The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proactive forensics uses the investigative principles of digital forensics to develop automated techniques that prevent cybercrime. One such prevention-minded methodology is PROFORMA, a prototype system that continuously evaluates the trustworthiness and risk of social communications.
In this paper we propose an approach for enhanced data protection in the cloud, based upon accountability governance. Specifically, the relationships between accountability, risk and trust are analyzed in order to suggest characteristics and means to address data governance issues involved when organizations or individuals adopt cloud computing. This analysis takes into account insights from a variety...
Large-scale data processing systems frequently require users to make timely and high-value business decisions based upon information that is received from a variety of heterogeneous sources. Such heterogeneity is especially true of service-oriented systems, which are often dynamic in nature and composed of multiple interacting services. However, in order to establish user trust in such systems, there...
Nowadays Cloud computing has introduced a new paradigm in distributed services, enabling the provision of services or computational resources to remote entities with no need to have them in house. In this paper, we consider two real life scenarios; 1) risk management in work areas, and 2) the execution of scientific experiments in cooperation among various computation nodes. We investigate how we...
Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts...
Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this paper, we present...
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation. In order to effectively protect digital assets with copyrights?? against piracy and misuse, it is necessary for the contents value chain as a whole to investigate on some open issues and advances. The paper proposed three...
Attacks targeting something or someone indirectly-nth order attacks against end systems--have occurred on a large scale in real life. It goes to the heart of how conflicts between open societies and their enemies are waged: trust subsystems. Trust helps lower tangible and intangible transaction costs between individuals, corporations, and the state. Members of "high-trust" societies like...
Effective and efficient management of technology is indispensable to the implementation of software projects in the public sector. E-voting - which involves technological, institutional (legal and political), and societal risks - demands complicated risk management and can, as such, be considered one of the most, if not the most, ambitious field of application. Estonia has successfully implemented...
Registered Traveler (RT) program is an automated border control tool to reinforce homeland security without compromising convenience. This paper introduces a process-based approach for dynamic risk assessment using fuzzy logic in the RT program. We propose the use of multimodal biometrics for strong identification and greater interoperability with legacy schemes. The concept is applied to the passenger...
This paper emerges from research by (Alter, S. et al., 2004), (Dillard, K. et al., 2004), (Landoll, D.J., 2006) and (Soliman, K., 2006), and it draws on real-world examples so as to underline some limits of quantitative risk assessment. The paper is a case study and emphasized that theoretical formulas used in information security risk assessments do not contain the time dimension of the analysis...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative...
In nonhierarchical public key infrastructure (PKI), any user can be a certificate authority (CA) to issue digital certificates to other users. As there is no single root CA, it is difficult to check the validity of certificates issued by unknown CAs. It is very risky to trust them without in-depth analysis. How users issue certificates in the real world has not been studied. Solomon Aschpsilas conformity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.