The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Internet-based e-commerce, the transaction entities' trust levels provided by e-commerce platform can be viewed as a key indicator for users selecting transaction partners. The trust of transaction entities objectively and comprehensively represents the integrated influence of various trust attributes. Aiming at uncertainty and ambiguity of trust in e-commerce, the concept of membership degree...
Trust management plays an important role in improving the cooperation of agents in multi-agent system. This paper proposes a trust evaluation method based on rough sets theory. The method divides attributes into necessary or unnecessary, calculates attribute weight, and then evaluates trust values by using a decision-making method of multi-attributes. Finally, an example shows that it is efficient...
In the word, lots of consumers choose to buy their commodity on the Internet, so e-commerce is playing an increasingly important role and its safety caused more and more concern. The success or failure of transactions, the confidentiality of client information, and e-commerce system stability are directly related to the safety of e-commerce. In this paper, we use the method for e-commerce security...
The AHP-Fuzzy assessment method is a combination which unifies the AHP method and the fuzzy mathematics. AHP can synthesize human's subjective qualitative judgment, form the weighting of each policy- making factor, and avoid appearing the logic reasoning fault in the complex decision-making question. The fuzzy mathematics, simulating the characteristic of human in making the judgment, is good at processing...
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based trust, defining the observations which underpin many pre-existing trust models. This framework maintains subjectivity which should be the basis of any trust based system yet enables entities to communicate and collaborate...
With the increasing sophistication of attack techniques and scenarios, appropriate automated decision-making systems should be developed. This paper defines a new security language allowing to cope with attack scenarios through the representation of both attacks and security solutions in a single syntactic framework. A subsequent semantic analysis has also been introduced. To implement this reasoning,...
Within the framework of Markowitz's portfolio theory, this paper analyzes the problem of the optimal portfolio on VaR. By using historical data of return loss to simulate several situations, we built an optimal portfolio model for VaR and proposed the detailed algorithms. The simplicity and the effectiveness of these algorithms were also demonstrated with concrete examples.
Data transfer in distributed environment is prone to frequent failures resulting from back-end system level problems, like connectivity failure which is technically untraceable by users.Error messages are not logged efficiently, and sometimes are not relevant/useful from users' point-of-view.Our study explores the possibility of an efficient error detection and reporting system for such environments...
AHP is an important method of evaluation; it has been widely used in the decision-making. Contraposing it has the ignorance about Security in some decision-making field, this paper mixes the AHP and fuzzy synthetically evaluation,then designs a new evaluation method of the candidates' comprehensive quality. It offers a scientific and reasonable method of the evaluating college graduatespsila comprehensive...
Building trust has been recognized as a new security approach for wireless distributed networks; however, cooperation among separate layers is given little consideration. The paper provides a cross-layer trust model for ad hoc networks to enhance the system securities. Six modules are constructed to build a trust model. The trust model can collect trust value not only from other entities in the same...
The traditional intrusion detection systems (IDSs) play an important role in monitoring our network, but they lack abilities in automated intrusion response. Nowadays with the rapidly increased complexity and speed of the attacks spread, there has an urgent need in automated intrusion response. This field has already aroused wide concern. The main obstacle now lies in that accurate measurement of...
In a supply chain network, suppliers normally offer price and service quotes for bidding while the purchasing company usually needs to evaluate suppliers before making buying decision. Due to competition, purchasing company doesnpsilat want suppliers to know anything about purchasing sensitive information except providing itemspsila retail prices and bidding notices. The confidentiality modeling has...
In various computer security settings, such as when customers use the same passwords at several independent Web sites, security decisions made by one organization may have significant impact on the security of another. We develop a model for security decision-making in inter-dependent organizations described by a linear influence network. In this model, a matrix represents how one organization's investments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.