security factors. And then the network...
Based on trustworthiness, defines a couple of concepts associated with trusted path, the most trusted path and the least trusted path. In order to look for the most trusted path and the least trusted path we propose two trusted path algorithms, which are proved to be really the most credible and the least credible; quantify the trustworthiness of the most trusted path and the least trusted path; and...
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its integration to the Italica Project. We also describe the architecture of that module and explain the design decisions taken for its construction. The integration to the preexisting system...
This paper proposes a new image based CAPTCHA test, activity recognition CAPTCHA. In this test the user is presented with a set of distorted images depicting a randomly chosen activity. The user has to recognize the common activity associated with the images and annotate it from a given list of activities to pass the test. The user studies indicate that this CAPTCHA can be solved with 99.04% average...
An increasing number of extramural applications in the personal healthcare domain pose new challenges regarding the security of medical data. In this paper, we focus on remote patient monitoring systems and the issues around information reliability. In these systems medical data is not collected by healthcare providers in a controlled medical environment using certified medical devices, but by patients...
This paper focuses on reducing consumers' perceived risk through Website service quality cues in C2C e-commerce trading. It reveals a negative correlation between consumers' perceived risk and Website service quality in C2C E-commerce trading, and explores the internal composition of this relationship. Functional, physical, service, and psychological risks are found to be negatively affected mainly...
Tagging systems are known to be particularly vulnerable to tag spam. This paper introduces SpamClean, a novel social experience-based scheme, and presents the performance of SpamClean to defend against the tag spam in tagging systems. We first propose a novel mechanism based on cosine technique to compute the correlations between the client and other users in the system, and look the correlations...
The discovery of biomarkers and the underlying causes of diseases are enabled through the analysis of biological samples and data stored in biobanks. Biological samples and their associated data are expensive to collect and maintain, and it is important to store and manage them efficiently. During processing, samples and data go through a number of procedures and techniques, which are often in different...
Due to fuzzy logic can help in handling the imprecise nature and uncertainty of trust, some papers use several fuzzy logic methods(such as fuzzy inference and fuzzy comprehensive evaluation) to tackle trust modeling for P2P-based system. However, nobody summarizes difference of these fuzzy logic methods. In this paper, authors present a general fuzzy trust problem domain for P2P-based system, and...
Trust-based reputation system (TBRS) provides us an excellent decision-support tool for distributed environments. TBRS quantifies the trust relationships between entities based on the information that describes the entities' past behavior, so it is significant for TBRS to guarantee the quantity, the quality and the reliability of the collected information. In distributed environments, due to the lack...
The following topics are dealt with: grid and cluster computing; performance evaluation and measurement; architectures and systems; wireless and mobile communications; network communications; security and privacy; reliability and fault tolerance; data mining and caching; AHPCN; multicore and multithreaded architectures and programming; network storage and data management; and parallel algorithm and...
According to the fact that consumer trust is widely perceived as an essential factor to the success of electronic commerce, we develop a model of consumer trust in e-commerce and use empirical research method to test it. After deep analyzing, we find that perceived size, propensity to trust, perceived privacy information protection, and perceived legal environment security are insignificantly related...
How to build the mutual trust among peers in P2P network is crucial to secure distributed P2P applications. In this paper, we propose to use Mamdani-type fuzzy inference techniques in the design of P2P trust systems based on collecting and aggregating peers' trust value, which can better handle uncertainty and fuzziness in peer trust. There are five parts in the process of P2P trust fuzzy inference:...
Efficient search algorithm is one of the important issues in unstructured P2P systems. However, current search mechanisms are not efficient or scalable enough with the expansion of system. Gossip-based P2P techniques are reliable and scalable protocols for information dissemination. To this end, one search algorithm based on gossip algorithm with referral trust is proposed in our paper, in which peers...
Summary form only given. Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.