The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In election systems, there are many opportunities to incorporate forensic techniques and gather forensic evidence that can lead to determining the root cause of an anomaly. Although much has been written about security and forensic techniques in election systems, very little research has focused on measuring the forensic capabilities of election systems and mapping them to potential security safeguards...
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became...
Despite the fact that benefits of adopting cloud computing services and applications have become well known within the communities of information technology, adoption of such technology still facing various challenges. Currently, establishing trust is considered as the main barrier preventing individuals and enterprises adopting cloud solutions. Though, to best of our knowledge it has not been considered...
In order to protect the interactive behavior between nodes in collaborative manufacturing grid environment, a security access control model based on nodes trust was proposed. This model divided trust relationship between grid nodes into trust relation domain and trust relation outside domain, and given out its expressions. Some methods to calculate direct trust value and recommendation trust value...
Trust, the most fundamental concept in Trusted Computing, is a pervasive notion and, as such, has been studied thoroughly in a variety of different fields. Based on a survey of trust and security, two formal definitions for trust in Trusted Computing are presented in this paper: one for trust between coequal components (the direct trust) and the other for trust in specialization-employed environment...
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those services knows the certificates or host keys a priori. A simple solution used in practice is to trust the certificate or the host key when the client...
Trustworthy network is the inevitable trend in the development of high trusted computing and Internet. It is beyond the traditional information security including confidentiality, integrity and availability, but on the survivability and controllability. Trustworthiness of users on identity and behaviors is very important for trustworthy network, which can be realized by access control technology....
This paper proposes a protocol which provides the ability for sharing trust data securely. The protocol avoids the escrow problem inidentity-based cryptosystem and the secure delivery of private keys. The security of protocol is based on some underlying problems closely related to the bilinear Diffie-Hellman problem are computationally hard.
In providing the infrastructure for the accomplishment of general purpose computational grids the main concern is security. Still, by properly authenticating users and hosts and in the interactions between them, most grid implementations focus their safety concerns. The effective and competent exploitation of grid computing services needs sophisticated and secured resource management systems. The...
We find that traditional authentication ways donpsilat act well in MANETs for the features of dynamic topology and non-existence of central facilities in mobile ad hoc networks. This paper presents a distributed trust proving language, which is based on role trust. The solution of constructing credential authentication infrastructure and the problem how to perform automated trust negotiation are also...
Nowadays, most of access control models have been studied extensively in centralized and static environment, and they seldom meet the requirements of some dynamic collaborative environments, such as Grid, P2P and ad-hoc network. In this paper, the trust mechanism of the agents in collaborative environments is analyzed, a suitable method is introduced for calculating the agentpsilas trust in collaborative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.