The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust helps to make decisions in unpredictable circumstances. Every security system depends on trust, in one form or another, among users of the system. A trust management scheme can used to help an automated decision-making process for the access control strategy. Unintentional temporary errors are possible in system, the trust management solution must provide a scheme to allow nodes to recover trust...
Cloud computing is a promising technology and its adoption is increasing rapidly. Still, many potential cloud customers are concerned about the security, privacy, and availability of their data in the cloud as they have less control over it. Cloud certification authorities can perform rigorous and thorough testing based on the well-known security standards procedures and make the audit reports public...
"Use the computer without a computer," this is the dream of all managers who believe in "Cloud Computing". The Cloud has become a dream and an obsession for all fans of the computer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume...
In the context of Data Integration Systems (DIS), integrating data across organizations varying in security and privacy requirements in addition to trust levels raises concerns of data leakage threats. In order to prevent these threats, an in depth threat analysis reflected on the architectural components of a DIS is required. This paper analyses data leakage threats and locations within the DIS architecture...
Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However, because of cognitive, time or other constraints, users concentrate on minimizing the uncertainties of disclosure - reducing their level of privacy concern - by using a limited set of information cues. We suggest an individual's information-seeking...
In this paper we propose an approach for enhanced data protection in the cloud, based upon accountability governance. Specifically, the relationships between accountability, risk and trust are analyzed in order to suggest characteristics and means to address data governance issues involved when organizations or individuals adopt cloud computing. This analysis takes into account insights from a variety...
This study aims to theoretically construct a research model based on literature review in order to investigate the trust factors that affect the adoption of cloud-based supply chain management (SCM) systems. A new research model is comprised of six antecedent trust factors (communication, learning capacity, participation, usability, security, and reliability) that should influence the supply chain...
Cloud computing is an emerging new computing technology which has attracted much attention. Previous literature has pointed to the role of trust and control to mitigate the risks associated with the adoption of the cloud. However, there is a paucity of research on how the combination of different types of trust with formal control can mitigate the risk of cloud adoption involving highly confidential...
The balance between privacy and security concerns is a hotly debated topic, especially as government (and private) entities are able to gather and analyze data from several disparate sources with ease. This ability to do large scale analytics of publicly accessible data leads to significant privacy concerns. In particular, for the government, there is the fear of a fishing expedition against individuals...
According to the characteristics of trust in the alliance interoperable environment and the shortcomings of the existing trust model, we propose a recommendation trust model based on reputation — RBRTrust Model, the model took into account the subjective and objective factors which impact the trust: interactive scope, interactive time, interactive context, etc., through local trust, direct trust and...
The cloud services are on everybody's lips, but what is the standpoint of those needing to consider the implications of serious involvement? What trust related aspects the experts deem noteworthy when surrending organisation'scomputing services into foreign hands? In this paper we present results from an expert interview study on trust and cloud services, covering the nature, measurement and experiencing...
Scholars in many disciplines have examined the importance of building various forms of trust in the systems. We found it particularly important for the Financial Services Information Systems (FSIS) to design and build in the trust from very beginning. Trust plays an important role as it has a positive effect on customer satisfaction and leads to a higher level of customer loyalty. This paper reports...
This paper presents a new trust model that has integrated user-centered design philosophy, as an important role to gain users' trust. It points out that the level of trust is finally rated by the users, not by some “trust” organizations. And it is the reason that research in ergonomics has already examined how trust is established, maintained, lost and regained in human-machine systems. After a short...
End-to-end security in collaborative system has two inferences: the secure delivery of service and the `due usage' of it. The fulfillment of this requirement involves re-thinking the security policy model of collaborative systems. This paper analyses the factors that impact security in such systems. Based on this, a general architecture is proposed with a collaboration-based policy model specified...
In the business context, accountability has become a major concern for businesses around the world in aftermath of corporate scandals and fallouts. However, accountability has not been rigorously considered in IT system technologies and solutions. The goal of this study is to provide a clear understanding of accountability concept in service-oriented computing and, more generally, e-society. We first...
Partially distributed teams (PDTs) are increasingly common in organizations as they collaborate across distance. A PDT has at least two collocated subteams that are geographically distant and communicate by electronic media. This paper reports on a two semester quasi-experimental study of students in global PDTs in the role of software developers designing an emergency management information system...
Acknowledged as important factors for business environments operating as virtual organizations (VOs), trust and reputation are receiving attention also in Grids devoted to scientific applications where problems of finding suitable models and architectures for flexible security management of heterogeneous resources arise. Being these resources highly heterogeneous (from individual users to whole organizations...
In its simplest form, identity management deals with how users are identified and authorized across networks. In the case of federated identity management, these networks cross system and organizational boundaries. To manage identity in this context, a cooperative contract is set up between multiple identity providers, using a decentralized approach. Establishing an identity management strategy within...
It is hard to judge whether one subject is to be trusted where federation identity management only focuses on identity trust achieved by credentials the subject hold. So we propose a behavior trust-based federation identity management mechanism. The trust value was modified according to the subjectpsilas behavior and it will be employed in identity management procedure including identity mapping and...
In providing the infrastructure for the accomplishment of general purpose computational grids the main concern is security. Still, by properly authenticating users and hosts and in the interactions between them, most grid implementations focus their safety concerns. The effective and competent exploitation of grid computing services needs sophisticated and secured resource management systems. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.