The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has proved to be a viable model for delivering information technology services through the web. It provides users the ability to share distributed resources owned by a central service provider at minimal setup costs. However, due to its nature, existing and potential users of the cloud are more concerned about the integrity, security and privacy of their data, and also the ability...
Grid systems are an ideal basis to parallelise computationally intensive tasks that efficiently can be split into parts. One possible application domain for such systems is rendering of films. Since small companies and underground film producers do not have the possibility to maintain appropriate computing environments for their own films, grid-based approaches can be used to build a self-organised...
Previous researches have revealed that the creation of synergy between retailers' channels can enhance customers' satisfaction and loyalty. Nevertheless, little is known about utilizing such synergy in inducing customers' purchasing behavior in electronic commerce. In an attempt to address this issue, few empirical studies have been conducted on the role of trust transference from brick to click channels...
This paper discusses the technical, legal and sociological issues that are encountered when trying to share sensitive security information across multiple management domains. In particular, it investigates the issues encountered when these management domains are in differing legal jurisdictions, and proposes a format for a Cross-Border Information Sharing Agreement (CB-ISA).
In this paper we propose an approach for enhanced data protection in the cloud, based upon accountability governance. Specifically, the relationships between accountability, risk and trust are analyzed in order to suggest characteristics and means to address data governance issues involved when organizations or individuals adopt cloud computing. This analysis takes into account insights from a variety...
Transparency and confident towards cloud provider are some of the prominent issues in cloud today. In order to solve these problems, cloud service providers should have a high level of assurance and accountability in order to maintain trust between them and the users. This trust can be achieved through data provenance. Data provenance provides historical data from its original resources and can facilitate...
Provenance, a meta-data describing the derivation history of data, is crucial for the uptake of cloud computing to enhance reliability, credibility, accountability, transparency, and confidentiality of digital objects in a cloud. In this paper, we survey current mechanisms that support provenance for cloud computing, we classify provenance according to its granularities encapsulating the various sets...
Secure localization in wireless sensor networks (WSNs) has received a great deal of attention with the increasing applications of wireless sensors. Security issues of localization in WSNs need to take into account attacks from both external and internal nodes. In this paper, we propose a secure localization scheme based on trust evaluation called trust based secure localization (TBSL) to evaluate...
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust and privacy mechanisms. Many of these...
We all receive paper based certificates during our study journey, but they are hard to manage to avoid damage or loss. The field of e-learning provides technological developments, such as e-portfolios, which enable greater power and flexibility in displaying achievements. These may include on-line versions of certificates of the applicant's attainment which overcome the limitations of paper-based...
In this technology mediated world, e-commerce is becoming more and more powerful medium for doing business, globally. Existing security technologies are proven to protect online transaction and fund transfer. However, while transacting with global e-merchants, trustworthiness of secure fund transfer and delivery of products/services are affected, and they could not leverage the potential benefit of...
Digital transactions are full of uncertainties and risks. The willingness to accept these uncertainties depends on whether we trust the other party, on the systems that support the transactions and the relevant controls. This article provides a framework for analyzing the ways in which trust works in the digital environment. It also categorizes existing approaches in the field of technological and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.