The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust model has been suggested as an effective security mechanism in distributed network environment. Considerable researches have been done on trust evaluation and trust prediction. Traditional methods take the historical behavior data into consideration to predict the trust value of the network entity. However, the context of the network entity is seldom taken into account. It is obvious that the...
Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self service. However in hindsight, Cloud Computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus softwares have proven insufficient and incapable of...
Context-awareness in mobile information systems bears a huge potential. However, context-awareness is still in its infancy and its full potential is not yet exploited. One reason is the poorly supported creation and learning of suitable context descriptions. Another problem is the questionable predictive power of context descriptions that makes it difficult to correctly determine the current user...
Many threats in the real world can be related to activities in public sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming for security services to monitor all these sources. Therefore, it is important to have a system that...
Patterns are an invaluable tool for capturing and reusing Non-Functional Requirements (NFR) knowledge. Their construction, however, requires one to pay close attention to the semantics of its elements. This paper reports two important insights realized when developing a collection of Transparency patterns; they concern the semantics of the HELP contribution link and of the correlation link between...
The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sectors. Motivations range the gamut from “hacktivism” to corporate espionage. This paper will discuss one...
Online dating is one domain, which would benefit from the application of computational trust. One of the problems with the application of traditional computational trust models, as identified in our previous work, is authenticity of information provided by parties which helps other users ascertain whether they want to go on dates. In this position paper, we suggest a solution: a concordance based...
The security of railway and mass-transit systems is increasingly dependant on the effectiveness of integrated Security Management Systems (SMS), which are meant to detect threats and to provide operators with information required for alarm verification purposes. In order to lower the false alarm rate and improve the detection reliability of threat scenarios, event correlation capabilities need to...
A common challenge for applications requiring information and knowledge fusion is the conversion of data streams into knowledge adapted to the context of usage. In the context of the project Integrated Mobile Security Kit, this paper focuses on the knowledge fusion sub-system. It integrates different fusion aspects based on a common domain model and embedded into a distributed and mobile infrastructure...
In 2008, 90 million citizens in the United States used electronic tax filing to submit their federal tax returns. Yet these adopters represent only a subset of the population. Citizen concerns regarding the security of this electronic option still serve as a barrier to e-file adoption. In this study, we propose a model of e-file adoption that integrates technology acceptance, optimism bias, reputation...
This paper developed a conceptual model through a survey of literature on e-service, and then it has a demonstration analysis of the world's largest online bookstore in China Dangdang.com. The study measured the impact of four dimensions on e-satisfaction and funds the relationship between e-satisfaction and e-loyalty. According to their relationship, it will give a hand to the online bookstore manager...
With rapid development of computer networks, users need a new solution for network security management, aiming at integration. This paper focuses on context-aware alert analysis, which is one of its key functionalities. A practical and efficient approach to guarantee unified representation of context information, background knowledge and attack knowledge for security alerts is still lacking these...
Interactions in aspect-oriented models must be detected, documented, and resolved for aspects to be composed as desired. Generally, aspect interactions can be categorized as intrinsic (those that inherently exist among concerns) or technical (those that are dependent on technology and may change over time). Consequently, these types of interactions should be encapsulated properly. Goal models support...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.