The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer to peer (P2P) e-commerce applications exist at the edge of the Internet with vulnerabilities to passive and active attacks. These attacks have pushed away potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur during interactions between the trading peers as a transaction takes place. In this paper, we propose how to...
Even though online education is a very important pillar of lifelong education, institutions are still reluctant to wager for a fully online educational model. At the end, they keep relying on on-site assessment systems, mainly because fully virtual alternatives do not have the deserved social recognition or credibility. Thus, the design of virtual assessment systems that are able to provide effective...
Mobile ad hoc networks (MANETs) are wireless networks which have a wide range applications due to their dynamic topologies and easy to deployment. However, such networks are also more vulnerable to attacks compared with traditional wireless networks. Certificate revocation is an effective mechanism for providing network security services. Existing schemes are not well suited for MANETs because of...
Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However, because of cognitive, time or other constraints, users concentrate on minimizing the uncertainties of disclosure - reducing their level of privacy concern - by using a limited set of information cues. We suggest an individual's information-seeking...
We collected social media network data from the site Twitter to explore the ‘language of the wire’ and how users of digital environments conceptualise trust. Our underlying aim is to gather insights that can inform the design of an interface that assists users to negotiate trust. From our pilot study exploring and developing new methods, we found that the words ‘love’, ‘faith’, ‘god’ and ‘believe’...
Trust service is a very important issue in cloud computing, and a cloud user needs a trust mechanism in selecting a reliable cloud service provider. Many trust technologies such as SLA, cloud audit, self-assessment questionnaire, accreditation, and so on, are proposed by some research organizations like CSA. However, all of these just provide a initial trust and have many limitations. A hybrid trust...
In this paper, we propose a trustworthy data management framework for wireless networks in Cyber-Physical System (CPS), in which the trust values of both CPS data and the reporting devices are assessed. In addition, a set of policy rules are declared to accurately describe how we determine the trustworthiness of each reporting device based on the contextual factors. Experimental results on both simulation...
Mobile Ad Hoc Networks are those which could be rapidly deployed anywhere without any infrastructural facilities. The topology will be very much dynamic and the entry and exit of nodes will be unpredictable. This makes the MANET more vulnerable to attacks. Security becomes more threatening due to the insecure admission of the nodes to the network. Variety of security protocols which successfully provide...
The importance of resources and services availability in Ad Hoc networks has already been proved several times in the past. It concerns, essentially, node availability as well as routing and forwarding actions accessibility. Unfortunately, nodes' lifetimes may be reduced or even depleted which leads to route failure, packets loss, QoS deterioration, etc. This is mainly due to a battery problem that...
Trustworthiness is an important aspect of social interaction, but is difficult to assess when interacting with Internet based IT services which do not have the same social cues, and often leave users with strong concerns. Trustworthiness is therefore one of the key elements for successful IT service deployment. We analyze the concepts of trust and trustworthiness and sketch a Service Behavior Trustworthiness...
Trust is one of the fundamental security concepts since it provides network collaborating entities with a mean to counter their uncertainty. Trust is generally integrated into existent security frameworks in order to add a security level to entities collaborations through the use of trust relations. Besides, benefiting from trust relations implies establishing them, updating them when needed and revoking...
This paper analyzes the survey result on the information security requirement for smart grid. The survey was conducted via distributing questionnaires. Descriptive analysis has successfully ranked the information security consumer requirements with the compass of mean and standard deviation. Privacy concern becomes the most important element among the other fifteen requirements. Result showed that...
The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned...
According to the characteristics of trust in the alliance interoperable environment and the shortcomings of the existing trust model, we propose a recommendation trust model based on reputation — RBRTrust Model, the model took into account the subjective and objective factors which impact the trust: interactive scope, interactive time, interactive context, etc., through local trust, direct trust and...
For the purpose of developing a usable trust relationship between the resource providers (hosts) and the resource consumers (users) in an open computing environment and providing a unified management of the reputation degree of the resource provides and users, a dynamic reputation management model based on Google PageRank (DRMPR) is proposed. The DRMPR system can achieve self-study from a large amount...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.